diff --git "a/dataset/exploit/cve-2020.csv" "b/dataset/exploit/cve-2020.csv" new file mode 100644--- /dev/null +++ "b/dataset/exploit/cve-2020.csv" @@ -0,0 +1,58003 @@ +"No.","Time","Source","Destination","Protocol","Length","Info" +"1","0.000000","172.30.1.205","172.30.1.104","TCP","74","40496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903226 TSecr=0 WS=128" +"2","0.000404","172.30.1.104","172.30.1.205","TCP","66","135 > 40496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3","0.000424","172.30.1.205","172.30.1.104","TCP","54","40496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4","0.000873","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5","0.001869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6","0.001886","172.30.1.205","172.30.1.104","TCP","54","40496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7","0.004282","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8","0.004773","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9","0.004781","172.30.1.205","172.30.1.104","TCP","54","40496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10","0.006672","172.30.1.205","172.30.1.104","TCP","54","40496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11","0.006806","172.30.1.205","172.30.1.104","TCP","74","33134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903233 TSecr=0 WS=128" +"12","0.006953","172.30.1.104","172.30.1.205","TCP","54","135 > 40496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13","0.007101","172.30.1.104","172.30.1.205","TCP","66","49671 > 33134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14","0.007111","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15","0.007460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16","0.007623","172.30.1.104","172.30.1.205","TCP","54","135 > 40496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17","0.007631","172.30.1.205","172.30.1.104","TCP","54","40496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18","0.007826","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19","0.007835","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20","0.010078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21","0.027097","172.30.1.104","172.30.1.205","TCP","54","49671 > 33134 [ACK] Seq=61 Ack=201 Win=2150400 Len=0" +"22","0.027314","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23","0.027327","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24","0.029035","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25","0.035353","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26","0.035367","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27","0.036491","172.30.1.205","172.30.1.104","TCP","74","40500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903262 TSecr=0 WS=128" +"28","0.036815","172.30.1.104","172.30.1.205","TCP","66","135 > 40500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29","0.036826","172.30.1.205","172.30.1.104","TCP","54","40500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30","0.037279","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31","0.037595","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32","0.037604","172.30.1.205","172.30.1.104","TCP","54","40500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33","0.040167","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34","0.040595","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35","0.040602","172.30.1.205","172.30.1.104","TCP","54","40500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36","0.042452","172.30.1.205","172.30.1.104","TCP","54","40500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37","0.042595","172.30.1.205","172.30.1.104","TCP","74","33138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903269 TSecr=0 WS=128" +"38","0.042722","172.30.1.104","172.30.1.205","TCP","54","135 > 40500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39","0.042840","172.30.1.104","172.30.1.205","TCP","54","135 > 40500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40","0.042848","172.30.1.205","172.30.1.104","TCP","54","40500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41","0.042944","172.30.1.104","172.30.1.205","TCP","66","49671 > 33138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42","0.042953","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43","0.043294","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44","0.043611","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45","0.043620","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46","0.045530","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47","0.045905","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48","0.045911","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49","0.047249","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50","0.049411","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51","0.049421","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52","0.050404","172.30.1.205","172.30.1.104","TCP","74","40504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903276 TSecr=0 WS=128" +"53","0.050729","172.30.1.104","172.30.1.205","TCP","66","135 > 40504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54","0.050740","172.30.1.205","172.30.1.104","TCP","54","40504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55","0.051088","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56","0.051396","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57","0.051404","172.30.1.205","172.30.1.104","TCP","54","40504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"58","0.053620","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"59","0.054051","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"60","0.054058","172.30.1.205","172.30.1.104","TCP","54","40504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"61","0.055864","172.30.1.205","172.30.1.104","TCP","54","40504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"62","0.055981","172.30.1.205","172.30.1.104","TCP","74","33142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903282 TSecr=0 WS=128" +"63","0.056161","172.30.1.104","172.30.1.205","TCP","54","135 > 40504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"64","0.056196","172.30.1.104","172.30.1.205","TCP","54","135 > 40504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"65","0.056203","172.30.1.205","172.30.1.104","TCP","54","40504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"66","0.056303","172.30.1.104","172.30.1.205","TCP","66","49671 > 33142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"67","0.056312","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"68","0.056657","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"69","0.056947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"70","0.056956","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"71","0.058825","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"72","0.061218","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"73","0.061226","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"74","0.062592","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"75","0.064787","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"76","0.064802","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"77","0.065847","172.30.1.205","172.30.1.104","TCP","74","40508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903292 TSecr=0 WS=128" +"78","0.066143","172.30.1.104","172.30.1.205","TCP","66","135 > 40508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"79","0.066157","172.30.1.205","172.30.1.104","TCP","54","40508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"80","0.066528","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"81","0.066826","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"82","0.066837","172.30.1.205","172.30.1.104","TCP","54","40508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"83","0.069069","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"84","0.069121","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"85","0.069159","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"86","0.069394","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"87","0.069537","172.30.1.104","172.30.1.205","TCP","54","49671 > 33134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"88","0.069550","172.30.1.104","172.30.1.205","TCP","54","49671 > 33138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"89","0.069553","172.30.1.104","172.30.1.205","TCP","54","49671 > 33142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"90","0.069561","172.30.1.104","172.30.1.205","TCP","54","49671 > 33134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"91","0.069569","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"92","0.069576","172.30.1.104","172.30.1.205","TCP","54","49671 > 33138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"93","0.069578","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"94","0.069651","172.30.1.104","172.30.1.205","TCP","54","49671 > 33142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"95","0.069653","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"96","0.069857","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"97","0.069862","172.30.1.205","172.30.1.104","TCP","54","40508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"98","0.071792","172.30.1.205","172.30.1.104","TCP","54","40508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"99","0.071921","172.30.1.205","172.30.1.104","TCP","74","33146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903298 TSecr=0 WS=128" +"100","0.072064","172.30.1.104","172.30.1.205","TCP","54","135 > 40508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"101","0.072101","172.30.1.104","172.30.1.205","TCP","54","135 > 40508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"102","0.072106","172.30.1.205","172.30.1.104","TCP","54","40508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"103","0.072218","172.30.1.104","172.30.1.205","TCP","66","49671 > 33146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"104","0.072227","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"105","0.072582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"106","0.072892","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"107","0.072901","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"108","0.074772","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"109","0.075167","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"110","0.075173","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"111","0.076538","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"112","0.078653","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"113","0.078667","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"114","0.079700","172.30.1.205","172.30.1.104","TCP","74","40512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903306 TSecr=0 WS=128" +"115","0.080003","172.30.1.104","172.30.1.205","TCP","66","135 > 40512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"116","0.080015","172.30.1.205","172.30.1.104","TCP","54","40512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"117","0.080371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"118","0.080792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"119","0.080802","172.30.1.205","172.30.1.104","TCP","54","40512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"120","0.082998","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"121","0.083415","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"122","0.083422","172.30.1.205","172.30.1.104","TCP","54","40512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"123","0.085255","172.30.1.205","172.30.1.104","TCP","54","40512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"124","0.085369","172.30.1.205","172.30.1.104","TCP","74","33150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903311 TSecr=0 WS=128" +"125","0.085586","172.30.1.104","172.30.1.205","TCP","54","135 > 40512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"126","0.085754","172.30.1.104","172.30.1.205","TCP","54","135 > 40512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"127","0.085760","172.30.1.205","172.30.1.104","TCP","54","40512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"128","0.085765","172.30.1.104","172.30.1.205","TCP","66","49671 > 33150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"129","0.085774","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"130","0.086123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"131","0.086412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"132","0.086421","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"133","0.088294","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"134","0.088726","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"135","0.088733","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"136","0.090099","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"137","0.092157","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"138","0.092166","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"139","0.093116","172.30.1.205","172.30.1.104","TCP","74","40516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903319 TSecr=0 WS=128" +"140","0.093416","172.30.1.104","172.30.1.205","TCP","66","135 > 40516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"141","0.093426","172.30.1.205","172.30.1.104","TCP","54","40516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"142","0.093779","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"143","0.094090","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"144","0.094100","172.30.1.205","172.30.1.104","TCP","54","40516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"145","0.096259","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"146","0.096699","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"147","0.096706","172.30.1.205","172.30.1.104","TCP","54","40516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"148","0.098517","172.30.1.205","172.30.1.104","TCP","54","40516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"149","0.098630","172.30.1.205","172.30.1.104","TCP","74","33154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903325 TSecr=0 WS=128" +"150","0.098855","172.30.1.104","172.30.1.205","TCP","54","135 > 40516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"151","0.098865","172.30.1.104","172.30.1.205","TCP","54","135 > 40516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"152","0.098870","172.30.1.205","172.30.1.104","TCP","54","40516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"153","0.098960","172.30.1.104","172.30.1.205","TCP","66","49671 > 33154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"154","0.098968","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"155","0.099310","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"156","0.099670","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"157","0.099678","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"158","0.101573","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"159","0.101938","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"160","0.101945","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"161","0.103285","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"162","0.105375","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"163","0.105384","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"164","0.106327","172.30.1.205","172.30.1.104","TCP","74","40520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903332 TSecr=0 WS=128" +"165","0.106655","172.30.1.104","172.30.1.205","TCP","66","135 > 40520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"166","0.106666","172.30.1.205","172.30.1.104","TCP","54","40520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"167","0.107015","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"168","0.107307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"169","0.107316","172.30.1.205","172.30.1.104","TCP","54","40520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"170","0.109512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"171","0.109934","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"172","0.109943","172.30.1.205","172.30.1.104","TCP","54","40520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"173","0.111808","172.30.1.205","172.30.1.104","TCP","54","40520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"174","0.111924","172.30.1.205","172.30.1.104","TCP","74","33158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903338 TSecr=0 WS=128" +"175","0.112117","172.30.1.104","172.30.1.205","TCP","54","135 > 40520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"176","0.112177","172.30.1.104","172.30.1.205","TCP","54","135 > 40520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"177","0.112182","172.30.1.205","172.30.1.104","TCP","54","40520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"178","0.112281","172.30.1.104","172.30.1.205","TCP","66","49671 > 33158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"179","0.112290","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"180","0.112643","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"181","0.112935","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"182","0.112944","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"183","0.114805","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"184","0.115223","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"185","0.115229","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"186","0.116564","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"187","0.118895","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"188","0.118905","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"189","0.119831","172.30.1.205","172.30.1.104","TCP","74","40524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903346 TSecr=0 WS=128" +"190","0.120155","172.30.1.104","172.30.1.205","TCP","66","135 > 40524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"191","0.120166","172.30.1.205","172.30.1.104","TCP","54","40524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"192","0.120510","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"193","0.120875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"194","0.120885","172.30.1.205","172.30.1.104","TCP","54","40524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"195","0.123050","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"196","0.123531","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"197","0.123541","172.30.1.205","172.30.1.104","TCP","54","40524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"198","0.125440","172.30.1.205","172.30.1.104","TCP","54","40524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"199","0.125563","172.30.1.205","172.30.1.104","TCP","74","33162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903351 TSecr=0 WS=128" +"200","0.125821","172.30.1.104","172.30.1.205","TCP","54","135 > 40524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"201","0.125854","172.30.1.104","172.30.1.205","TCP","54","135 > 40524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"202","0.125861","172.30.1.205","172.30.1.104","TCP","54","40524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"203","0.125974","172.30.1.104","172.30.1.205","TCP","66","49671 > 33162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"204","0.125982","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"205","0.126333","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"206","0.126629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"207","0.126641","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"208","0.128511","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"209","0.128922","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"210","0.128930","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"211","0.130307","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"212","0.132533","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"213","0.132543","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"214","0.133502","172.30.1.205","172.30.1.104","TCP","74","40528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903359 TSecr=0 WS=128" +"215","0.133828","172.30.1.104","172.30.1.205","TCP","66","135 > 40528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"216","0.133839","172.30.1.205","172.30.1.104","TCP","54","40528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"217","0.134185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"218","0.134537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"219","0.134548","172.30.1.205","172.30.1.104","TCP","54","40528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"220","0.136746","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"221","0.137187","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"222","0.137195","172.30.1.205","172.30.1.104","TCP","54","40528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"223","0.139182","172.30.1.205","172.30.1.104","TCP","54","40528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"224","0.139294","172.30.1.205","172.30.1.104","TCP","74","33166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903365 TSecr=0 WS=128" +"225","0.139619","172.30.1.104","172.30.1.205","TCP","54","135 > 40528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"226","0.139627","172.30.1.104","172.30.1.205","TCP","54","135 > 40528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"227","0.139633","172.30.1.205","172.30.1.104","TCP","54","40528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"228","0.139762","172.30.1.104","172.30.1.205","TCP","66","49671 > 33166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"229","0.139771","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"230","0.140131","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"231","0.140419","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"232","0.140428","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"233","0.142339","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"234","0.142767","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"235","0.142774","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"236","0.144108","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"237","0.146343","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"238","0.146354","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"239","0.147310","172.30.1.205","172.30.1.104","TCP","74","40532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903373 TSecr=0 WS=128" +"240","0.147625","172.30.1.104","172.30.1.205","TCP","66","135 > 40532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"241","0.147643","172.30.1.205","172.30.1.104","TCP","54","40532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"242","0.147997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"243","0.148314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"244","0.148323","172.30.1.205","172.30.1.104","TCP","54","40532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"245","0.150565","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"246","0.150995","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"247","0.151002","172.30.1.205","172.30.1.104","TCP","54","40532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"248","0.152818","172.30.1.205","172.30.1.104","TCP","54","40532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"249","0.152925","172.30.1.205","172.30.1.104","TCP","74","33170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903379 TSecr=0 WS=128" +"250","0.153074","172.30.1.104","172.30.1.205","TCP","54","135 > 40532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"251","0.153119","172.30.1.104","172.30.1.205","TCP","54","135 > 40532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"252","0.153125","172.30.1.205","172.30.1.104","TCP","54","40532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"253","0.153266","172.30.1.104","172.30.1.205","TCP","66","49671 > 33170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"254","0.153278","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"255","0.153645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"256","0.153973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"257","0.153983","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"258","0.155889","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"259","0.156263","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"260","0.156270","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"261","0.157657","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"262","0.159852","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"263","0.159862","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"264","0.160809","172.30.1.205","172.30.1.104","TCP","74","40536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903387 TSecr=0 WS=128" +"265","0.161119","172.30.1.104","172.30.1.205","TCP","66","135 > 40536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"266","0.161129","172.30.1.205","172.30.1.104","TCP","54","40536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"267","0.161491","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"268","0.161769","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"269","0.161778","172.30.1.205","172.30.1.104","TCP","54","40536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"270","0.163963","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"271","0.164859","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"272","0.164866","172.30.1.205","172.30.1.104","TCP","54","40536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"273","0.166690","172.30.1.205","172.30.1.104","TCP","54","40536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"274","0.166800","172.30.1.205","172.30.1.104","TCP","74","33174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903393 TSecr=0 WS=128" +"275","0.166945","172.30.1.104","172.30.1.205","TCP","54","135 > 40536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"276","0.167007","172.30.1.104","172.30.1.205","TCP","54","135 > 40536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"277","0.167013","172.30.1.205","172.30.1.104","TCP","54","40536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"278","0.167112","172.30.1.104","172.30.1.205","TCP","66","49671 > 33174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"279","0.167121","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"280","0.167462","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"281","0.167904","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"282","0.167913","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"283","0.169796","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"284","0.170663","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"285","0.170669","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"286","0.172028","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"287","0.174168","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"288","0.174178","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"289","0.175127","172.30.1.205","172.30.1.104","TCP","74","40540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903401 TSecr=0 WS=128" +"290","0.175482","172.30.1.104","172.30.1.205","TCP","66","135 > 40540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"291","0.175493","172.30.1.205","172.30.1.104","TCP","54","40540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"292","0.175837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"293","0.176137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"294","0.176146","172.30.1.205","172.30.1.104","TCP","54","40540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"295","0.178336","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"296","0.178856","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"297","0.178863","172.30.1.205","172.30.1.104","TCP","54","40540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"298","0.180646","172.30.1.205","172.30.1.104","TCP","54","40540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"299","0.180757","172.30.1.205","172.30.1.104","TCP","74","33178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903407 TSecr=0 WS=128" +"300","0.180938","172.30.1.104","172.30.1.205","TCP","54","135 > 40540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"301","0.180995","172.30.1.104","172.30.1.205","TCP","54","135 > 40540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"302","0.181001","172.30.1.205","172.30.1.104","TCP","54","40540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"303","0.181111","172.30.1.104","172.30.1.205","TCP","66","49671 > 33178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"304","0.181120","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"305","0.181494","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"306","0.181798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"307","0.181807","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"308","0.183645","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"309","0.184045","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"310","0.184051","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"311","0.185415","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"312","0.187500","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"313","0.187510","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"314","0.188434","172.30.1.205","172.30.1.104","TCP","74","40544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903414 TSecr=0 WS=128" +"315","0.188792","172.30.1.104","172.30.1.205","TCP","66","135 > 40544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"316","0.188803","172.30.1.205","172.30.1.104","TCP","54","40544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"317","0.189157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"318","0.189463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"319","0.189473","172.30.1.205","172.30.1.104","TCP","54","40544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"320","0.191628","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"321","0.192044","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"322","0.192051","172.30.1.205","172.30.1.104","TCP","54","40544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"323","0.193862","172.30.1.205","172.30.1.104","TCP","54","40544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"324","0.193971","172.30.1.205","172.30.1.104","TCP","74","33182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903420 TSecr=0 WS=128" +"325","0.194226","172.30.1.104","172.30.1.205","TCP","54","135 > 40544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"326","0.194323","172.30.1.104","172.30.1.205","TCP","66","49671 > 33182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"327","0.194332","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"328","0.194675","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"329","0.195648","172.30.1.104","172.30.1.205","TCP","54","135 > 40544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"330","0.195654","172.30.1.205","172.30.1.104","TCP","54","40544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"331","0.195784","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"332","0.195792","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"333","0.197664","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"334","0.198104","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"335","0.198110","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"336","0.199442","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"337","0.201598","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"338","0.201608","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"339","0.202540","172.30.1.205","172.30.1.104","TCP","74","40548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903428 TSecr=0 WS=128" +"340","0.202868","172.30.1.104","172.30.1.205","TCP","66","135 > 40548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"341","0.202879","172.30.1.205","172.30.1.104","TCP","54","40548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"342","0.203226","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"343","0.203489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"344","0.203498","172.30.1.205","172.30.1.104","TCP","54","40548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"345","0.205721","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"346","0.206116","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"347","0.206123","172.30.1.205","172.30.1.104","TCP","54","40548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"348","0.207913","172.30.1.205","172.30.1.104","TCP","54","40548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"349","0.208025","172.30.1.205","172.30.1.104","TCP","74","33186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903434 TSecr=0 WS=128" +"350","0.208194","172.30.1.104","172.30.1.205","TCP","54","135 > 40548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"351","0.208267","172.30.1.104","172.30.1.205","TCP","54","135 > 40548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"352","0.208277","172.30.1.205","172.30.1.104","TCP","54","40548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"353","0.208336","172.30.1.104","172.30.1.205","TCP","66","49671 > 33186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"354","0.208349","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"355","0.208746","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"356","0.209084","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"357","0.209095","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"358","0.210978","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"359","0.211330","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"360","0.211337","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"361","0.212675","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"362","0.214701","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"363","0.214710","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"364","0.215632","172.30.1.205","172.30.1.104","TCP","74","40552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903442 TSecr=0 WS=128" +"365","0.215924","172.30.1.104","172.30.1.205","TCP","66","135 > 40552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"366","0.215935","172.30.1.205","172.30.1.104","TCP","54","40552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"367","0.216285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"368","0.216536","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"369","0.216546","172.30.1.205","172.30.1.104","TCP","54","40552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"370","0.218727","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"371","0.219082","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"372","0.219089","172.30.1.205","172.30.1.104","TCP","54","40552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"373","0.220902","172.30.1.205","172.30.1.104","TCP","54","40552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"374","0.221019","172.30.1.205","172.30.1.104","TCP","74","33190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903447 TSecr=0 WS=128" +"375","0.221161","172.30.1.104","172.30.1.205","TCP","54","135 > 40552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"376","0.221200","172.30.1.104","172.30.1.205","TCP","54","135 > 40552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"377","0.221205","172.30.1.205","172.30.1.104","TCP","54","40552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"378","0.221307","172.30.1.104","172.30.1.205","TCP","66","49671 > 33190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"379","0.221315","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"380","0.221667","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"381","0.221951","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"382","0.221961","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"383","0.223814","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"384","0.224255","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"385","0.224262","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"386","0.225630","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"387","0.227746","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"388","0.227758","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"389","0.228694","172.30.1.205","172.30.1.104","TCP","74","40556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903455 TSecr=0 WS=128" +"390","0.228972","172.30.1.104","172.30.1.205","TCP","66","135 > 40556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"391","0.228984","172.30.1.205","172.30.1.104","TCP","54","40556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"392","0.229332","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"393","0.229946","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"394","0.229957","172.30.1.205","172.30.1.104","TCP","54","40556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"395","0.232191","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"396","0.232573","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"397","0.232579","172.30.1.205","172.30.1.104","TCP","54","40556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"398","0.233432","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"399","0.233492","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"400","0.233528","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"401","0.233570","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"402","0.233594","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"403","0.233621","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"404","0.233644","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"405","0.233671","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"406","0.233693","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"407","0.233715","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"408","0.233737","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"409","0.233802","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"410","0.234172","172.30.1.104","172.30.1.205","TCP","54","49671 > 33150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"411","0.234181","172.30.1.104","172.30.1.205","TCP","54","49671 > 33150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"412","0.234187","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"413","0.234193","172.30.1.104","172.30.1.205","TCP","54","49671 > 33154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"414","0.234197","172.30.1.104","172.30.1.205","TCP","54","49671 > 33154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"415","0.234199","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"416","0.234201","172.30.1.104","172.30.1.205","TCP","54","49671 > 33158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"417","0.234204","172.30.1.104","172.30.1.205","TCP","54","49671 > 33162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"418","0.234206","172.30.1.104","172.30.1.205","TCP","54","49671 > 33166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"419","0.234209","172.30.1.104","172.30.1.205","TCP","54","49671 > 33158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"420","0.234211","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"421","0.234212","172.30.1.104","172.30.1.205","TCP","54","49671 > 33162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"422","0.234214","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"423","0.234215","172.30.1.104","172.30.1.205","TCP","54","49671 > 33166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"424","0.234217","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"425","0.234218","172.30.1.104","172.30.1.205","TCP","54","49671 > 33170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"426","0.234220","172.30.1.104","172.30.1.205","TCP","54","49671 > 33174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"427","0.234223","172.30.1.104","172.30.1.205","TCP","54","49671 > 33178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"428","0.234544","172.30.1.104","172.30.1.205","TCP","54","49671 > 33182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"429","0.234551","172.30.1.104","172.30.1.205","TCP","54","49671 > 33170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"430","0.234555","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"431","0.234562","172.30.1.104","172.30.1.205","TCP","54","49671 > 33182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"432","0.234564","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"433","0.234566","172.30.1.104","172.30.1.205","TCP","54","49671 > 33174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"434","0.234567","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"435","0.234572","172.30.1.104","172.30.1.205","TCP","54","49671 > 33178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"436","0.234573","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"437","0.234574","172.30.1.104","172.30.1.205","TCP","54","49671 > 33186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"438","0.234578","172.30.1.104","172.30.1.205","TCP","54","49671 > 33190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"439","0.234580","172.30.1.104","172.30.1.205","TCP","54","49671 > 33146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"440","0.234582","172.30.1.104","172.30.1.205","TCP","54","49671 > 33146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"441","0.234584","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"442","0.234586","172.30.1.104","172.30.1.205","TCP","54","49671 > 33186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"443","0.234588","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"444","0.234589","172.30.1.104","172.30.1.205","TCP","54","49671 > 33190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"445","0.234591","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"446","0.235277","172.30.1.205","172.30.1.104","TCP","54","40556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"447","0.235387","172.30.1.205","172.30.1.104","TCP","74","33194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903461 TSecr=0 WS=128" +"448","0.235503","172.30.1.104","172.30.1.205","TCP","54","135 > 40556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"449","0.235538","172.30.1.104","172.30.1.205","TCP","54","135 > 40556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"450","0.235543","172.30.1.205","172.30.1.104","TCP","54","40556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"451","0.235645","172.30.1.104","172.30.1.205","TCP","66","49671 > 33194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"452","0.235654","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"453","0.236002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"454","0.236275","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"455","0.236284","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"456","0.238188","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"457","0.238597","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"458","0.238604","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"459","0.239945","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"460","0.242076","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"461","0.242088","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"462","0.243039","172.30.1.205","172.30.1.104","TCP","74","40560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903469 TSecr=0 WS=128" +"463","0.243323","172.30.1.104","172.30.1.205","TCP","66","135 > 40560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"464","0.243333","172.30.1.205","172.30.1.104","TCP","54","40560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"465","0.243679","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"466","0.244000","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"467","0.244011","172.30.1.205","172.30.1.104","TCP","54","40560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"468","0.246247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"469","0.246626","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"470","0.246633","172.30.1.205","172.30.1.104","TCP","54","40560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"471","0.248436","172.30.1.205","172.30.1.104","TCP","54","40560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"472","0.248547","172.30.1.205","172.30.1.104","TCP","74","33198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903474 TSecr=0 WS=128" +"473","0.248677","172.30.1.104","172.30.1.205","TCP","54","135 > 40560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"474","0.248702","172.30.1.104","172.30.1.205","TCP","54","135 > 40560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"475","0.248707","172.30.1.205","172.30.1.104","TCP","54","40560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"476","0.248791","172.30.1.104","172.30.1.205","TCP","66","49671 > 33198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"477","0.248801","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"478","0.249157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"479","0.249814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"480","0.249823","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"481","0.251671","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"482","0.252123","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"483","0.252127","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"484","0.253507","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"485","0.255822","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"486","0.255834","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"487","0.256959","172.30.1.205","172.30.1.104","TCP","74","40564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903483 TSecr=0 WS=128" +"488","0.257373","172.30.1.104","172.30.1.205","TCP","66","135 > 40564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"489","0.257387","172.30.1.205","172.30.1.104","TCP","54","40564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"490","0.257756","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"491","0.258051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"492","0.258060","172.30.1.205","172.30.1.104","TCP","54","40564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"493","0.260256","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"494","0.260698","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"495","0.260706","172.30.1.205","172.30.1.104","TCP","54","40564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"496","0.262543","172.30.1.205","172.30.1.104","TCP","54","40564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"497","0.262658","172.30.1.205","172.30.1.104","TCP","74","33202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903489 TSecr=0 WS=128" +"498","0.262855","172.30.1.104","172.30.1.205","TCP","54","135 > 40564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"499","0.262864","172.30.1.104","172.30.1.205","TCP","54","135 > 40564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"500","0.262870","172.30.1.205","172.30.1.104","TCP","54","40564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"501","0.262966","172.30.1.104","172.30.1.205","TCP","66","49671 > 33202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"502","0.262981","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"503","0.263369","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"504","0.263659","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"505","0.263668","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"506","0.265593","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"507","0.266026","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"508","0.266034","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"509","0.267446","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"510","0.271225","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"511","0.271237","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"512","0.272213","172.30.1.205","172.30.1.104","TCP","74","40568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903498 TSecr=0 WS=128" +"513","0.272502","172.30.1.104","172.30.1.205","TCP","66","135 > 40568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"514","0.272513","172.30.1.205","172.30.1.104","TCP","54","40568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"515","0.272886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"516","0.273162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"517","0.273171","172.30.1.205","172.30.1.104","TCP","54","40568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"518","0.275350","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"519","0.275729","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"520","0.275736","172.30.1.205","172.30.1.104","TCP","54","40568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"521","0.277550","172.30.1.205","172.30.1.104","TCP","54","40568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"522","0.277660","172.30.1.205","172.30.1.104","TCP","74","33206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903504 TSecr=0 WS=128" +"523","0.277794","172.30.1.104","172.30.1.205","TCP","54","135 > 40568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"524","0.277829","172.30.1.104","172.30.1.205","TCP","54","135 > 40568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"525","0.277835","172.30.1.205","172.30.1.104","TCP","54","40568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"526","0.277925","172.30.1.104","172.30.1.205","TCP","66","49671 > 33206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"527","0.277933","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"528","0.278275","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"529","0.278543","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"530","0.278552","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"531","0.280398","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"532","0.280905","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"533","0.280913","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"534","0.282281","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"535","0.284348","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"536","0.284360","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"537","0.285353","172.30.1.205","172.30.1.104","TCP","74","40572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903511 TSecr=0 WS=128" +"538","0.285667","172.30.1.104","172.30.1.205","TCP","66","135 > 40572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"539","0.285678","172.30.1.205","172.30.1.104","TCP","54","40572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"540","0.286024","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"541","0.286306","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"542","0.286315","172.30.1.205","172.30.1.104","TCP","54","40572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"543","0.288478","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"544","0.288909","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"545","0.288916","172.30.1.205","172.30.1.104","TCP","54","40572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"546","0.290723","172.30.1.205","172.30.1.104","TCP","54","40572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"547","0.290839","172.30.1.205","172.30.1.104","TCP","74","33210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903517 TSecr=0 WS=128" +"548","0.291013","172.30.1.104","172.30.1.205","TCP","54","135 > 40572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"549","0.291023","172.30.1.104","172.30.1.205","TCP","54","135 > 40572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"550","0.291028","172.30.1.205","172.30.1.104","TCP","54","40572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"551","0.291187","172.30.1.104","172.30.1.205","TCP","66","49671 > 33210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"552","0.291196","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"553","0.291538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"554","0.291839","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"555","0.291848","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"556","0.293747","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"557","0.294105","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"558","0.294111","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"559","0.295446","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"560","0.297564","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"561","0.297574","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"562","0.298510","172.30.1.205","172.30.1.104","TCP","74","40576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903524 TSecr=0 WS=128" +"563","0.298796","172.30.1.104","172.30.1.205","TCP","66","135 > 40576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"564","0.298806","172.30.1.205","172.30.1.104","TCP","54","40576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"565","0.299151","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"566","0.299455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"567","0.299464","172.30.1.205","172.30.1.104","TCP","54","40576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"568","0.301659","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"569","0.302065","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"570","0.302072","172.30.1.205","172.30.1.104","TCP","54","40576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"571","0.303873","172.30.1.205","172.30.1.104","TCP","54","40576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"572","0.303984","172.30.1.205","172.30.1.104","TCP","74","33214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903530 TSecr=0 WS=128" +"573","0.304193","172.30.1.104","172.30.1.205","TCP","54","135 > 40576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"574","0.304201","172.30.1.104","172.30.1.205","TCP","54","135 > 40576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"575","0.304207","172.30.1.205","172.30.1.104","TCP","54","40576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"576","0.305772","172.30.1.104","172.30.1.205","TCP","66","49671 > 33214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"577","0.305782","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"578","0.306133","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"579","0.306405","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"580","0.306414","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"581","0.308283","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"582","0.308634","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"583","0.308640","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"584","0.309999","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"585","0.312051","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"586","0.312062","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"587","0.313024","172.30.1.205","172.30.1.104","TCP","74","40580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903539 TSecr=0 WS=128" +"588","0.313321","172.30.1.104","172.30.1.205","TCP","66","135 > 40580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"589","0.313337","172.30.1.205","172.30.1.104","TCP","54","40580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"590","0.313741","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"591","0.314021","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"592","0.314031","172.30.1.205","172.30.1.104","TCP","54","40580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"593","0.316246","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"594","0.316671","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"595","0.316678","172.30.1.205","172.30.1.104","TCP","54","40580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"596","0.318508","172.30.1.205","172.30.1.104","TCP","54","40580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"597","0.318623","172.30.1.205","172.30.1.104","TCP","74","33218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903545 TSecr=0 WS=128" +"598","0.318825","172.30.1.104","172.30.1.205","TCP","54","135 > 40580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"599","0.318835","172.30.1.104","172.30.1.205","TCP","54","135 > 40580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"600","0.318840","172.30.1.205","172.30.1.104","TCP","54","40580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"601","0.318918","172.30.1.104","172.30.1.205","TCP","66","49671 > 33218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"602","0.318927","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"603","0.319271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"604","0.319617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"605","0.319626","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"606","0.321541","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"607","0.321867","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"608","0.321872","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"609","0.323221","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"610","0.325267","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"611","0.325277","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"612","0.326226","172.30.1.205","172.30.1.104","TCP","74","40584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903552 TSecr=0 WS=128" +"613","0.326513","172.30.1.104","172.30.1.205","TCP","66","135 > 40584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"614","0.326527","172.30.1.205","172.30.1.104","TCP","54","40584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"615","0.326889","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"616","0.327304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"617","0.327314","172.30.1.205","172.30.1.104","TCP","54","40584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"618","0.329532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"619","0.329898","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"620","0.329905","172.30.1.205","172.30.1.104","TCP","54","40584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"621","0.331703","172.30.1.205","172.30.1.104","TCP","54","40584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"622","0.331815","172.30.1.205","172.30.1.104","TCP","74","33222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903558 TSecr=0 WS=128" +"623","0.331969","172.30.1.104","172.30.1.205","TCP","54","135 > 40584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"624","0.331999","172.30.1.104","172.30.1.205","TCP","54","135 > 40584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"625","0.332004","172.30.1.205","172.30.1.104","TCP","54","40584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"626","0.332122","172.30.1.104","172.30.1.205","TCP","66","49671 > 33222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"627","0.332130","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"628","0.332472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"629","0.332731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"630","0.332742","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"631","0.334621","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"632","0.335019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"633","0.335026","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"634","0.336385","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"635","0.338834","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"636","0.338841","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"637","0.339781","172.30.1.205","172.30.1.104","TCP","74","40588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903566 TSecr=0 WS=128" +"638","0.340114","172.30.1.104","172.30.1.205","TCP","66","135 > 40588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"639","0.340125","172.30.1.205","172.30.1.104","TCP","54","40588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"640","0.340469","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"641","0.340748","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"642","0.340757","172.30.1.205","172.30.1.104","TCP","54","40588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"643","0.342932","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"644","0.343303","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"645","0.343310","172.30.1.205","172.30.1.104","TCP","54","40588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"646","0.345123","172.30.1.205","172.30.1.104","TCP","54","40588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"647","0.345233","172.30.1.205","172.30.1.104","TCP","74","33226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903571 TSecr=0 WS=128" +"648","0.345370","172.30.1.104","172.30.1.205","TCP","54","135 > 40588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"649","0.345408","172.30.1.104","172.30.1.205","TCP","54","135 > 40588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"650","0.345414","172.30.1.205","172.30.1.104","TCP","54","40588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"651","0.345511","172.30.1.104","172.30.1.205","TCP","66","49671 > 33226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"652","0.345520","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"653","0.345865","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"654","0.346117","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"655","0.346126","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"656","0.347975","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"657","0.348313","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"658","0.348319","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"659","0.349700","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"660","0.351690","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"661","0.351699","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"662","0.352639","172.30.1.205","172.30.1.104","TCP","74","40592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903579 TSecr=0 WS=128" +"663","0.352916","172.30.1.104","172.30.1.205","TCP","66","135 > 40592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"664","0.352930","172.30.1.205","172.30.1.104","TCP","54","40592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"665","0.353318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"666","0.353656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"667","0.353665","172.30.1.205","172.30.1.104","TCP","54","40592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"668","0.355847","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"669","0.356198","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"670","0.356205","172.30.1.205","172.30.1.104","TCP","54","40592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"671","0.358031","172.30.1.205","172.30.1.104","TCP","54","40592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"672","0.358143","172.30.1.205","172.30.1.104","TCP","74","33230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903584 TSecr=0 WS=128" +"673","0.358295","172.30.1.104","172.30.1.205","TCP","54","135 > 40592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"674","0.358312","172.30.1.104","172.30.1.205","TCP","54","135 > 40592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"675","0.358318","172.30.1.205","172.30.1.104","TCP","54","40592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"676","0.358424","172.30.1.104","172.30.1.205","TCP","66","49671 > 33230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"677","0.358433","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"678","0.358804","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"679","0.359069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"680","0.359078","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"681","0.360948","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"682","0.361335","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"683","0.361342","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"684","0.362667","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"685","0.364738","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"686","0.364751","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"687","0.365766","172.30.1.205","172.30.1.104","TCP","74","40596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903592 TSecr=0 WS=128" +"688","0.366100","172.30.1.104","172.30.1.205","TCP","66","135 > 40596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"689","0.366112","172.30.1.205","172.30.1.104","TCP","54","40596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"690","0.366465","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"691","0.366762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"692","0.366774","172.30.1.205","172.30.1.104","TCP","54","40596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"693","0.368995","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"694","0.369374","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"695","0.369381","172.30.1.205","172.30.1.104","TCP","54","40596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"696","0.371187","172.30.1.205","172.30.1.104","TCP","54","40596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"697","0.371300","172.30.1.205","172.30.1.104","TCP","74","33234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903597 TSecr=0 WS=128" +"698","0.371427","172.30.1.104","172.30.1.205","TCP","54","135 > 40596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"699","0.371459","172.30.1.104","172.30.1.205","TCP","54","135 > 40596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"700","0.371465","172.30.1.205","172.30.1.104","TCP","54","40596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"701","0.371576","172.30.1.104","172.30.1.205","TCP","66","49671 > 33234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"702","0.371585","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"703","0.371931","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"704","0.372198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"705","0.372207","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"706","0.374126","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"707","0.374473","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"708","0.374480","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"709","0.375833","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"710","0.378025","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"711","0.378035","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"712","0.378983","172.30.1.205","172.30.1.104","TCP","74","40600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903605 TSecr=0 WS=128" +"713","0.379276","172.30.1.104","172.30.1.205","TCP","66","135 > 40600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"714","0.379287","172.30.1.205","172.30.1.104","TCP","54","40600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"715","0.379633","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"716","0.379923","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"717","0.379932","172.30.1.205","172.30.1.104","TCP","54","40600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"718","0.382130","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"719","0.383157","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"720","0.383164","172.30.1.205","172.30.1.104","TCP","54","40600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"721","0.384985","172.30.1.205","172.30.1.104","TCP","54","40600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"722","0.385095","172.30.1.205","172.30.1.104","TCP","74","33238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903611 TSecr=0 WS=128" +"723","0.385228","172.30.1.104","172.30.1.205","TCP","54","135 > 40600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"724","0.385250","172.30.1.104","172.30.1.205","TCP","54","135 > 40600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"725","0.385256","172.30.1.205","172.30.1.104","TCP","54","40600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"726","0.385366","172.30.1.104","172.30.1.205","TCP","66","49671 > 33238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"727","0.385374","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"728","0.385733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"729","0.386286","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"730","0.386295","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"731","0.388133","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"732","0.389635","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"733","0.389643","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"734","0.390993","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"735","0.393201","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"736","0.393212","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"737","0.394153","172.30.1.205","172.30.1.104","TCP","74","40604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903620 TSecr=0 WS=128" +"738","0.394436","172.30.1.104","172.30.1.205","TCP","66","135 > 40604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"739","0.394447","172.30.1.205","172.30.1.104","TCP","54","40604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"740","0.394798","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"741","0.395098","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"742","0.395110","172.30.1.205","172.30.1.104","TCP","54","40604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"743","0.397344","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"744","0.397735","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"745","0.397742","172.30.1.205","172.30.1.104","TCP","54","40604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"746","0.398575","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"747","0.398624","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"748","0.398662","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"749","0.398698","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"750","0.398736","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"751","0.398767","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"752","0.398794","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"753","0.398825","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"754","0.398849","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"755","0.398877","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"756","0.398907","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"757","0.398972","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"758","0.399030","172.30.1.104","172.30.1.205","TCP","54","49671 > 33198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"759","0.399040","172.30.1.104","172.30.1.205","TCP","54","49671 > 33198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"760","0.399046","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"761","0.399052","172.30.1.104","172.30.1.205","TCP","54","49671 > 33202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"762","0.399060","172.30.1.104","172.30.1.205","TCP","54","49671 > 33202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"763","0.399063","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"764","0.399150","172.30.1.104","172.30.1.205","TCP","54","49671 > 33206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"765","0.399167","172.30.1.104","172.30.1.205","TCP","54","49671 > 33210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"766","0.399195","172.30.1.104","172.30.1.205","TCP","54","49671 > 33214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"767","0.399259","172.30.1.104","172.30.1.205","TCP","54","49671 > 33218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"768","0.399403","172.30.1.104","172.30.1.205","TCP","54","49671 > 33222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"769","0.399409","172.30.1.104","172.30.1.205","TCP","54","49671 > 33226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"770","0.399412","172.30.1.104","172.30.1.205","TCP","54","49671 > 33230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"771","0.399414","172.30.1.104","172.30.1.205","TCP","54","49671 > 33234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"772","0.399417","172.30.1.104","172.30.1.205","TCP","54","49671 > 33238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"773","0.399419","172.30.1.104","172.30.1.205","TCP","54","49671 > 33238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"774","0.399424","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"775","0.399431","172.30.1.104","172.30.1.205","TCP","54","49671 > 33234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"776","0.399433","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"777","0.399589","172.30.1.104","172.30.1.205","TCP","54","49671 > 33230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"778","0.399594","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"779","0.399600","172.30.1.104","172.30.1.205","TCP","54","49671 > 33226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"780","0.399602","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"781","0.399603","172.30.1.104","172.30.1.205","TCP","54","49671 > 33222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"782","0.399606","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"783","0.399611","172.30.1.104","172.30.1.205","TCP","54","49671 > 33218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"784","0.399613","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"785","0.399614","172.30.1.104","172.30.1.205","TCP","54","49671 > 33206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"786","0.399616","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"787","0.399617","172.30.1.104","172.30.1.205","TCP","54","49671 > 33210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"788","0.399619","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"789","0.399620","172.30.1.104","172.30.1.205","TCP","54","49671 > 33214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"790","0.399621","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"791","0.399705","172.30.1.104","172.30.1.205","TCP","54","49671 > 33194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"792","0.399823","172.30.1.104","172.30.1.205","TCP","54","49671 > 33194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"793","0.399827","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"794","0.400474","172.30.1.205","172.30.1.104","TCP","54","40604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"795","0.400585","172.30.1.205","172.30.1.104","TCP","74","33242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903627 TSecr=0 WS=128" +"796","0.400689","172.30.1.104","172.30.1.205","TCP","54","135 > 40604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"797","0.400710","172.30.1.104","172.30.1.205","TCP","54","135 > 40604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"798","0.400715","172.30.1.205","172.30.1.104","TCP","54","40604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"799","0.400839","172.30.1.104","172.30.1.205","TCP","66","49671 > 33242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"800","0.400848","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"801","0.401215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"802","0.401494","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"803","0.401501","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"804","0.403375","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"805","0.403795","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"806","0.403801","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"807","0.405198","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"808","0.410067","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"809","0.410078","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"810","0.411073","172.30.1.205","172.30.1.104","TCP","74","40608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903637 TSecr=0 WS=128" +"811","0.411387","172.30.1.104","172.30.1.205","TCP","66","135 > 40608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"812","0.411398","172.30.1.205","172.30.1.104","TCP","54","40608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"813","0.411753","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"814","0.412047","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"815","0.412056","172.30.1.205","172.30.1.104","TCP","54","40608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"816","0.414265","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"817","0.414676","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"818","0.414683","172.30.1.205","172.30.1.104","TCP","54","40608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"819","0.416495","172.30.1.205","172.30.1.104","TCP","54","40608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"820","0.416612","172.30.1.205","172.30.1.104","TCP","74","33246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903643 TSecr=0 WS=128" +"821","0.416730","172.30.1.104","172.30.1.205","TCP","54","135 > 40608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"822","0.416756","172.30.1.104","172.30.1.205","TCP","54","135 > 40608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"823","0.416762","172.30.1.205","172.30.1.104","TCP","54","40608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"824","0.416891","172.30.1.104","172.30.1.205","TCP","66","49671 > 33246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"825","0.416900","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"826","0.417243","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"827","0.417519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"828","0.417529","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"829","0.419414","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"830","0.419838","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"831","0.419845","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"832","0.421235","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"833","0.423384","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"834","0.423394","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"835","0.424341","172.30.1.205","172.30.1.104","TCP","74","40612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903650 TSecr=0 WS=128" +"836","0.424643","172.30.1.104","172.30.1.205","TCP","66","135 > 40612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"837","0.424655","172.30.1.205","172.30.1.104","TCP","54","40612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"838","0.425046","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"839","0.425304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"840","0.425314","172.30.1.205","172.30.1.104","TCP","54","40612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"841","0.427494","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"842","0.427839","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"843","0.427846","172.30.1.205","172.30.1.104","TCP","54","40612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"844","0.429668","172.30.1.205","172.30.1.104","TCP","54","40612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"845","0.429779","172.30.1.205","172.30.1.104","TCP","74","33250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903656 TSecr=0 WS=128" +"846","0.429972","172.30.1.104","172.30.1.205","TCP","54","135 > 40612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"847","0.429981","172.30.1.104","172.30.1.205","TCP","54","135 > 40612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"848","0.429986","172.30.1.205","172.30.1.104","TCP","54","40612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"849","0.430086","172.30.1.104","172.30.1.205","TCP","66","49671 > 33250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"850","0.430094","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"851","0.430437","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"852","0.430688","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"853","0.430697","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"854","0.432564","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"855","0.432958","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"856","0.432965","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"857","0.434317","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"858","0.436392","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"859","0.436407","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"860","0.437455","172.30.1.205","172.30.1.104","TCP","74","40616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903663 TSecr=0 WS=128" +"861","0.437738","172.30.1.104","172.30.1.205","TCP","66","135 > 40616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"862","0.437751","172.30.1.205","172.30.1.104","TCP","54","40616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"863","0.438117","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"864","0.438395","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"865","0.438410","172.30.1.205","172.30.1.104","TCP","54","40616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"866","0.440602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"867","0.441073","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"868","0.441081","172.30.1.205","172.30.1.104","TCP","54","40616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"869","0.442912","172.30.1.205","172.30.1.104","TCP","54","40616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"870","0.443030","172.30.1.205","172.30.1.104","TCP","74","33254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903669 TSecr=0 WS=128" +"871","0.443194","172.30.1.104","172.30.1.205","TCP","54","135 > 40616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"872","0.443244","172.30.1.104","172.30.1.205","TCP","54","135 > 40616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"873","0.443251","172.30.1.205","172.30.1.104","TCP","54","40616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"874","0.443352","172.30.1.104","172.30.1.205","TCP","66","49671 > 33254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"875","0.443362","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"876","0.443743","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"877","0.444016","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"878","0.444026","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"879","0.445935","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"880","0.446316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"881","0.446323","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"882","0.447662","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"883","0.449861","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"884","0.449871","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"885","0.450814","172.30.1.205","172.30.1.104","TCP","74","40620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903677 TSecr=0 WS=128" +"886","0.451096","172.30.1.104","172.30.1.205","TCP","66","135 > 40620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"887","0.451118","172.30.1.205","172.30.1.104","TCP","54","40620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"888","0.451461","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"889","0.451775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"890","0.451784","172.30.1.205","172.30.1.104","TCP","54","40620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"891","0.453976","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"892","0.454360","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"893","0.454366","172.30.1.205","172.30.1.104","TCP","54","40620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"894","0.456176","172.30.1.205","172.30.1.104","TCP","54","40620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"895","0.456288","172.30.1.205","172.30.1.104","TCP","74","33258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903682 TSecr=0 WS=128" +"896","0.456520","172.30.1.104","172.30.1.205","TCP","54","135 > 40620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"897","0.456528","172.30.1.104","172.30.1.205","TCP","54","135 > 40620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"898","0.456534","172.30.1.205","172.30.1.104","TCP","54","40620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"899","0.456578","172.30.1.104","172.30.1.205","TCP","66","49671 > 33258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"900","0.456590","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"901","0.456975","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"902","0.457239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"903","0.457247","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"904","0.459096","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"905","0.459491","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"906","0.459497","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"907","0.460863","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"908","0.462875","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"909","0.462885","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"910","0.463802","172.30.1.205","172.30.1.104","TCP","74","40624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903690 TSecr=0 WS=128" +"911","0.464062","172.30.1.104","172.30.1.205","TCP","66","135 > 40624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"912","0.464072","172.30.1.205","172.30.1.104","TCP","54","40624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"913","0.464415","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"914","0.464785","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"915","0.464794","172.30.1.205","172.30.1.104","TCP","54","40624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"916","0.466973","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"917","0.467396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"918","0.467403","172.30.1.205","172.30.1.104","TCP","54","40624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"919","0.469228","172.30.1.205","172.30.1.104","TCP","54","40624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"920","0.469337","172.30.1.205","172.30.1.104","TCP","74","33262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903695 TSecr=0 WS=128" +"921","0.469485","172.30.1.104","172.30.1.205","TCP","54","135 > 40624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"922","0.469494","172.30.1.104","172.30.1.205","TCP","54","135 > 40624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"923","0.469499","172.30.1.205","172.30.1.104","TCP","54","40624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"924","0.469598","172.30.1.104","172.30.1.205","TCP","66","49671 > 33262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"925","0.469607","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"926","0.469948","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"927","0.470201","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"928","0.470210","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"929","0.472108","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"930","0.472455","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"931","0.472461","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"932","0.473879","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"933","0.476876","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"934","0.476885","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"935","0.477860","172.30.1.205","172.30.1.104","TCP","74","40628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903704 TSecr=0 WS=128" +"936","0.478181","172.30.1.104","172.30.1.205","TCP","66","135 > 40628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"937","0.478191","172.30.1.205","172.30.1.104","TCP","54","40628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"938","0.478532","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"939","0.478807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"940","0.478816","172.30.1.205","172.30.1.104","TCP","54","40628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"941","0.481028","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"942","0.481458","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"943","0.481466","172.30.1.205","172.30.1.104","TCP","54","40628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"944","0.483278","172.30.1.205","172.30.1.104","TCP","54","40628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"945","0.483390","172.30.1.205","172.30.1.104","TCP","74","33266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903709 TSecr=0 WS=128" +"946","0.483620","172.30.1.104","172.30.1.205","TCP","54","135 > 40628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"947","0.483629","172.30.1.104","172.30.1.205","TCP","54","135 > 40628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"948","0.483634","172.30.1.205","172.30.1.104","TCP","54","40628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"949","0.483765","172.30.1.104","172.30.1.205","TCP","66","49671 > 33266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"950","0.483778","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"951","0.484133","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"952","0.484426","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"953","0.484436","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"954","0.486344","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"955","0.486715","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"956","0.486721","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"957","0.488069","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"958","0.490232","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"959","0.490241","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"960","0.491206","172.30.1.205","172.30.1.104","TCP","74","40632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903717 TSecr=0 WS=128" +"961","0.491488","172.30.1.104","172.30.1.205","TCP","66","135 > 40632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"962","0.491499","172.30.1.205","172.30.1.104","TCP","54","40632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"963","0.491845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"964","0.492112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"965","0.492120","172.30.1.205","172.30.1.104","TCP","54","40632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"966","0.494327","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"967","0.494737","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"968","0.494744","172.30.1.205","172.30.1.104","TCP","54","40632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"969","0.496546","172.30.1.205","172.30.1.104","TCP","54","40632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"970","0.496658","172.30.1.205","172.30.1.104","TCP","74","33270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903723 TSecr=0 WS=128" +"971","0.496825","172.30.1.104","172.30.1.205","TCP","54","135 > 40632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"972","0.496874","172.30.1.104","172.30.1.205","TCP","54","135 > 40632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"973","0.496881","172.30.1.205","172.30.1.104","TCP","54","40632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"974","0.496963","172.30.1.104","172.30.1.205","TCP","66","49671 > 33270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"975","0.496971","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"976","0.497319","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"977","0.497581","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"978","0.497590","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"979","0.499488","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"980","0.499853","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"981","0.499860","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"982","0.501239","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"983","0.504245","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"984","0.504257","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"985","0.505263","172.30.1.205","172.30.1.104","TCP","74","40636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903731 TSecr=0 WS=128" +"986","0.505568","172.30.1.104","172.30.1.205","TCP","66","135 > 40636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"987","0.505580","172.30.1.205","172.30.1.104","TCP","54","40636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"988","0.505930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"989","0.506246","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"990","0.506255","172.30.1.205","172.30.1.104","TCP","54","40636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"991","0.508426","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"992","0.508933","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"993","0.508940","172.30.1.205","172.30.1.104","TCP","54","40636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"994","0.510753","172.30.1.205","172.30.1.104","TCP","54","40636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"995","0.510865","172.30.1.205","172.30.1.104","TCP","74","33274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903737 TSecr=0 WS=128" +"996","0.511055","172.30.1.104","172.30.1.205","TCP","54","135 > 40636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"997","0.511064","172.30.1.104","172.30.1.205","TCP","54","135 > 40636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"998","0.511070","172.30.1.205","172.30.1.104","TCP","54","40636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"999","0.511146","172.30.1.104","172.30.1.205","TCP","66","49671 > 33274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1000","0.511155","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1001","0.511496","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1002","0.511830","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1003","0.511840","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1004","0.513746","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1005","0.514147","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1006","0.514153","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1007","0.515475","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1008","0.518371","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1009","0.518380","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1010","0.519318","172.30.1.205","172.30.1.104","TCP","74","40640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903745 TSecr=0 WS=128" +"1011","0.519625","172.30.1.104","172.30.1.205","TCP","66","135 > 40640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1012","0.519636","172.30.1.205","172.30.1.104","TCP","54","40640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1013","0.519976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1014","0.520255","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1015","0.520263","172.30.1.205","172.30.1.104","TCP","54","40640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1016","0.522447","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1017","0.522822","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1018","0.522828","172.30.1.205","172.30.1.104","TCP","54","40640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1019","0.524620","172.30.1.205","172.30.1.104","TCP","54","40640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1020","0.524728","172.30.1.205","172.30.1.104","TCP","74","33278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903751 TSecr=0 WS=128" +"1021","0.524893","172.30.1.104","172.30.1.205","TCP","54","135 > 40640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1022","0.524902","172.30.1.104","172.30.1.205","TCP","54","135 > 40640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1023","0.524907","172.30.1.205","172.30.1.104","TCP","54","40640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1024","0.525028","172.30.1.104","172.30.1.205","TCP","66","49671 > 33278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1025","0.525036","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1026","0.525388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1027","0.525662","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1028","0.525671","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1029","0.527523","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1030","0.527962","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1031","0.527969","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1032","0.529323","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1033","0.531870","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1034","0.531881","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1035","0.532831","172.30.1.205","172.30.1.104","TCP","74","40644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903759 TSecr=0 WS=128" +"1036","0.533090","172.30.1.104","172.30.1.205","TCP","66","135 > 40644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1037","0.533101","172.30.1.205","172.30.1.104","TCP","54","40644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1038","0.533456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1039","0.533702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1040","0.533711","172.30.1.205","172.30.1.104","TCP","54","40644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1041","0.535872","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1042","0.536234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1043","0.536241","172.30.1.205","172.30.1.104","TCP","54","40644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1044","0.538048","172.30.1.205","172.30.1.104","TCP","54","40644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1045","0.538157","172.30.1.205","172.30.1.104","TCP","74","33282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903764 TSecr=0 WS=128" +"1046","0.538282","172.30.1.104","172.30.1.205","TCP","54","135 > 40644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1047","0.538312","172.30.1.104","172.30.1.205","TCP","54","135 > 40644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1048","0.538318","172.30.1.205","172.30.1.104","TCP","54","40644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1049","0.538435","172.30.1.104","172.30.1.205","TCP","66","49671 > 33282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1050","0.538443","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1051","0.538793","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1052","0.539063","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1053","0.539072","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1054","0.540959","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1055","0.541325","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1056","0.541330","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1057","0.542650","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1058","0.544787","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1059","0.544796","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1060","0.545727","172.30.1.205","172.30.1.104","TCP","74","40648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903772 TSecr=0 WS=128" +"1061","0.546013","172.30.1.104","172.30.1.205","TCP","66","135 > 40648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1062","0.546023","172.30.1.205","172.30.1.104","TCP","54","40648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1063","0.546365","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1064","0.546653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1065","0.546665","172.30.1.205","172.30.1.104","TCP","54","40648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1066","0.548839","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1067","0.549196","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1068","0.549203","172.30.1.205","172.30.1.104","TCP","54","40648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1069","0.550988","172.30.1.205","172.30.1.104","TCP","54","40648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1070","0.551097","172.30.1.205","172.30.1.104","TCP","74","33286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903777 TSecr=0 WS=128" +"1071","0.551292","172.30.1.104","172.30.1.205","TCP","54","135 > 40648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1072","0.551301","172.30.1.104","172.30.1.205","TCP","54","135 > 40648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1073","0.551306","172.30.1.205","172.30.1.104","TCP","54","40648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1074","0.551389","172.30.1.104","172.30.1.205","TCP","66","49671 > 33286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1075","0.551398","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1076","0.551734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1077","0.552024","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1078","0.552032","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1079","0.553908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1080","0.554279","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1081","0.554285","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1082","0.555606","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1083","0.558494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1084","0.558504","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1085","0.559435","172.30.1.205","172.30.1.104","TCP","74","40652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903785 TSecr=0 WS=128" +"1086","0.559724","172.30.1.104","172.30.1.205","TCP","66","135 > 40652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1087","0.559734","172.30.1.205","172.30.1.104","TCP","54","40652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1088","0.560088","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1089","0.560380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1090","0.560388","172.30.1.205","172.30.1.104","TCP","54","40652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1091","0.562574","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1092","0.563032","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1093","0.563038","172.30.1.205","172.30.1.104","TCP","54","40652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1094","0.563867","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1095","0.563916","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1096","0.563947","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1097","0.563975","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1098","0.564006","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1099","0.564040","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1100","0.564071","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1101","0.564112","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1102","0.564138","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1103","0.564164","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1104","0.564189","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1105","0.564254","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1106","0.564577","172.30.1.104","172.30.1.205","TCP","54","49671 > 33246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1107","0.564679","172.30.1.104","172.30.1.205","TCP","54","49671 > 33250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1108","0.564696","172.30.1.104","172.30.1.205","TCP","54","49671 > 33254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1109","0.564717","172.30.1.104","172.30.1.205","TCP","54","49671 > 33258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1110","0.564737","172.30.1.104","172.30.1.205","TCP","54","49671 > 33262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1111","0.564829","172.30.1.104","172.30.1.205","TCP","54","49671 > 33266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1112","0.564862","172.30.1.104","172.30.1.205","TCP","54","49671 > 33270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1113","0.564885","172.30.1.104","172.30.1.205","TCP","54","49671 > 33274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1114","0.564905","172.30.1.104","172.30.1.205","TCP","54","49671 > 33278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1115","0.564946","172.30.1.104","172.30.1.205","TCP","54","49671 > 33282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1116","0.564979","172.30.1.104","172.30.1.205","TCP","54","49671 > 33286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1117","0.565003","172.30.1.104","172.30.1.205","TCP","54","49671 > 33242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1118","0.565035","172.30.1.104","172.30.1.205","TCP","54","49671 > 33242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1119","0.565042","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1120","0.565057","172.30.1.104","172.30.1.205","TCP","54","49671 > 33286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1121","0.565059","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1122","0.565110","172.30.1.104","172.30.1.205","TCP","54","49671 > 33282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1123","0.565113","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1124","0.565129","172.30.1.104","172.30.1.205","TCP","54","49671 > 33278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1125","0.565131","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1126","0.565190","172.30.1.104","172.30.1.205","TCP","54","49671 > 33274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1127","0.565193","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1128","0.565209","172.30.1.104","172.30.1.205","TCP","54","49671 > 33270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1129","0.565212","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1130","0.565279","172.30.1.104","172.30.1.205","TCP","54","49671 > 33266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1131","0.565283","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1132","0.565305","172.30.1.104","172.30.1.205","TCP","54","49671 > 33262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1133","0.565308","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1134","0.565332","172.30.1.104","172.30.1.205","TCP","54","49671 > 33258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1135","0.565335","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1136","0.565353","172.30.1.104","172.30.1.205","TCP","54","49671 > 33246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1137","0.565356","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1138","0.565377","172.30.1.104","172.30.1.205","TCP","54","49671 > 33250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1139","0.565381","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1140","0.565798","172.30.1.205","172.30.1.104","TCP","54","40652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1141","0.565815","172.30.1.104","172.30.1.205","TCP","54","49671 > 33254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1142","0.565820","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1143","0.565926","172.30.1.205","172.30.1.104","TCP","74","33290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903792 TSecr=0 WS=128" +"1144","0.566136","172.30.1.104","172.30.1.205","TCP","54","135 > 40652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1145","0.566183","172.30.1.104","172.30.1.205","TCP","54","135 > 40652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1146","0.566188","172.30.1.205","172.30.1.104","TCP","54","40652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1147","0.566288","172.30.1.104","172.30.1.205","TCP","66","49671 > 33290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1148","0.566296","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1149","0.566641","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1150","0.567399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1151","0.567414","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1152","0.569400","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1153","0.569819","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1154","0.569826","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1155","0.571192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1156","0.573420","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1157","0.573432","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1158","0.574396","172.30.1.205","172.30.1.104","TCP","74","40656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903800 TSecr=0 WS=128" +"1159","0.574696","172.30.1.104","172.30.1.205","TCP","66","135 > 40656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1160","0.574709","172.30.1.205","172.30.1.104","TCP","54","40656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1161","0.575079","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1162","0.575373","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1163","0.575383","172.30.1.205","172.30.1.104","TCP","54","40656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1164","0.577592","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1165","0.578017","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1166","0.578026","172.30.1.205","172.30.1.104","TCP","54","40656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1167","0.579898","172.30.1.205","172.30.1.104","TCP","54","40656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1168","0.580016","172.30.1.205","172.30.1.104","TCP","74","33294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903806 TSecr=0 WS=128" +"1169","0.580162","172.30.1.104","172.30.1.205","TCP","54","135 > 40656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1170","0.580174","172.30.1.104","172.30.1.205","TCP","54","135 > 40656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1171","0.580180","172.30.1.205","172.30.1.104","TCP","54","40656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1172","0.580308","172.30.1.104","172.30.1.205","TCP","66","49671 > 33294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1173","0.580317","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1174","0.580662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1175","0.580965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1176","0.580974","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1177","0.582854","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1178","0.583212","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1179","0.583218","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1180","0.584556","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1181","0.587555","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1182","0.587564","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1183","0.588517","172.30.1.205","172.30.1.104","TCP","74","40660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903814 TSecr=0 WS=128" +"1184","0.588859","172.30.1.104","172.30.1.205","TCP","66","135 > 40660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1185","0.588871","172.30.1.205","172.30.1.104","TCP","54","40660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1186","0.589227","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1187","0.589627","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1188","0.589636","172.30.1.205","172.30.1.104","TCP","54","40660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1189","0.591792","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1190","0.592187","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1191","0.592193","172.30.1.205","172.30.1.104","TCP","54","40660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1192","0.594061","172.30.1.205","172.30.1.104","TCP","54","40660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1193","0.594169","172.30.1.205","172.30.1.104","TCP","74","33298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903820 TSecr=0 WS=128" +"1194","0.594319","172.30.1.104","172.30.1.205","TCP","54","135 > 40660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1195","0.594379","172.30.1.104","172.30.1.205","TCP","54","135 > 40660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1196","0.594384","172.30.1.205","172.30.1.104","TCP","54","40660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1197","0.594457","172.30.1.104","172.30.1.205","TCP","66","49671 > 33298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1198","0.594465","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1199","0.594809","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1200","0.595102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1201","0.595109","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1202","0.596969","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1203","0.597337","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1204","0.597343","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1205","0.598672","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1206","0.600850","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1207","0.600860","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1208","0.601835","172.30.1.205","172.30.1.104","TCP","74","40664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903828 TSecr=0 WS=128" +"1209","0.602121","172.30.1.104","172.30.1.205","TCP","66","135 > 40664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1210","0.602131","172.30.1.205","172.30.1.104","TCP","54","40664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1211","0.602473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1212","0.602753","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1213","0.602761","172.30.1.205","172.30.1.104","TCP","54","40664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1214","0.604953","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1215","0.605381","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1216","0.605388","172.30.1.205","172.30.1.104","TCP","54","40664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1217","0.607175","172.30.1.205","172.30.1.104","TCP","54","40664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1218","0.607285","172.30.1.205","172.30.1.104","TCP","74","33302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903833 TSecr=0 WS=128" +"1219","0.607455","172.30.1.104","172.30.1.205","TCP","54","135 > 40664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1220","0.607464","172.30.1.104","172.30.1.205","TCP","54","135 > 40664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1221","0.607469","172.30.1.205","172.30.1.104","TCP","54","40664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1222","0.607669","172.30.1.104","172.30.1.205","TCP","66","49671 > 33302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1223","0.607677","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1224","0.608027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1225","0.608335","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1226","0.608343","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1227","0.610222","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1228","0.610569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1229","0.610576","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1230","0.611900","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1231","0.614070","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1232","0.614079","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1233","0.615020","172.30.1.205","172.30.1.104","TCP","74","40668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903841 TSecr=0 WS=128" +"1234","0.615313","172.30.1.104","172.30.1.205","TCP","66","135 > 40668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1235","0.615324","172.30.1.205","172.30.1.104","TCP","54","40668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1236","0.615665","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1237","0.615954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1238","0.615963","172.30.1.205","172.30.1.104","TCP","54","40668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1239","0.618143","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1240","0.618512","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1241","0.618519","172.30.1.205","172.30.1.104","TCP","54","40668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1242","0.620309","172.30.1.205","172.30.1.104","TCP","54","40668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1243","0.620417","172.30.1.205","172.30.1.104","TCP","74","33306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903846 TSecr=0 WS=128" +"1244","0.620582","172.30.1.104","172.30.1.205","TCP","54","135 > 40668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1245","0.620591","172.30.1.104","172.30.1.205","TCP","54","135 > 40668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1246","0.620596","172.30.1.205","172.30.1.104","TCP","54","40668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1247","0.620672","172.30.1.104","172.30.1.205","TCP","66","49671 > 33306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1248","0.620680","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1249","0.621047","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1250","0.621370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1251","0.621379","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1252","0.623225","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1253","0.623589","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1254","0.623595","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1255","0.624949","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1256","0.627167","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1257","0.627178","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1258","0.628121","172.30.1.205","172.30.1.104","TCP","74","40672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903854 TSecr=0 WS=128" +"1259","0.628413","172.30.1.104","172.30.1.205","TCP","66","135 > 40672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1260","0.628424","172.30.1.205","172.30.1.104","TCP","54","40672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1261","0.628765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1262","0.629035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1263","0.629044","172.30.1.205","172.30.1.104","TCP","54","40672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1264","0.631196","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1265","0.631668","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1266","0.631676","172.30.1.205","172.30.1.104","TCP","54","40672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1267","0.633509","172.30.1.205","172.30.1.104","TCP","54","40672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1268","0.633617","172.30.1.205","172.30.1.104","TCP","74","33310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903860 TSecr=0 WS=128" +"1269","0.633737","172.30.1.104","172.30.1.205","TCP","54","135 > 40672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1270","0.633777","172.30.1.104","172.30.1.205","TCP","54","135 > 40672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1271","0.633782","172.30.1.205","172.30.1.104","TCP","54","40672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1272","0.633897","172.30.1.104","172.30.1.205","TCP","66","49671 > 33310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1273","0.633906","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1274","0.634245","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1275","0.634561","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1276","0.634570","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1277","0.636445","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1278","0.636829","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1279","0.636838","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1280","0.638251","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1281","0.640325","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1282","0.640336","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1283","0.641315","172.30.1.205","172.30.1.104","TCP","74","40676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903867 TSecr=0 WS=128" +"1284","0.641628","172.30.1.104","172.30.1.205","TCP","66","135 > 40676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1285","0.641640","172.30.1.205","172.30.1.104","TCP","54","40676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1286","0.641991","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1287","0.642334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1288","0.642343","172.30.1.205","172.30.1.104","TCP","54","40676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1289","0.644557","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1290","0.644985","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1291","0.644993","172.30.1.205","172.30.1.104","TCP","54","40676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1292","0.646809","172.30.1.205","172.30.1.104","TCP","54","40676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1293","0.646922","172.30.1.205","172.30.1.104","TCP","74","33314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903873 TSecr=0 WS=128" +"1294","0.647101","172.30.1.104","172.30.1.205","TCP","54","135 > 40676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1295","0.647176","172.30.1.104","172.30.1.205","TCP","54","135 > 40676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1296","0.647181","172.30.1.205","172.30.1.104","TCP","54","40676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1297","0.647279","172.30.1.104","172.30.1.205","TCP","66","49671 > 33314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1298","0.647289","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1299","0.647634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1300","0.647936","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1301","0.647945","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1302","0.649868","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1303","0.650281","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1304","0.650287","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1305","0.651633","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1306","0.654040","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1307","0.654050","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1308","0.654997","172.30.1.205","172.30.1.104","TCP","74","40680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903881 TSecr=0 WS=128" +"1309","0.655364","172.30.1.104","172.30.1.205","TCP","66","135 > 40680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1310","0.655377","172.30.1.205","172.30.1.104","TCP","54","40680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1311","0.655735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1312","0.656025","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1313","0.656034","172.30.1.205","172.30.1.104","TCP","54","40680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1314","0.658242","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1315","0.658635","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1316","0.658641","172.30.1.205","172.30.1.104","TCP","54","40680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1317","0.660443","172.30.1.205","172.30.1.104","TCP","54","40680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1318","0.660554","172.30.1.205","172.30.1.104","TCP","74","33318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903886 TSecr=0 WS=128" +"1319","0.660717","172.30.1.104","172.30.1.205","TCP","54","135 > 40680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1320","0.660758","172.30.1.104","172.30.1.205","TCP","54","135 > 40680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1321","0.660764","172.30.1.205","172.30.1.104","TCP","54","40680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1322","0.660876","172.30.1.104","172.30.1.205","TCP","66","49671 > 33318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1323","0.660886","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1324","0.661239","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1325","0.661538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1326","0.661547","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1327","0.663389","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1328","0.663808","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1329","0.663815","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1330","0.665229","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1331","0.668554","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1332","0.668569","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1333","0.669616","172.30.1.205","172.30.1.104","TCP","74","40684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903896 TSecr=0 WS=128" +"1334","0.669921","172.30.1.104","172.30.1.205","TCP","66","135 > 40684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1335","0.669932","172.30.1.205","172.30.1.104","TCP","54","40684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1336","0.670289","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1337","0.670608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1338","0.670621","172.30.1.205","172.30.1.104","TCP","54","40684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1339","0.672890","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1340","0.673316","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1341","0.673323","172.30.1.205","172.30.1.104","TCP","54","40684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1342","0.675134","172.30.1.205","172.30.1.104","TCP","54","40684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1343","0.675251","172.30.1.205","172.30.1.104","TCP","74","33322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903901 TSecr=0 WS=128" +"1344","0.675417","172.30.1.104","172.30.1.205","TCP","54","135 > 40684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1345","0.675442","172.30.1.104","172.30.1.205","TCP","54","135 > 40684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1346","0.675448","172.30.1.205","172.30.1.104","TCP","54","40684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1347","0.675550","172.30.1.104","172.30.1.205","TCP","66","49671 > 33322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1348","0.675559","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1349","0.675902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1350","0.676208","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1351","0.676217","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1352","0.678113","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1353","0.678500","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1354","0.678505","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1355","0.679842","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1356","0.682423","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1357","0.682435","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1358","0.683402","172.30.1.205","172.30.1.104","TCP","74","40688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903909 TSecr=0 WS=128" +"1359","0.683750","172.30.1.104","172.30.1.205","TCP","66","135 > 40688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1360","0.683760","172.30.1.205","172.30.1.104","TCP","54","40688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1361","0.684110","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1362","0.684414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1363","0.684425","172.30.1.205","172.30.1.104","TCP","54","40688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1364","0.686649","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1365","0.687061","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1366","0.687068","172.30.1.205","172.30.1.104","TCP","54","40688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1367","0.688891","172.30.1.205","172.30.1.104","TCP","54","40688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1368","0.689001","172.30.1.205","172.30.1.104","TCP","74","33326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903915 TSecr=0 WS=128" +"1369","0.689164","172.30.1.104","172.30.1.205","TCP","54","135 > 40688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1370","0.689188","172.30.1.104","172.30.1.205","TCP","54","135 > 40688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1371","0.689194","172.30.1.205","172.30.1.104","TCP","54","40688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1372","0.689327","172.30.1.104","172.30.1.205","TCP","66","49671 > 33326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1373","0.689336","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1374","0.689679","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1375","0.689969","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1376","0.689977","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1377","0.691818","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1378","0.692177","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1379","0.692181","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1380","0.693549","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1381","0.696816","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1382","0.696829","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1383","0.697809","172.30.1.205","172.30.1.104","TCP","74","40692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903924 TSecr=0 WS=128" +"1384","0.698119","172.30.1.104","172.30.1.205","TCP","66","135 > 40692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1385","0.698133","172.30.1.205","172.30.1.104","TCP","54","40692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1386","0.698497","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1387","0.698807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1388","0.698819","172.30.1.205","172.30.1.104","TCP","54","40692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1389","0.701065","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1390","0.701484","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1391","0.701491","172.30.1.205","172.30.1.104","TCP","54","40692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1392","0.703281","172.30.1.205","172.30.1.104","TCP","54","40692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1393","0.703391","172.30.1.205","172.30.1.104","TCP","74","33330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903929 TSecr=0 WS=128" +"1394","0.703591","172.30.1.104","172.30.1.205","TCP","54","135 > 40692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1395","0.703639","172.30.1.104","172.30.1.205","TCP","54","135 > 40692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1396","0.703644","172.30.1.205","172.30.1.104","TCP","54","40692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1397","0.703766","172.30.1.104","172.30.1.205","TCP","66","49671 > 33330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1398","0.703774","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1399","0.704134","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1400","0.704479","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1401","0.704488","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1402","0.706364","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1403","0.706834","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1404","0.706840","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1405","0.708194","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1406","0.710316","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1407","0.710326","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1408","0.711253","172.30.1.205","172.30.1.104","TCP","74","40696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903937 TSecr=0 WS=128" +"1409","0.711574","172.30.1.104","172.30.1.205","TCP","66","135 > 40696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1410","0.711588","172.30.1.205","172.30.1.104","TCP","54","40696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1411","0.711930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1412","0.712245","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1413","0.712254","172.30.1.205","172.30.1.104","TCP","54","40696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1414","0.714435","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1415","0.714838","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1416","0.714845","172.30.1.205","172.30.1.104","TCP","54","40696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1417","0.716642","172.30.1.205","172.30.1.104","TCP","54","40696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1418","0.716754","172.30.1.205","172.30.1.104","TCP","74","33334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903943 TSecr=0 WS=128" +"1419","0.716968","172.30.1.104","172.30.1.205","TCP","54","135 > 40696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1420","0.716994","172.30.1.104","172.30.1.205","TCP","54","135 > 40696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1421","0.717000","172.30.1.205","172.30.1.104","TCP","54","40696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1422","0.717121","172.30.1.104","172.30.1.205","TCP","66","49671 > 33334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1423","0.717129","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1424","0.717474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1425","0.717818","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1426","0.717826","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1427","0.719652","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1428","0.722192","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1429","0.722197","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1430","0.723539","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1431","0.725893","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1432","0.725903","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1433","0.726859","172.30.1.205","172.30.1.104","TCP","74","40700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903953 TSecr=0 WS=128" +"1434","0.727236","172.30.1.104","172.30.1.205","TCP","66","135 > 40700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1435","0.727247","172.30.1.205","172.30.1.104","TCP","54","40700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1436","0.727595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1437","0.727953","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1438","0.727962","172.30.1.205","172.30.1.104","TCP","54","40700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1439","0.730140","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1440","0.730568","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1441","0.730575","172.30.1.205","172.30.1.104","TCP","54","40700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1442","0.731405","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1443","0.731451","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1444","0.731482","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1445","0.731512","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1446","0.731540","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1447","0.731565","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1448","0.731593","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1449","0.731621","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1450","0.731647","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1451","0.731669","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1452","0.731694","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1453","0.731764","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1454","0.731896","172.30.1.104","172.30.1.205","TCP","54","49671 > 33294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1455","0.731927","172.30.1.104","172.30.1.205","TCP","54","49671 > 33298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1456","0.731957","172.30.1.104","172.30.1.205","TCP","54","49671 > 33302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1457","0.731992","172.30.1.104","172.30.1.205","TCP","54","49671 > 33306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1458","0.732117","172.30.1.104","172.30.1.205","TCP","54","49671 > 33306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1459","0.732125","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1460","0.732148","172.30.1.104","172.30.1.205","TCP","54","49671 > 33294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1461","0.732151","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1462","0.732183","172.30.1.104","172.30.1.205","TCP","54","49671 > 33298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1463","0.732186","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1464","0.732213","172.30.1.104","172.30.1.205","TCP","54","49671 > 33302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1465","0.732219","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1466","0.732347","172.30.1.104","172.30.1.205","TCP","54","49671 > 33310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1467","0.732378","172.30.1.104","172.30.1.205","TCP","54","49671 > 33314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1468","0.732408","172.30.1.104","172.30.1.205","TCP","54","49671 > 33318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1469","0.732439","172.30.1.104","172.30.1.205","TCP","54","49671 > 33322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1470","0.732468","172.30.1.104","172.30.1.205","TCP","54","49671 > 33326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1471","0.732580","172.30.1.104","172.30.1.205","TCP","54","49671 > 33330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1472","0.732609","172.30.1.104","172.30.1.205","TCP","54","49671 > 33334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1473","0.732641","172.30.1.104","172.30.1.205","TCP","54","49671 > 33290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1474","0.732670","172.30.1.104","172.30.1.205","TCP","54","49671 > 33290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1475","0.732675","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1476","0.732708","172.30.1.104","172.30.1.205","TCP","54","49671 > 33334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1477","0.732712","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1478","0.732740","172.30.1.104","172.30.1.205","TCP","54","49671 > 33330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1479","0.732743","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1480","0.732771","172.30.1.104","172.30.1.205","TCP","54","49671 > 33326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1481","0.732787","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1482","0.732802","172.30.1.104","172.30.1.205","TCP","54","49671 > 33322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1483","0.732805","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1484","0.732833","172.30.1.104","172.30.1.205","TCP","54","49671 > 33310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1485","0.732837","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1486","0.732864","172.30.1.104","172.30.1.205","TCP","54","49671 > 33314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1487","0.732867","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1488","0.732894","172.30.1.104","172.30.1.205","TCP","54","49671 > 33318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1489","0.732898","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1490","0.733363","172.30.1.205","172.30.1.104","TCP","54","40700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1491","0.733471","172.30.1.205","172.30.1.104","TCP","74","33338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903959 TSecr=0 WS=128" +"1492","0.733653","172.30.1.104","172.30.1.205","TCP","54","135 > 40700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1493","0.733679","172.30.1.104","172.30.1.205","TCP","54","135 > 40700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1494","0.733684","172.30.1.205","172.30.1.104","TCP","54","40700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1495","0.733790","172.30.1.104","172.30.1.205","TCP","66","49671 > 33338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1496","0.733799","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1497","0.734144","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1498","0.734470","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1499","0.734478","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1500","0.736356","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1501","0.736768","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1502","0.736784","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1503","0.738140","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1504","0.740668","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1505","0.740678","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1506","0.741646","172.30.1.205","172.30.1.104","TCP","74","40704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903968 TSecr=0 WS=128" +"1507","0.741980","172.30.1.104","172.30.1.205","TCP","66","135 > 40704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1508","0.741991","172.30.1.205","172.30.1.104","TCP","54","40704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1509","0.742340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1510","0.742665","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1511","0.742674","172.30.1.205","172.30.1.104","TCP","54","40704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1512","0.744855","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1513","0.745347","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1514","0.745353","172.30.1.205","172.30.1.104","TCP","54","40704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1515","0.747139","172.30.1.205","172.30.1.104","TCP","54","40704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1516","0.747249","172.30.1.205","172.30.1.104","TCP","74","33342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903973 TSecr=0 WS=128" +"1517","0.747442","172.30.1.104","172.30.1.205","TCP","54","135 > 40704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1518","0.747471","172.30.1.104","172.30.1.205","TCP","54","135 > 40704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1519","0.747477","172.30.1.205","172.30.1.104","TCP","54","40704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1520","0.747584","172.30.1.104","172.30.1.205","TCP","66","49671 > 33342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1521","0.747593","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1522","0.747932","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1523","0.748288","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1524","0.748297","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1525","0.750170","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1526","0.751728","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1527","0.751734","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1528","0.753097","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1529","0.755357","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1530","0.755368","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1531","0.756348","172.30.1.205","172.30.1.104","TCP","74","40708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903982 TSecr=0 WS=128" +"1532","0.756678","172.30.1.104","172.30.1.205","TCP","66","135 > 40708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1533","0.756689","172.30.1.205","172.30.1.104","TCP","54","40708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1534","0.757062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1535","0.757392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1536","0.757401","172.30.1.205","172.30.1.104","TCP","54","40708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1537","0.759593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1538","0.760022","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1539","0.760029","172.30.1.205","172.30.1.104","TCP","54","40708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1540","0.761855","172.30.1.205","172.30.1.104","TCP","54","40708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1541","0.761979","172.30.1.205","172.30.1.104","TCP","74","33346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903988 TSecr=0 WS=128" +"1542","0.762146","172.30.1.104","172.30.1.205","TCP","54","135 > 40708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1543","0.762203","172.30.1.104","172.30.1.205","TCP","54","135 > 40708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1544","0.762213","172.30.1.205","172.30.1.104","TCP","54","40708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1545","0.762320","172.30.1.104","172.30.1.205","TCP","66","49671 > 33346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1546","0.762330","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1547","0.762721","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1548","0.763084","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1549","0.763098","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1550","0.765105","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1551","0.765524","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1552","0.765531","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1553","0.766915","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1554","0.769106","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1555","0.769118","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1556","0.770123","172.30.1.205","172.30.1.104","TCP","74","40712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903996 TSecr=0 WS=128" +"1557","0.770434","172.30.1.104","172.30.1.205","TCP","66","135 > 40712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1558","0.770445","172.30.1.205","172.30.1.104","TCP","54","40712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1559","0.770795","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1560","0.771121","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1561","0.771130","172.30.1.205","172.30.1.104","TCP","54","40712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1562","0.773346","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1563","0.773767","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1564","0.773775","172.30.1.205","172.30.1.104","TCP","54","40712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1565","0.775579","172.30.1.205","172.30.1.104","TCP","54","40712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1566","0.775692","172.30.1.205","172.30.1.104","TCP","74","33350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904002 TSecr=0 WS=128" +"1567","0.775885","172.30.1.104","172.30.1.205","TCP","54","135 > 40712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1568","0.775911","172.30.1.104","172.30.1.205","TCP","54","135 > 40712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1569","0.775919","172.30.1.205","172.30.1.104","TCP","54","40712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1570","0.776020","172.30.1.104","172.30.1.205","TCP","66","49671 > 33350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1571","0.776035","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1572","0.776403","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1573","0.776726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1574","0.776735","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1575","0.778639","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1576","0.779043","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1577","0.779050","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1578","0.780404","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1579","0.782495","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1580","0.782505","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1581","0.783471","172.30.1.205","172.30.1.104","TCP","74","40716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904009 TSecr=0 WS=128" +"1582","0.783811","172.30.1.104","172.30.1.205","TCP","66","135 > 40716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1583","0.783822","172.30.1.205","172.30.1.104","TCP","54","40716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1584","0.784177","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1585","0.784511","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1586","0.784522","172.30.1.205","172.30.1.104","TCP","54","40716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1587","0.786733","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1588","0.787147","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1589","0.787154","172.30.1.205","172.30.1.104","TCP","54","40716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1590","0.788986","172.30.1.205","172.30.1.104","TCP","54","40716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1591","0.789098","172.30.1.205","172.30.1.104","TCP","74","33354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904015 TSecr=0 WS=128" +"1592","0.789276","172.30.1.104","172.30.1.205","TCP","54","135 > 40716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1593","0.789288","172.30.1.104","172.30.1.205","TCP","54","135 > 40716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1594","0.789294","172.30.1.205","172.30.1.104","TCP","54","40716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1595","0.789367","172.30.1.104","172.30.1.205","TCP","66","49671 > 33354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1596","0.789376","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1597","0.789721","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1598","0.791216","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1599","0.791224","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1600","0.793104","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1601","0.794340","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1602","0.794348","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1603","0.795713","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1604","0.797937","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1605","0.797949","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1606","0.798940","172.30.1.205","172.30.1.104","TCP","74","40720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904025 TSecr=0 WS=128" +"1607","0.799262","172.30.1.104","172.30.1.205","TCP","66","135 > 40720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1608","0.799274","172.30.1.205","172.30.1.104","TCP","54","40720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1609","0.799620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1610","0.799926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1611","0.799935","172.30.1.205","172.30.1.104","TCP","54","40720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1612","0.802140","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1613","0.802547","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1614","0.802554","172.30.1.205","172.30.1.104","TCP","54","40720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1615","0.804373","172.30.1.205","172.30.1.104","TCP","54","40720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1616","0.804489","172.30.1.205","172.30.1.104","TCP","74","33358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904030 TSecr=0 WS=128" +"1617","0.804743","172.30.1.104","172.30.1.205","TCP","54","135 > 40720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1618","0.804753","172.30.1.104","172.30.1.205","TCP","54","135 > 40720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1619","0.804759","172.30.1.205","172.30.1.104","TCP","54","40720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1620","0.804794","172.30.1.104","172.30.1.205","TCP","66","49671 > 33358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1621","0.804804","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1622","0.805157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1623","0.806145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1624","0.806154","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1625","0.808033","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1626","0.808471","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1627","0.808477","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1628","0.809848","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1629","0.812070","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1630","0.812080","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1631","0.813037","172.30.1.205","172.30.1.104","TCP","74","40724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904039 TSecr=0 WS=128" +"1632","0.813328","172.30.1.104","172.30.1.205","TCP","66","135 > 40724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1633","0.813339","172.30.1.205","172.30.1.104","TCP","54","40724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1634","0.813698","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1635","0.814001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1636","0.814010","172.30.1.205","172.30.1.104","TCP","54","40724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1637","0.816206","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1638","0.816596","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1639","0.816603","172.30.1.205","172.30.1.104","TCP","54","40724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1640","0.818421","172.30.1.205","172.30.1.104","TCP","54","40724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1641","0.818532","172.30.1.205","172.30.1.104","TCP","74","33362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904044 TSecr=0 WS=128" +"1642","0.818674","172.30.1.104","172.30.1.205","TCP","54","135 > 40724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1643","0.818685","172.30.1.104","172.30.1.205","TCP","54","135 > 40724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1644","0.818691","172.30.1.205","172.30.1.104","TCP","54","40724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1645","0.818788","172.30.1.104","172.30.1.205","TCP","66","49671 > 33362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1646","0.818796","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1647","0.819143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1648","0.819435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1649","0.819443","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1650","0.821370","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1651","0.821763","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1652","0.821769","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1653","0.823124","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1654","0.825249","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1655","0.825258","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1656","0.826193","172.30.1.205","172.30.1.104","TCP","74","40728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904052 TSecr=0 WS=128" +"1657","0.826531","172.30.1.104","172.30.1.205","TCP","66","135 > 40728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1658","0.826542","172.30.1.205","172.30.1.104","TCP","54","40728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1659","0.826902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1660","0.827227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1661","0.827236","172.30.1.205","172.30.1.104","TCP","54","40728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1662","0.829444","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1663","0.829840","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1664","0.829847","172.30.1.205","172.30.1.104","TCP","54","40728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1665","0.831646","172.30.1.205","172.30.1.104","TCP","54","40728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1666","0.831756","172.30.1.205","172.30.1.104","TCP","74","33366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904058 TSecr=0 WS=128" +"1667","0.831908","172.30.1.104","172.30.1.205","TCP","54","135 > 40728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1668","0.831918","172.30.1.104","172.30.1.205","TCP","54","135 > 40728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1669","0.831924","172.30.1.205","172.30.1.104","TCP","54","40728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1670","0.832042","172.30.1.104","172.30.1.205","TCP","66","49671 > 33366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1671","0.832050","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1672","0.832394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1673","0.832709","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1674","0.832717","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1675","0.834609","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1676","0.835060","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1677","0.835069","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1678","0.836476","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1679","0.838582","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1680","0.838591","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1681","0.839547","172.30.1.205","172.30.1.104","TCP","74","40732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904065 TSecr=0 WS=128" +"1682","0.839831","172.30.1.104","172.30.1.205","TCP","66","135 > 40732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1683","0.839842","172.30.1.205","172.30.1.104","TCP","54","40732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1684","0.840190","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1685","0.840490","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1686","0.840499","172.30.1.205","172.30.1.104","TCP","54","40732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1687","0.842710","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1688","0.843167","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1689","0.843174","172.30.1.205","172.30.1.104","TCP","54","40732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1690","0.844991","172.30.1.205","172.30.1.104","TCP","54","40732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1691","0.845100","172.30.1.205","172.30.1.104","TCP","74","33370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904071 TSecr=0 WS=128" +"1692","0.845272","172.30.1.104","172.30.1.205","TCP","54","135 > 40732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1693","0.845346","172.30.1.104","172.30.1.205","TCP","54","135 > 40732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1694","0.845353","172.30.1.205","172.30.1.104","TCP","54","40732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1695","0.845432","172.30.1.104","172.30.1.205","TCP","66","49671 > 33370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1696","0.845439","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1697","0.845823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1698","0.846142","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1699","0.846151","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1700","0.848003","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1701","0.848362","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1702","0.848368","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1703","0.849712","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1704","0.852220","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1705","0.852234","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1706","0.853285","172.30.1.205","172.30.1.104","TCP","74","40736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904079 TSecr=0 WS=128" +"1707","0.853579","172.30.1.104","172.30.1.205","TCP","66","135 > 40736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1708","0.853590","172.30.1.205","172.30.1.104","TCP","54","40736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1709","0.853941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1710","0.854256","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1711","0.854265","172.30.1.205","172.30.1.104","TCP","54","40736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1712","0.856430","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1713","0.856864","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1714","0.856871","172.30.1.205","172.30.1.104","TCP","54","40736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1715","0.858685","172.30.1.205","172.30.1.104","TCP","54","40736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1716","0.858801","172.30.1.205","172.30.1.104","TCP","74","33374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904085 TSecr=0 WS=128" +"1717","0.858964","172.30.1.104","172.30.1.205","TCP","54","135 > 40736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1718","0.859003","172.30.1.104","172.30.1.205","TCP","54","135 > 40736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1719","0.859009","172.30.1.205","172.30.1.104","TCP","54","40736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1720","0.859123","172.30.1.104","172.30.1.205","TCP","66","49671 > 33374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1721","0.859132","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1722","0.859473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1723","0.859792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1724","0.859801","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1725","0.861681","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1726","0.862059","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1727","0.862066","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1728","0.863415","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1729","0.865688","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1730","0.865698","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1731","0.866645","172.30.1.205","172.30.1.104","TCP","74","40740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904093 TSecr=0 WS=128" +"1732","0.866996","172.30.1.104","172.30.1.205","TCP","66","135 > 40740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1733","0.867007","172.30.1.205","172.30.1.104","TCP","54","40740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1734","0.867352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1735","0.867644","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1736","0.867653","172.30.1.205","172.30.1.104","TCP","54","40740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1737","0.869862","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1738","0.870225","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1739","0.870231","172.30.1.205","172.30.1.104","TCP","54","40740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1740","0.872031","172.30.1.205","172.30.1.104","TCP","54","40740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1741","0.872143","172.30.1.205","172.30.1.104","TCP","74","33378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904098 TSecr=0 WS=128" +"1742","0.872300","172.30.1.104","172.30.1.205","TCP","54","135 > 40740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1743","0.872325","172.30.1.104","172.30.1.205","TCP","54","135 > 40740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1744","0.872332","172.30.1.205","172.30.1.104","TCP","54","40740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1745","0.872423","172.30.1.104","172.30.1.205","TCP","66","49671 > 33378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1746","0.872432","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1747","0.872804","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1748","0.873080","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1749","0.873089","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1750","0.874933","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1751","0.875319","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1752","0.875325","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1753","0.876684","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1754","0.878788","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1755","0.878798","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1756","0.879755","172.30.1.205","172.30.1.104","TCP","74","40744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904106 TSecr=0 WS=128" +"1757","0.880114","172.30.1.104","172.30.1.205","TCP","66","135 > 40744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1758","0.880125","172.30.1.205","172.30.1.104","TCP","54","40744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1759","0.880467","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1760","0.880764","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1761","0.880773","172.30.1.205","172.30.1.104","TCP","54","40744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1762","0.882948","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1763","0.883341","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1764","0.883348","172.30.1.205","172.30.1.104","TCP","54","40744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1765","0.885183","172.30.1.205","172.30.1.104","TCP","54","40744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1766","0.885302","172.30.1.205","172.30.1.104","TCP","74","33382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904111 TSecr=0 WS=128" +"1767","0.885477","172.30.1.104","172.30.1.205","TCP","54","135 > 40744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1768","0.885526","172.30.1.104","172.30.1.205","TCP","54","135 > 40744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1769","0.885533","172.30.1.205","172.30.1.104","TCP","54","40744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1770","0.885615","172.30.1.104","172.30.1.205","TCP","66","49671 > 33382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1771","0.885624","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1772","0.885960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1773","0.886287","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1774","0.886295","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1775","0.888140","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1776","0.888504","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1777","0.888512","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1778","0.889877","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1779","0.893057","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1780","0.893067","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1781","0.894017","172.30.1.205","172.30.1.104","TCP","74","40748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904120 TSecr=0 WS=128" +"1782","0.894327","172.30.1.104","172.30.1.205","TCP","66","135 > 40748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1783","0.894337","172.30.1.205","172.30.1.104","TCP","54","40748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1784","0.894692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1785","0.895051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1786","0.895062","172.30.1.205","172.30.1.104","TCP","54","40748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1787","0.897295","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1788","0.897776","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1789","0.897783","172.30.1.205","172.30.1.104","TCP","54","40748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1790","0.898632","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1791","0.898680","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1792","0.898717","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1793","0.898745","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1794","0.898775","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1795","0.898809","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1796","0.898842","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1797","0.898875","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1798","0.898908","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1799","0.898940","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1800","0.898967","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1801","0.899033","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1802","0.899172","172.30.1.104","172.30.1.205","TCP","54","49671 > 33342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1803","0.899191","172.30.1.104","172.30.1.205","TCP","54","49671 > 33342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1804","0.899198","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1805","0.899211","172.30.1.104","172.30.1.205","TCP","54","49671 > 33346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1806","0.899234","172.30.1.104","172.30.1.205","TCP","54","49671 > 33350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1807","0.899250","172.30.1.104","172.30.1.205","TCP","54","49671 > 33346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1808","0.899254","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1809","0.899283","172.30.1.104","172.30.1.205","TCP","54","49671 > 33354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1810","0.899302","172.30.1.104","172.30.1.205","TCP","54","49671 > 33358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1811","0.899324","172.30.1.104","172.30.1.205","TCP","54","49671 > 33358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1812","0.899329","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1813","0.899345","172.30.1.104","172.30.1.205","TCP","54","49671 > 33362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1814","0.899364","172.30.1.104","172.30.1.205","TCP","54","49671 > 33366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1815","0.899384","172.30.1.104","172.30.1.205","TCP","54","49671 > 33362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1816","0.899389","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1817","0.899407","172.30.1.104","172.30.1.205","TCP","54","49671 > 33370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1818","0.899441","172.30.1.104","172.30.1.205","TCP","54","49671 > 33374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1819","0.899460","172.30.1.104","172.30.1.205","TCP","54","49671 > 33378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1820","0.899485","172.30.1.104","172.30.1.205","TCP","54","49671 > 33370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1821","0.899489","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1822","0.899595","172.30.1.104","172.30.1.205","TCP","54","49671 > 33382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1823","0.899613","172.30.1.104","172.30.1.205","TCP","54","49671 > 33366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1824","0.899617","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1825","0.899632","172.30.1.104","172.30.1.205","TCP","54","49671 > 33382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1826","0.899635","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1827","0.899652","172.30.1.104","172.30.1.205","TCP","54","49671 > 33378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1828","0.899654","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1829","0.899671","172.30.1.104","172.30.1.205","TCP","54","49671 > 33374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1830","0.899674","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1831","0.899691","172.30.1.104","172.30.1.205","TCP","54","49671 > 33350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1832","0.899694","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1833","0.899711","172.30.1.104","172.30.1.205","TCP","54","49671 > 33354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1834","0.899714","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1835","0.899890","172.30.1.104","172.30.1.205","TCP","54","49671 > 33338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1836","0.899910","172.30.1.104","172.30.1.205","TCP","54","49671 > 33338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"1837","0.899915","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"1838","0.900679","172.30.1.205","172.30.1.104","TCP","54","40748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1839","0.900820","172.30.1.205","172.30.1.104","TCP","74","33386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904127 TSecr=0 WS=128" +"1840","0.900948","172.30.1.104","172.30.1.205","TCP","54","135 > 40748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1841","0.900968","172.30.1.104","172.30.1.205","TCP","54","135 > 40748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1842","0.900974","172.30.1.205","172.30.1.104","TCP","54","40748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1843","0.901108","172.30.1.104","172.30.1.205","TCP","66","49671 > 33386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1844","0.901116","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1845","0.901485","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1846","0.901776","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1847","0.901784","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1848","0.903664","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1849","0.904024","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1850","0.904030","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1851","0.905404","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1852","0.907661","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1853","0.907670","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1854","0.908624","172.30.1.205","172.30.1.104","TCP","74","40752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904135 TSecr=0 WS=128" +"1855","0.908922","172.30.1.104","172.30.1.205","TCP","66","135 > 40752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1856","0.908934","172.30.1.205","172.30.1.104","TCP","54","40752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1857","0.909297","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1858","0.909580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1859","0.909589","172.30.1.205","172.30.1.104","TCP","54","40752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1860","0.911776","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1861","0.912191","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1862","0.912197","172.30.1.205","172.30.1.104","TCP","54","40752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1863","0.914022","172.30.1.205","172.30.1.104","TCP","54","40752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1864","0.914150","172.30.1.205","172.30.1.104","TCP","74","33390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904140 TSecr=0 WS=128" +"1865","0.914281","172.30.1.104","172.30.1.205","TCP","54","135 > 40752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1866","0.914304","172.30.1.104","172.30.1.205","TCP","54","135 > 40752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1867","0.914310","172.30.1.205","172.30.1.104","TCP","54","40752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1868","0.914410","172.30.1.104","172.30.1.205","TCP","66","49671 > 33390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1869","0.914418","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1870","0.914765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1871","0.915041","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1872","0.915050","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1873","0.916917","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1874","0.917269","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1875","0.917274","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1876","0.918616","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1877","0.920686","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1878","0.920695","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1879","0.921679","172.30.1.205","172.30.1.104","TCP","74","40756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904148 TSecr=0 WS=128" +"1880","0.921959","172.30.1.104","172.30.1.205","TCP","66","135 > 40756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1881","0.921970","172.30.1.205","172.30.1.104","TCP","54","40756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1882","0.922311","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1883","0.922586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1884","0.922595","172.30.1.205","172.30.1.104","TCP","54","40756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1885","0.924787","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1886","0.925178","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1887","0.925185","172.30.1.205","172.30.1.104","TCP","54","40756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1888","0.926983","172.30.1.205","172.30.1.104","TCP","54","40756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1889","0.927101","172.30.1.205","172.30.1.104","TCP","74","33394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904153 TSecr=0 WS=128" +"1890","0.927237","172.30.1.104","172.30.1.205","TCP","54","135 > 40756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1891","0.927260","172.30.1.104","172.30.1.205","TCP","54","135 > 40756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1892","0.927267","172.30.1.205","172.30.1.104","TCP","54","40756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1893","0.927378","172.30.1.104","172.30.1.205","TCP","66","49671 > 33394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1894","0.927386","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1895","0.927724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1896","0.928040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1897","0.928049","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1898","0.929918","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1899","0.930273","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1900","0.930279","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1901","0.931634","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1902","0.934189","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1903","0.934199","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1904","0.935199","172.30.1.205","172.30.1.104","TCP","74","40760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904161 TSecr=0 WS=128" +"1905","0.935520","172.30.1.104","172.30.1.205","TCP","66","135 > 40760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1906","0.935531","172.30.1.205","172.30.1.104","TCP","54","40760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1907","0.935876","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1908","0.937386","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1909","0.937395","172.30.1.205","172.30.1.104","TCP","54","40760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1910","0.939587","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1911","0.940007","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1912","0.940014","172.30.1.205","172.30.1.104","TCP","54","40760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1913","0.941837","172.30.1.205","172.30.1.104","TCP","54","40760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1914","0.941966","172.30.1.205","172.30.1.104","TCP","74","33398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904168 TSecr=0 WS=128" +"1915","0.942104","172.30.1.104","172.30.1.205","TCP","54","135 > 40760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1916","0.942137","172.30.1.104","172.30.1.205","TCP","54","135 > 40760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1917","0.942144","172.30.1.205","172.30.1.104","TCP","54","40760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1918","0.942259","172.30.1.104","172.30.1.205","TCP","66","49671 > 33398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1919","0.942267","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1920","0.942612","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1921","0.942883","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1922","0.942892","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1923","0.944746","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1924","0.945101","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1925","0.945111","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1926","0.946535","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1927","0.948664","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1928","0.948677","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1929","0.949687","172.30.1.205","172.30.1.104","TCP","74","40764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904176 TSecr=0 WS=128" +"1930","0.949968","172.30.1.104","172.30.1.205","TCP","66","135 > 40764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1931","0.949979","172.30.1.205","172.30.1.104","TCP","54","40764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1932","0.950325","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1933","0.950613","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1934","0.950623","172.30.1.205","172.30.1.104","TCP","54","40764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1935","0.952821","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1936","0.953202","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1937","0.953210","172.30.1.205","172.30.1.104","TCP","54","40764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1938","0.955045","172.30.1.205","172.30.1.104","TCP","54","40764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1939","0.955158","172.30.1.205","172.30.1.104","TCP","74","33402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904181 TSecr=0 WS=128" +"1940","0.955328","172.30.1.104","172.30.1.205","TCP","54","135 > 40764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1941","0.955338","172.30.1.104","172.30.1.205","TCP","54","135 > 40764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1942","0.955344","172.30.1.205","172.30.1.104","TCP","54","40764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1943","0.955419","172.30.1.104","172.30.1.205","TCP","66","49671 > 33402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1944","0.955428","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1945","0.955788","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1946","0.956071","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1947","0.956080","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1948","0.957969","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1949","0.958343","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1950","0.958349","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1951","0.959696","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1952","0.961923","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1953","0.961940","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1954","0.962880","172.30.1.205","172.30.1.104","TCP","74","40768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904189 TSecr=0 WS=128" +"1955","0.963182","172.30.1.104","172.30.1.205","TCP","66","135 > 40768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1956","0.963193","172.30.1.205","172.30.1.104","TCP","54","40768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1957","0.963540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1958","0.963826","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1959","0.963835","172.30.1.205","172.30.1.104","TCP","54","40768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1960","0.966051","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1961","0.966471","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1962","0.966479","172.30.1.205","172.30.1.104","TCP","54","40768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1963","0.968322","172.30.1.205","172.30.1.104","TCP","54","40768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1964","0.968437","172.30.1.205","172.30.1.104","TCP","74","33406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904194 TSecr=0 WS=128" +"1965","0.968612","172.30.1.104","172.30.1.205","TCP","54","135 > 40768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1966","0.968629","172.30.1.104","172.30.1.205","TCP","54","135 > 40768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1967","0.968639","172.30.1.205","172.30.1.104","TCP","54","40768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1968","0.968756","172.30.1.104","172.30.1.205","TCP","66","49671 > 33406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1969","0.968772","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1970","0.969326","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1971","0.969619","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1972","0.969629","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1973","0.971502","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1974","0.971879","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"1975","0.971891","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"1976","0.973503","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"1977","0.976753","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"1978","0.976764","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"1979","0.977751","172.30.1.205","172.30.1.104","TCP","74","40772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904204 TSecr=0 WS=128" +"1980","0.978029","172.30.1.104","172.30.1.205","TCP","66","135 > 40772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1981","0.978040","172.30.1.205","172.30.1.104","TCP","54","40772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1982","0.978391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"1983","0.978669","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1984","0.978678","172.30.1.205","172.30.1.104","TCP","54","40772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1985","0.980912","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"1986","0.981298","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"1987","0.981304","172.30.1.205","172.30.1.104","TCP","54","40772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1988","0.983104","172.30.1.205","172.30.1.104","TCP","54","40772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"1989","0.983215","172.30.1.205","172.30.1.104","TCP","74","33410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904209 TSecr=0 WS=128" +"1990","0.983347","172.30.1.104","172.30.1.205","TCP","54","135 > 40772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1991","0.983386","172.30.1.104","172.30.1.205","TCP","54","135 > 40772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"1992","0.983391","172.30.1.205","172.30.1.104","TCP","54","40772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"1993","0.983468","172.30.1.104","172.30.1.205","TCP","66","49671 > 33410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"1994","0.983476","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"1995","0.983822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"1996","0.984093","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"1997","0.984102","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"1998","0.986136","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"1999","0.986523","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2000","0.986530","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2001","0.987875","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2002","0.990191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2003","0.990200","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2004","0.991145","172.30.1.205","172.30.1.104","TCP","74","40776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904217 TSecr=0 WS=128" +"2005","0.991448","172.30.1.104","172.30.1.205","TCP","66","135 > 40776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2006","0.991459","172.30.1.205","172.30.1.104","TCP","54","40776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2007","0.991808","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2008","0.992093","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2009","0.992104","172.30.1.205","172.30.1.104","TCP","54","40776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2010","0.994329","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2011","0.994717","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2012","0.994724","172.30.1.205","172.30.1.104","TCP","54","40776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2013","0.996527","172.30.1.205","172.30.1.104","TCP","54","40776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2014","0.996638","172.30.1.205","172.30.1.104","TCP","74","33414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904223 TSecr=0 WS=128" +"2015","0.996810","172.30.1.104","172.30.1.205","TCP","54","135 > 40776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2016","0.996840","172.30.1.104","172.30.1.205","TCP","54","135 > 40776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2017","0.996846","172.30.1.205","172.30.1.104","TCP","54","40776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2018","0.996924","172.30.1.104","172.30.1.205","TCP","66","49671 > 33414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2019","0.996932","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2020","0.997288","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2021","0.997693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2022","0.997702","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2023","0.999571","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2024","0.999954","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2025","0.999960","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2026","1.001350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2027","1.003437","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2028","1.003449","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2029","1.004409","172.30.1.205","172.30.1.104","TCP","74","40780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904230 TSecr=0 WS=128" +"2030","1.004711","172.30.1.104","172.30.1.205","TCP","66","135 > 40780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2031","1.004722","172.30.1.205","172.30.1.104","TCP","54","40780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2032","1.005097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2033","1.005376","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2034","1.005385","172.30.1.205","172.30.1.104","TCP","54","40780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2035","1.007549","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2036","1.007931","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2037","1.007937","172.30.1.205","172.30.1.104","TCP","54","40780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2038","1.009757","172.30.1.205","172.30.1.104","TCP","54","40780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2039","1.009870","172.30.1.205","172.30.1.104","TCP","74","33418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904236 TSecr=0 WS=128" +"2040","1.010018","172.30.1.104","172.30.1.205","TCP","54","135 > 40780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2041","1.010029","172.30.1.104","172.30.1.205","TCP","54","135 > 40780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2042","1.010035","172.30.1.205","172.30.1.104","TCP","54","40780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2043","1.010166","172.30.1.104","172.30.1.205","TCP","66","49671 > 33418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2044","1.010174","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2045","1.010519","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2046","1.010819","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2047","1.010830","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2048","1.012725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2049","1.013144","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2050","1.013154","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2051","1.014581","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2052","1.017885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2053","1.017897","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2054","1.018905","172.30.1.205","172.30.1.104","TCP","74","40784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904245 TSecr=0 WS=128" +"2055","1.019220","172.30.1.104","172.30.1.205","TCP","66","135 > 40784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2056","1.019232","172.30.1.205","172.30.1.104","TCP","54","40784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2057","1.019580","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2058","1.019875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2059","1.019884","172.30.1.205","172.30.1.104","TCP","54","40784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2060","1.022090","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2061","1.022493","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2062","1.022500","172.30.1.205","172.30.1.104","TCP","54","40784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2063","1.024303","172.30.1.205","172.30.1.104","TCP","54","40784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2064","1.024424","172.30.1.205","172.30.1.104","TCP","74","33422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904250 TSecr=0 WS=128" +"2065","1.024571","172.30.1.104","172.30.1.205","TCP","54","135 > 40784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2066","1.024595","172.30.1.104","172.30.1.205","TCP","54","135 > 40784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2067","1.024603","172.30.1.205","172.30.1.104","TCP","54","40784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2068","1.024739","172.30.1.104","172.30.1.205","TCP","66","49671 > 33422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2069","1.024747","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2070","1.025107","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2071","1.025393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2072","1.025402","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2073","1.027252","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2074","1.027638","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2075","1.027644","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2076","1.028997","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2077","1.031667","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2078","1.031677","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2079","1.032624","172.30.1.205","172.30.1.104","TCP","74","40788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904259 TSecr=0 WS=128" +"2080","1.032923","172.30.1.104","172.30.1.205","TCP","66","135 > 40788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2081","1.032934","172.30.1.205","172.30.1.104","TCP","54","40788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2082","1.033298","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2083","1.033620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2084","1.033634","172.30.1.205","172.30.1.104","TCP","54","40788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2085","1.035906","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2086","1.036346","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2087","1.036354","172.30.1.205","172.30.1.104","TCP","54","40788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2088","1.038191","172.30.1.205","172.30.1.104","TCP","54","40788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2089","1.038314","172.30.1.205","172.30.1.104","TCP","74","33426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904264 TSecr=0 WS=128" +"2090","1.038475","172.30.1.104","172.30.1.205","TCP","54","135 > 40788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2091","1.038488","172.30.1.104","172.30.1.205","TCP","54","135 > 40788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2092","1.038495","172.30.1.205","172.30.1.104","TCP","54","40788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2093","1.038662","172.30.1.104","172.30.1.205","TCP","66","49671 > 33426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2094","1.038671","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2095","1.039018","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2096","1.039305","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2097","1.039312","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2098","1.041215","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2099","1.041617","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2100","1.041624","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2101","1.042968","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2102","1.045245","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2103","1.045255","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2104","1.046220","172.30.1.205","172.30.1.104","TCP","74","40792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904272 TSecr=0 WS=128" +"2105","1.046536","172.30.1.104","172.30.1.205","TCP","66","135 > 40792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2106","1.046551","172.30.1.205","172.30.1.104","TCP","54","40792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2107","1.046937","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2108","1.047228","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2109","1.047239","172.30.1.205","172.30.1.104","TCP","54","40792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2110","1.049439","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2111","1.049841","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2112","1.049848","172.30.1.205","172.30.1.104","TCP","54","40792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2113","1.051633","172.30.1.205","172.30.1.104","TCP","54","40792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2114","1.051748","172.30.1.205","172.30.1.104","TCP","74","33430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904278 TSecr=0 WS=128" +"2115","1.051918","172.30.1.104","172.30.1.205","TCP","54","135 > 40792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2116","1.051933","172.30.1.104","172.30.1.205","TCP","54","135 > 40792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2117","1.051939","172.30.1.205","172.30.1.104","TCP","54","40792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2118","1.052021","172.30.1.104","172.30.1.205","TCP","66","49671 > 33430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2119","1.052030","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2120","1.052371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2121","1.052674","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2122","1.052683","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2123","1.054570","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2124","1.054978","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2125","1.054987","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2126","1.056395","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2127","1.058703","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2128","1.058715","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2129","1.059719","172.30.1.205","172.30.1.104","TCP","74","40796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904286 TSecr=0 WS=128" +"2130","1.060034","172.30.1.104","172.30.1.205","TCP","66","135 > 40796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2131","1.060046","172.30.1.205","172.30.1.104","TCP","54","40796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2132","1.060400","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2133","1.060677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2134","1.060685","172.30.1.205","172.30.1.104","TCP","54","40796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2135","1.062890","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2136","1.063296","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2137","1.063303","172.30.1.205","172.30.1.104","TCP","54","40796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2138","1.064147","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2139","1.064197","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2140","1.064234","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2141","1.064266","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2142","1.064298","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2143","1.064331","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2144","1.064358","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2145","1.064384","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2146","1.064405","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2147","1.064432","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2148","1.064457","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2149","1.064517","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2150","1.064625","172.30.1.104","172.30.1.205","TCP","54","49671 > 33390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2151","1.064638","172.30.1.104","172.30.1.205","TCP","54","49671 > 33394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2152","1.064641","172.30.1.104","172.30.1.205","TCP","54","49671 > 33398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2153","1.064644","172.30.1.104","172.30.1.205","TCP","54","49671 > 33390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2154","1.064652","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2155","1.064659","172.30.1.104","172.30.1.205","TCP","54","49671 > 33394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2156","1.064661","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2157","1.064976","172.30.1.104","172.30.1.205","TCP","54","49671 > 33402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2158","1.064984","172.30.1.104","172.30.1.205","TCP","54","49671 > 33406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2159","1.064987","172.30.1.104","172.30.1.205","TCP","54","49671 > 33406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2160","1.064992","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2161","1.064999","172.30.1.104","172.30.1.205","TCP","54","49671 > 33398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2162","1.065002","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2163","1.065003","172.30.1.104","172.30.1.205","TCP","54","49671 > 33402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2164","1.065005","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2165","1.065006","172.30.1.104","172.30.1.205","TCP","54","49671 > 33410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2166","1.065009","172.30.1.104","172.30.1.205","TCP","54","49671 > 33414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2167","1.065012","172.30.1.104","172.30.1.205","TCP","54","49671 > 33418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2168","1.065014","172.30.1.104","172.30.1.205","TCP","54","49671 > 33422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2169","1.065017","172.30.1.104","172.30.1.205","TCP","54","49671 > 33426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2170","1.065019","172.30.1.104","172.30.1.205","TCP","54","49671 > 33430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2171","1.065249","172.30.1.104","172.30.1.205","TCP","54","49671 > 33386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2172","1.065254","172.30.1.104","172.30.1.205","TCP","54","49671 > 33430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2173","1.065259","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2174","1.065265","172.30.1.104","172.30.1.205","TCP","54","49671 > 33426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2175","1.065267","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2176","1.065268","172.30.1.104","172.30.1.205","TCP","54","49671 > 33422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2177","1.065270","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2178","1.065271","172.30.1.104","172.30.1.205","TCP","54","49671 > 33410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2179","1.065276","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2180","1.065278","172.30.1.104","172.30.1.205","TCP","54","49671 > 33386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2181","1.065279","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2182","1.065281","172.30.1.104","172.30.1.205","TCP","54","49671 > 33414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2183","1.065283","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2184","1.065284","172.30.1.104","172.30.1.205","TCP","54","49671 > 33418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2185","1.065286","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2186","1.065989","172.30.1.205","172.30.1.104","TCP","54","40796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2187","1.066101","172.30.1.205","172.30.1.104","TCP","74","33434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904292 TSecr=0 WS=128" +"2188","1.066247","172.30.1.104","172.30.1.205","TCP","54","135 > 40796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2189","1.066255","172.30.1.104","172.30.1.205","TCP","54","135 > 40796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2190","1.066260","172.30.1.205","172.30.1.104","TCP","54","40796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2191","1.066355","172.30.1.104","172.30.1.205","TCP","66","49671 > 33434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2192","1.066362","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2193","1.066719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2194","1.067002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2195","1.067011","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2196","1.068903","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2197","1.069275","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2198","1.069281","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2199","1.070631","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2200","1.072792","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2201","1.072802","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2202","1.073778","172.30.1.205","172.30.1.104","TCP","74","40800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904300 TSecr=0 WS=128" +"2203","1.074070","172.30.1.104","172.30.1.205","TCP","66","135 > 40800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2204","1.074080","172.30.1.205","172.30.1.104","TCP","54","40800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2205","1.074431","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2206","1.074755","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2207","1.074769","172.30.1.205","172.30.1.104","TCP","54","40800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2208","1.077047","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2209","1.077463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2210","1.077470","172.30.1.205","172.30.1.104","TCP","54","40800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2211","1.079282","172.30.1.205","172.30.1.104","TCP","54","40800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2212","1.079402","172.30.1.205","172.30.1.104","TCP","74","33438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904305 TSecr=0 WS=128" +"2213","1.079548","172.30.1.104","172.30.1.205","TCP","54","135 > 40800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2214","1.079572","172.30.1.104","172.30.1.205","TCP","54","135 > 40800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2215","1.079578","172.30.1.205","172.30.1.104","TCP","54","40800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2216","1.079676","172.30.1.104","172.30.1.205","TCP","66","49671 > 33438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2217","1.079685","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2218","1.080052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2219","1.080333","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2220","1.080342","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2221","1.082235","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2222","1.082615","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2223","1.082623","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2224","1.084027","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2225","1.086135","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2226","1.086146","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2227","1.087120","172.30.1.205","172.30.1.104","TCP","74","40804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904313 TSecr=0 WS=128" +"2228","1.087414","172.30.1.104","172.30.1.205","TCP","66","135 > 40804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2229","1.087426","172.30.1.205","172.30.1.104","TCP","54","40804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2230","1.087770","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2231","1.088044","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2232","1.088053","172.30.1.205","172.30.1.104","TCP","54","40804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2233","1.090253","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2234","1.090626","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2235","1.090633","172.30.1.205","172.30.1.104","TCP","54","40804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2236","1.092444","172.30.1.205","172.30.1.104","TCP","54","40804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2237","1.092556","172.30.1.205","172.30.1.104","TCP","74","33442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904318 TSecr=0 WS=128" +"2238","1.092694","172.30.1.104","172.30.1.205","TCP","54","135 > 40804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2239","1.092709","172.30.1.104","172.30.1.205","TCP","54","135 > 40804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2240","1.092716","172.30.1.205","172.30.1.104","TCP","54","40804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2241","1.092830","172.30.1.104","172.30.1.205","TCP","66","49671 > 33442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2242","1.092840","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2243","1.093190","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2244","1.094206","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2245","1.094213","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2246","1.096052","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2247","1.096421","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2248","1.096427","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2249","1.097786","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2250","1.099916","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2251","1.099925","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2252","1.100884","172.30.1.205","172.30.1.104","TCP","74","40808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904327 TSecr=0 WS=128" +"2253","1.101183","172.30.1.104","172.30.1.205","TCP","66","135 > 40808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2254","1.101194","172.30.1.205","172.30.1.104","TCP","54","40808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2255","1.101543","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2256","1.101834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2257","1.101843","172.30.1.205","172.30.1.104","TCP","54","40808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2258","1.104015","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2259","1.104392","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2260","1.104398","172.30.1.205","172.30.1.104","TCP","54","40808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2261","1.106228","172.30.1.205","172.30.1.104","TCP","54","40808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2262","1.106354","172.30.1.205","172.30.1.104","TCP","74","33446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904332 TSecr=0 WS=128" +"2263","1.106478","172.30.1.104","172.30.1.205","TCP","54","135 > 40808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2264","1.106491","172.30.1.104","172.30.1.205","TCP","54","135 > 40808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2265","1.106498","172.30.1.205","172.30.1.104","TCP","54","40808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2266","1.106625","172.30.1.104","172.30.1.205","TCP","66","49671 > 33446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2267","1.106634","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2268","1.106989","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2269","1.107264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2270","1.107271","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2271","1.109159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2272","1.109527","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2273","1.109534","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2274","1.110872","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2275","1.113349","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2276","1.113360","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2277","1.114340","172.30.1.205","172.30.1.104","TCP","74","40812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904340 TSecr=0 WS=128" +"2278","1.114641","172.30.1.104","172.30.1.205","TCP","66","135 > 40812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2279","1.114653","172.30.1.205","172.30.1.104","TCP","54","40812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2280","1.114995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2281","1.115302","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2282","1.115311","172.30.1.205","172.30.1.104","TCP","54","40812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2283","1.117519","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2284","1.117913","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2285","1.117919","172.30.1.205","172.30.1.104","TCP","54","40812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2286","1.119712","172.30.1.205","172.30.1.104","TCP","54","40812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2287","1.119827","172.30.1.205","172.30.1.104","TCP","74","33450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904346 TSecr=0 WS=128" +"2288","1.119982","172.30.1.104","172.30.1.205","TCP","54","135 > 40812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2289","1.119993","172.30.1.104","172.30.1.205","TCP","54","135 > 40812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2290","1.120000","172.30.1.205","172.30.1.104","TCP","54","40812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2291","1.120100","172.30.1.104","172.30.1.205","TCP","66","49671 > 33450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2292","1.120108","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2293","1.120447","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2294","1.120716","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2295","1.120723","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2296","1.122586","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2297","1.122937","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2298","1.122943","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2299","1.124275","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2300","1.126364","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2301","1.126373","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2302","1.127352","172.30.1.205","172.30.1.104","TCP","74","40816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904353 TSecr=0 WS=128" +"2303","1.127653","172.30.1.104","172.30.1.205","TCP","66","135 > 40816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2304","1.127664","172.30.1.205","172.30.1.104","TCP","54","40816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2305","1.128012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2306","1.128304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2307","1.128312","172.30.1.205","172.30.1.104","TCP","54","40816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2308","1.130507","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2309","1.130901","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2310","1.130908","172.30.1.205","172.30.1.104","TCP","54","40816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2311","1.132712","172.30.1.205","172.30.1.104","TCP","54","40816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2312","1.132849","172.30.1.205","172.30.1.104","TCP","74","33454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904359 TSecr=0 WS=128" +"2313","1.132994","172.30.1.104","172.30.1.205","TCP","54","135 > 40816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2314","1.133004","172.30.1.104","172.30.1.205","TCP","54","135 > 40816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2315","1.133011","172.30.1.205","172.30.1.104","TCP","54","40816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2316","1.133111","172.30.1.104","172.30.1.205","TCP","66","49671 > 33454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2317","1.133120","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2318","1.133466","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2319","1.133743","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2320","1.133753","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2321","1.135632","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2322","1.135983","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2323","1.135989","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2324","1.137360","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2325","1.139567","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2326","1.139576","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2327","1.140516","172.30.1.205","172.30.1.104","TCP","74","40820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904366 TSecr=0 WS=128" +"2328","1.140826","172.30.1.104","172.30.1.205","TCP","66","135 > 40820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2329","1.140837","172.30.1.205","172.30.1.104","TCP","54","40820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2330","1.141193","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2331","1.141476","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2332","1.141485","172.30.1.205","172.30.1.104","TCP","54","40820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2333","1.143668","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2334","1.144069","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2335","1.144075","172.30.1.205","172.30.1.104","TCP","54","40820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2336","1.145902","172.30.1.205","172.30.1.104","TCP","54","40820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2337","1.146015","172.30.1.205","172.30.1.104","TCP","74","33458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904372 TSecr=0 WS=128" +"2338","1.146183","172.30.1.104","172.30.1.205","TCP","54","135 > 40820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2339","1.146194","172.30.1.104","172.30.1.205","TCP","54","135 > 40820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2340","1.146200","172.30.1.205","172.30.1.104","TCP","54","40820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2341","1.146276","172.30.1.104","172.30.1.205","TCP","66","49671 > 33458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2342","1.146284","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2343","1.146629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2344","1.146915","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2345","1.146924","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2346","1.148824","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2347","1.149195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2348","1.149202","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2349","1.150540","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2350","1.152758","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2351","1.152767","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2352","1.153719","172.30.1.205","172.30.1.104","TCP","74","40824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904380 TSecr=0 WS=128" +"2353","1.154026","172.30.1.104","172.30.1.205","TCP","66","135 > 40824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2354","1.154036","172.30.1.205","172.30.1.104","TCP","54","40824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2355","1.154381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2356","1.154713","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2357","1.154726","172.30.1.205","172.30.1.104","TCP","54","40824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2358","1.157004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2359","1.157420","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2360","1.157428","172.30.1.205","172.30.1.104","TCP","54","40824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2361","1.159252","172.30.1.205","172.30.1.104","TCP","54","40824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2362","1.159371","172.30.1.205","172.30.1.104","TCP","74","33462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904385 TSecr=0 WS=128" +"2363","1.159549","172.30.1.104","172.30.1.205","TCP","54","135 > 40824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2364","1.159574","172.30.1.104","172.30.1.205","TCP","54","135 > 40824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2365","1.159580","172.30.1.205","172.30.1.104","TCP","54","40824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2366","1.159663","172.30.1.104","172.30.1.205","TCP","66","49671 > 33462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2367","1.159671","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2368","1.160019","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2369","1.160343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2370","1.160354","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2371","1.162270","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2372","1.162641","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2373","1.162648","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2374","1.164000","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2375","1.167193","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2376","1.167204","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2377","1.168241","172.30.1.205","172.30.1.104","TCP","74","40828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904394 TSecr=0 WS=128" +"2378","1.168554","172.30.1.104","172.30.1.205","TCP","66","135 > 40828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2379","1.168565","172.30.1.205","172.30.1.104","TCP","54","40828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2380","1.168946","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2381","1.169262","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2382","1.169271","172.30.1.205","172.30.1.104","TCP","54","40828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2383","1.171459","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2384","1.171868","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2385","1.171875","172.30.1.205","172.30.1.104","TCP","54","40828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2386","1.173703","172.30.1.205","172.30.1.104","TCP","54","40828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2387","1.173830","172.30.1.205","172.30.1.104","TCP","74","33466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904400 TSecr=0 WS=128" +"2388","1.173969","172.30.1.104","172.30.1.205","TCP","54","135 > 40828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2389","1.173994","172.30.1.104","172.30.1.205","TCP","54","135 > 40828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2390","1.174001","172.30.1.205","172.30.1.104","TCP","54","40828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2391","1.174142","172.30.1.104","172.30.1.205","TCP","66","49671 > 33466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2392","1.174158","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2393","1.174547","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2394","1.174849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2395","1.174859","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2396","1.176745","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2397","1.177137","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2398","1.177144","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2399","1.178508","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2400","1.180771","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2401","1.180793","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2402","1.181811","172.30.1.205","172.30.1.104","TCP","74","40832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904408 TSecr=0 WS=128" +"2403","1.182117","172.30.1.104","172.30.1.205","TCP","66","135 > 40832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2404","1.182129","172.30.1.205","172.30.1.104","TCP","54","40832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2405","1.182480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2406","1.182799","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2407","1.182808","172.30.1.205","172.30.1.104","TCP","54","40832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2408","1.185033","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2409","1.185478","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2410","1.185484","172.30.1.205","172.30.1.104","TCP","54","40832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2411","1.187293","172.30.1.205","172.30.1.104","TCP","54","40832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2412","1.187428","172.30.1.205","172.30.1.104","TCP","74","33470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904413 TSecr=0 WS=128" +"2413","1.187571","172.30.1.104","172.30.1.205","TCP","54","135 > 40832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2414","1.187598","172.30.1.104","172.30.1.205","TCP","54","135 > 40832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2415","1.187605","172.30.1.205","172.30.1.104","TCP","54","40832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2416","1.187722","172.30.1.104","172.30.1.205","TCP","66","49671 > 33470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2417","1.187731","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2418","1.188077","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2419","1.188370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2420","1.188379","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2421","1.190264","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2422","1.190654","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2423","1.190660","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2424","1.191991","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2425","1.194167","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2426","1.194178","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2427","1.195148","172.30.1.205","172.30.1.104","TCP","74","40836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904421 TSecr=0 WS=128" +"2428","1.195454","172.30.1.104","172.30.1.205","TCP","66","135 > 40836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2429","1.195465","172.30.1.205","172.30.1.104","TCP","54","40836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2430","1.195858","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2431","1.196147","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2432","1.196157","172.30.1.205","172.30.1.104","TCP","54","40836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2433","1.198361","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2434","1.198833","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2435","1.198843","172.30.1.205","172.30.1.104","TCP","54","40836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2436","1.200725","172.30.1.205","172.30.1.104","TCP","54","40836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2437","1.200872","172.30.1.205","172.30.1.104","TCP","74","33474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904427 TSecr=0 WS=128" +"2438","1.200973","172.30.1.104","172.30.1.205","TCP","54","135 > 40836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2439","1.201026","172.30.1.104","172.30.1.205","TCP","54","135 > 40836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2440","1.201033","172.30.1.205","172.30.1.104","TCP","54","40836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2441","1.201155","172.30.1.104","172.30.1.205","TCP","66","49671 > 33474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2442","1.201164","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2443","1.201514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2444","1.201780","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2445","1.201789","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2446","1.203664","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2447","1.204102","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2448","1.204109","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2449","1.205541","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2450","1.207854","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2451","1.207864","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2452","1.208824","172.30.1.205","172.30.1.104","TCP","74","40840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904435 TSecr=0 WS=128" +"2453","1.209200","172.30.1.104","172.30.1.205","TCP","66","135 > 40840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2454","1.209211","172.30.1.205","172.30.1.104","TCP","54","40840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2455","1.209564","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2456","1.209935","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2457","1.209944","172.30.1.205","172.30.1.104","TCP","54","40840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2458","1.212112","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2459","1.212551","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2460","1.212558","172.30.1.205","172.30.1.104","TCP","54","40840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2461","1.214370","172.30.1.205","172.30.1.104","TCP","54","40840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2462","1.214481","172.30.1.205","172.30.1.104","TCP","74","33478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904440 TSecr=0 WS=128" +"2463","1.214908","172.30.1.104","172.30.1.205","TCP","66","49671 > 33478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2464","1.214919","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2465","1.214925","172.30.1.104","172.30.1.205","TCP","54","135 > 40840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2466","1.214986","172.30.1.104","172.30.1.205","TCP","54","135 > 40840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2467","1.214993","172.30.1.205","172.30.1.104","TCP","54","40840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2468","1.215302","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2469","1.215593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2470","1.215602","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2471","1.217541","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2472","1.217914","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2473","1.217920","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2474","1.219254","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2475","1.221612","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2476","1.221633","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2477","1.222607","172.30.1.205","172.30.1.104","TCP","74","40844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904449 TSecr=0 WS=128" +"2478","1.223080","172.30.1.104","172.30.1.205","TCP","66","135 > 40844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2479","1.223091","172.30.1.205","172.30.1.104","TCP","54","40844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2480","1.223439","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2481","1.223740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2482","1.223749","172.30.1.205","172.30.1.104","TCP","54","40844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2483","1.225966","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2484","1.226368","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2485","1.226381","172.30.1.205","172.30.1.104","TCP","54","40844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2486","1.227439","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2487","1.227488","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2488","1.227526","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2489","1.227560","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2490","1.227592","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2491","1.227619","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2492","1.227641","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2493","1.227662","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2494","1.227688","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2495","1.227715","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2496","1.227744","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2497","1.227809","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2498","1.227938","172.30.1.104","172.30.1.205","TCP","54","49671 > 33438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2499","1.227948","172.30.1.104","172.30.1.205","TCP","54","49671 > 33442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2500","1.227950","172.30.1.104","172.30.1.205","TCP","54","49671 > 33442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2501","1.227957","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2502","1.227964","172.30.1.104","172.30.1.205","TCP","54","49671 > 33438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2503","1.227966","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2504","1.227968","172.30.1.104","172.30.1.205","TCP","54","49671 > 33446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2505","1.227974","172.30.1.104","172.30.1.205","TCP","54","49671 > 33450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2506","1.228120","172.30.1.104","172.30.1.205","TCP","54","49671 > 33446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2507","1.228126","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2508","1.228132","172.30.1.104","172.30.1.205","TCP","54","49671 > 33454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2509","1.228137","172.30.1.104","172.30.1.205","TCP","54","49671 > 33450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2510","1.228140","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2511","1.228141","172.30.1.104","172.30.1.205","TCP","54","49671 > 33454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2512","1.228144","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2513","1.228481","172.30.1.104","172.30.1.205","TCP","54","49671 > 33458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2514","1.228488","172.30.1.104","172.30.1.205","TCP","54","49671 > 33462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2515","1.228491","172.30.1.104","172.30.1.205","TCP","54","49671 > 33466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2516","1.228493","172.30.1.104","172.30.1.205","TCP","54","49671 > 33470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2517","1.228496","172.30.1.104","172.30.1.205","TCP","54","49671 > 33470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2518","1.228501","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2519","1.228508","172.30.1.104","172.30.1.205","TCP","54","49671 > 33474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2520","1.228511","172.30.1.104","172.30.1.205","TCP","54","49671 > 33478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2521","1.228517","172.30.1.104","172.30.1.205","TCP","54","49671 > 33434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2522","1.228520","172.30.1.104","172.30.1.205","TCP","54","49671 > 33466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2523","1.228522","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2524","1.228523","172.30.1.104","172.30.1.205","TCP","54","49671 > 33458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2525","1.228525","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2526","1.228526","172.30.1.104","172.30.1.205","TCP","54","49671 > 33434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2527","1.228528","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2528","1.228529","172.30.1.104","172.30.1.205","TCP","54","49671 > 33478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2529","1.228531","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2530","1.228532","172.30.1.104","172.30.1.205","TCP","54","49671 > 33474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2531","1.228534","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2532","1.228535","172.30.1.104","172.30.1.205","TCP","54","49671 > 33462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2533","1.228537","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2534","1.229272","172.30.1.205","172.30.1.104","TCP","54","40844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2535","1.229396","172.30.1.205","172.30.1.104","TCP","74","33482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904455 TSecr=0 WS=128" +"2536","1.229559","172.30.1.104","172.30.1.205","TCP","54","135 > 40844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2537","1.229567","172.30.1.104","172.30.1.205","TCP","54","135 > 40844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2538","1.229572","172.30.1.205","172.30.1.104","TCP","54","40844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2539","1.229641","172.30.1.104","172.30.1.205","TCP","66","49671 > 33482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2540","1.229650","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2541","1.230002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2542","1.230275","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2543","1.230284","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2544","1.232140","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2545","1.232492","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2546","1.232498","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2547","1.233883","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2548","1.236162","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2549","1.236173","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2550","1.237160","172.30.1.205","172.30.1.104","TCP","74","40848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904463 TSecr=0 WS=128" +"2551","1.237460","172.30.1.104","172.30.1.205","TCP","66","135 > 40848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2552","1.237471","172.30.1.205","172.30.1.104","TCP","54","40848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2553","1.237825","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2554","1.238133","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2555","1.238151","172.30.1.205","172.30.1.104","TCP","54","40848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2556","1.240554","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2557","1.240945","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2558","1.240951","172.30.1.205","172.30.1.104","TCP","54","40848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2559","1.242753","172.30.1.205","172.30.1.104","TCP","54","40848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2560","1.242865","172.30.1.205","172.30.1.104","TCP","74","33486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904469 TSecr=0 WS=128" +"2561","1.243025","172.30.1.104","172.30.1.205","TCP","54","135 > 40848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2562","1.243034","172.30.1.104","172.30.1.205","TCP","54","135 > 40848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2563","1.243039","172.30.1.205","172.30.1.104","TCP","54","40848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2564","1.243118","172.30.1.104","172.30.1.205","TCP","66","49671 > 33486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2565","1.243126","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2566","1.243471","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2567","1.243742","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2568","1.243751","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2569","1.245652","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2570","1.246016","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2571","1.246028","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2572","1.247645","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2573","1.251482","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2574","1.251492","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2575","1.252427","172.30.1.205","172.30.1.104","TCP","74","40852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904478 TSecr=0 WS=128" +"2576","1.252736","172.30.1.104","172.30.1.205","TCP","66","135 > 40852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2577","1.252748","172.30.1.205","172.30.1.104","TCP","54","40852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2578","1.253120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2579","1.253407","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2580","1.253416","172.30.1.205","172.30.1.104","TCP","54","40852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2581","1.255583","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2582","1.255990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2583","1.256002","172.30.1.205","172.30.1.104","TCP","54","40852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2584","1.257988","172.30.1.205","172.30.1.104","TCP","54","40852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2585","1.258100","172.30.1.205","172.30.1.104","TCP","74","33490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904484 TSecr=0 WS=128" +"2586","1.258282","172.30.1.104","172.30.1.205","TCP","54","135 > 40852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2587","1.258291","172.30.1.104","172.30.1.205","TCP","54","135 > 40852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2588","1.258296","172.30.1.205","172.30.1.104","TCP","54","40852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2589","1.258370","172.30.1.104","172.30.1.205","TCP","66","49671 > 33490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2590","1.258378","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2591","1.258728","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2592","1.260244","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2593","1.260254","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2594","1.262154","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2595","1.262520","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2596","1.262527","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2597","1.263861","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2598","1.266123","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2599","1.266133","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2600","1.267081","172.30.1.205","172.30.1.104","TCP","74","40856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904493 TSecr=0 WS=128" +"2601","1.267364","172.30.1.104","172.30.1.205","TCP","66","135 > 40856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2602","1.267375","172.30.1.205","172.30.1.104","TCP","54","40856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2603","1.267726","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2604","1.268013","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2605","1.268022","172.30.1.205","172.30.1.104","TCP","54","40856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2606","1.270250","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2607","1.270645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2608","1.270651","172.30.1.205","172.30.1.104","TCP","54","40856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2609","1.272538","172.30.1.205","172.30.1.104","TCP","54","40856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2610","1.272644","172.30.1.205","172.30.1.104","TCP","74","33494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904499 TSecr=0 WS=128" +"2611","1.272834","172.30.1.104","172.30.1.205","TCP","54","135 > 40856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2612","1.272857","172.30.1.104","172.30.1.205","TCP","54","135 > 40856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2613","1.272864","172.30.1.205","172.30.1.104","TCP","54","40856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2614","1.272934","172.30.1.104","172.30.1.205","TCP","66","49671 > 33494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2615","1.272942","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2616","1.273320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2617","1.274090","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2618","1.274101","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2619","1.276075","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2620","1.276424","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2621","1.276430","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2622","1.277775","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2623","1.280124","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2624","1.280133","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2625","1.281082","172.30.1.205","172.30.1.104","TCP","74","40860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904507 TSecr=0 WS=128" +"2626","1.281364","172.30.1.104","172.30.1.205","TCP","66","135 > 40860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2627","1.281375","172.30.1.205","172.30.1.104","TCP","54","40860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2628","1.281755","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2629","1.282026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2630","1.282036","172.30.1.205","172.30.1.104","TCP","54","40860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2631","1.284268","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2632","1.284670","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2633","1.284683","172.30.1.205","172.30.1.104","TCP","54","40860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2634","1.286683","172.30.1.205","172.30.1.104","TCP","54","40860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2635","1.286795","172.30.1.205","172.30.1.104","TCP","74","33498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904513 TSecr=0 WS=128" +"2636","1.286949","172.30.1.104","172.30.1.205","TCP","54","135 > 40860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2637","1.286973","172.30.1.104","172.30.1.205","TCP","54","135 > 40860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2638","1.286978","172.30.1.205","172.30.1.104","TCP","54","40860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2639","1.287100","172.30.1.104","172.30.1.205","TCP","66","49671 > 33498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2640","1.287108","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2641","1.287459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2642","1.287757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2643","1.287765","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2644","1.289746","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2645","1.290185","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2646","1.290191","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2647","1.291580","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2648","1.293976","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2649","1.293986","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2650","1.294921","172.30.1.205","172.30.1.104","TCP","74","40864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904521 TSecr=0 WS=128" +"2651","1.295234","172.30.1.104","172.30.1.205","TCP","66","135 > 40864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2652","1.295245","172.30.1.205","172.30.1.104","TCP","54","40864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2653","1.295592","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2654","1.295892","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2655","1.295901","172.30.1.205","172.30.1.104","TCP","54","40864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2656","1.298102","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2657","1.298496","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2658","1.298503","172.30.1.205","172.30.1.104","TCP","54","40864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2659","1.300301","172.30.1.205","172.30.1.104","TCP","54","40864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2660","1.300412","172.30.1.205","172.30.1.104","TCP","74","33502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904526 TSecr=0 WS=128" +"2661","1.300566","172.30.1.104","172.30.1.205","TCP","54","135 > 40864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2662","1.300577","172.30.1.104","172.30.1.205","TCP","54","135 > 40864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2663","1.300582","172.30.1.205","172.30.1.104","TCP","54","40864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2664","1.300708","172.30.1.104","172.30.1.205","TCP","66","49671 > 33502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2665","1.300716","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2666","1.301086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2667","1.301429","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2668","1.301438","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2669","1.303329","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2670","1.303709","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2671","1.303715","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2672","1.305092","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2673","1.307328","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2674","1.307339","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2675","1.308283","172.30.1.205","172.30.1.104","TCP","74","40868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904534 TSecr=0 WS=128" +"2676","1.308612","172.30.1.104","172.30.1.205","TCP","66","135 > 40868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2677","1.308623","172.30.1.205","172.30.1.104","TCP","54","40868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2678","1.309006","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2679","1.311930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2680","1.311941","172.30.1.205","172.30.1.104","TCP","54","40868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2681","1.314173","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2682","1.315660","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2683","1.315667","172.30.1.205","172.30.1.104","TCP","54","40868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2684","1.317538","172.30.1.205","172.30.1.104","TCP","54","40868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2685","1.317649","172.30.1.205","172.30.1.104","TCP","74","33506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904544 TSecr=0 WS=128" +"2686","1.317810","172.30.1.104","172.30.1.205","TCP","54","135 > 40868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2687","1.317829","172.30.1.104","172.30.1.205","TCP","54","135 > 40868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2688","1.317839","172.30.1.205","172.30.1.104","TCP","54","40868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2689","1.317932","172.30.1.104","172.30.1.205","TCP","66","49671 > 33506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2690","1.317947","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2691","1.318476","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2692","1.318781","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2693","1.318790","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2694","1.320687","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2695","1.321066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2696","1.321073","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2697","1.322451","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2698","1.323677","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2699","1.323686","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2700","1.324627","172.30.1.205","172.30.1.104","TCP","74","40872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904551 TSecr=0 WS=128" +"2701","1.324940","172.30.1.104","172.30.1.205","TCP","66","135 > 40872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2702","1.324952","172.30.1.205","172.30.1.104","TCP","54","40872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2703","1.325340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2704","1.325635","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2705","1.325644","172.30.1.205","172.30.1.104","TCP","54","40872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2706","1.327812","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2707","1.328196","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2708","1.328202","172.30.1.205","172.30.1.104","TCP","54","40872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2709","1.330031","172.30.1.205","172.30.1.104","TCP","54","40872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2710","1.330143","172.30.1.205","172.30.1.104","TCP","74","33510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904556 TSecr=0 WS=128" +"2711","1.330326","172.30.1.104","172.30.1.205","TCP","54","135 > 40872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2712","1.330350","172.30.1.104","172.30.1.205","TCP","54","135 > 40872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2713","1.330356","172.30.1.205","172.30.1.104","TCP","54","40872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2714","1.330435","172.30.1.104","172.30.1.205","TCP","66","49671 > 33510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2715","1.330443","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2716","1.330790","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2717","1.331077","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2718","1.331086","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2719","1.332999","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2720","1.333369","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2721","1.333375","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2722","1.334731","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2723","1.335647","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2724","1.335656","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2725","1.336593","172.30.1.205","172.30.1.104","TCP","74","40876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904563 TSecr=0 WS=128" +"2726","1.336879","172.30.1.104","172.30.1.205","TCP","66","135 > 40876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2727","1.336901","172.30.1.205","172.30.1.104","TCP","54","40876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2728","1.337500","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2729","1.337794","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2730","1.337803","172.30.1.205","172.30.1.104","TCP","54","40876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2731","1.339985","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2732","1.340391","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2733","1.340397","172.30.1.205","172.30.1.104","TCP","54","40876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2734","1.342216","172.30.1.205","172.30.1.104","TCP","54","40876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2735","1.342328","172.30.1.205","172.30.1.104","TCP","74","33514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904568 TSecr=0 WS=128" +"2736","1.342479","172.30.1.104","172.30.1.205","TCP","54","135 > 40876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2737","1.342518","172.30.1.104","172.30.1.205","TCP","54","135 > 40876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2738","1.342524","172.30.1.205","172.30.1.104","TCP","54","40876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2739","1.342633","172.30.1.104","172.30.1.205","TCP","66","49671 > 33514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2740","1.342642","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2741","1.342987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2742","1.343680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2743","1.343689","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2744","1.345595","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2745","1.345972","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2746","1.345979","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2747","1.347438","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2748","1.348412","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2749","1.348421","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2750","1.349391","172.30.1.205","172.30.1.104","TCP","74","40880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904575 TSecr=0 WS=128" +"2751","1.349683","172.30.1.104","172.30.1.205","TCP","66","135 > 40880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2752","1.349694","172.30.1.205","172.30.1.104","TCP","54","40880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2753","1.350042","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2754","1.350360","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2755","1.350369","172.30.1.205","172.30.1.104","TCP","54","40880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2756","1.352553","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2757","1.352950","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2758","1.352964","172.30.1.205","172.30.1.104","TCP","54","40880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2759","1.355053","172.30.1.205","172.30.1.104","TCP","54","40880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2760","1.355164","172.30.1.205","172.30.1.104","TCP","74","33518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904581 TSecr=0 WS=128" +"2761","1.355332","172.30.1.104","172.30.1.205","TCP","54","135 > 40880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2762","1.355356","172.30.1.104","172.30.1.205","TCP","54","135 > 40880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2763","1.355361","172.30.1.205","172.30.1.104","TCP","54","40880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2764","1.355447","172.30.1.104","172.30.1.205","TCP","66","49671 > 33518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2765","1.355455","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2766","1.355805","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2767","1.356094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2768","1.356103","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2769","1.357973","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2770","1.358353","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2771","1.358359","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2772","1.359727","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2773","1.360655","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2774","1.360664","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2775","1.361634","172.30.1.205","172.30.1.104","TCP","74","40884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904588 TSecr=0 WS=128" +"2776","1.361949","172.30.1.104","172.30.1.205","TCP","66","135 > 40884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2777","1.361959","172.30.1.205","172.30.1.104","TCP","54","40884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2778","1.362309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2779","1.362611","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2780","1.362620","172.30.1.205","172.30.1.104","TCP","54","40884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2781","1.364815","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2782","1.365246","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2783","1.365253","172.30.1.205","172.30.1.104","TCP","54","40884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2784","1.367065","172.30.1.205","172.30.1.104","TCP","54","40884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2785","1.367176","172.30.1.205","172.30.1.104","TCP","74","33522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904593 TSecr=0 WS=128" +"2786","1.367325","172.30.1.104","172.30.1.205","TCP","54","135 > 40884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2787","1.367350","172.30.1.104","172.30.1.205","TCP","54","135 > 40884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2788","1.367355","172.30.1.205","172.30.1.104","TCP","54","40884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2789","1.367468","172.30.1.104","172.30.1.205","TCP","66","49671 > 33522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2790","1.367476","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2791","1.367837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2792","1.368509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2793","1.368527","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2794","1.370578","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2795","1.370981","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2796","1.370988","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2797","1.372347","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2798","1.373282","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2799","1.373291","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2800","1.374221","172.30.1.205","172.30.1.104","TCP","74","40888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904600 TSecr=0 WS=128" +"2801","1.374511","172.30.1.104","172.30.1.205","TCP","66","135 > 40888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2802","1.374522","172.30.1.205","172.30.1.104","TCP","54","40888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2803","1.374874","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2804","1.375179","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2805","1.375188","172.30.1.205","172.30.1.104","TCP","54","40888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2806","1.377426","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2807","1.377810","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2808","1.377817","172.30.1.205","172.30.1.104","TCP","54","40888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2809","1.379617","172.30.1.205","172.30.1.104","TCP","54","40888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2810","1.379724","172.30.1.205","172.30.1.104","TCP","74","33526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904606 TSecr=0 WS=128" +"2811","1.379873","172.30.1.104","172.30.1.205","TCP","54","135 > 40888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2812","1.379896","172.30.1.104","172.30.1.205","TCP","54","135 > 40888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2813","1.379901","172.30.1.205","172.30.1.104","TCP","54","40888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2814","1.380017","172.30.1.104","172.30.1.205","TCP","66","49671 > 33526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2815","1.380025","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2816","1.380367","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2817","1.380649","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2818","1.380659","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2819","1.382553","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2820","1.382947","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2821","1.382954","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2822","1.384294","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2823","1.385257","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2824","1.385275","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2825","1.386360","172.30.1.205","172.30.1.104","TCP","74","40892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904612 TSecr=0 WS=128" +"2826","1.386676","172.30.1.104","172.30.1.205","TCP","66","135 > 40892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2827","1.386687","172.30.1.205","172.30.1.104","TCP","54","40892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2828","1.387031","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2829","1.387321","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2830","1.387330","172.30.1.205","172.30.1.104","TCP","54","40892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2831","1.389540","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2832","1.389931","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2833","1.389938","172.30.1.205","172.30.1.104","TCP","54","40892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2834","1.391090","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2835","1.391139","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2836","1.391176","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2837","1.391205","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2838","1.391239","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2839","1.391266","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2840","1.391293","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2841","1.391319","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2842","1.391352","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2843","1.391379","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2844","1.391406","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2845","1.391433","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2846","1.391631","172.30.1.104","172.30.1.205","TCP","54","49671 > 33486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2847","1.391653","172.30.1.104","172.30.1.205","TCP","54","49671 > 33490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2848","1.391681","172.30.1.104","172.30.1.205","TCP","54","49671 > 33482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2849","1.391707","172.30.1.104","172.30.1.205","TCP","54","49671 > 33494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2850","1.391735","172.30.1.104","172.30.1.205","TCP","54","49671 > 33498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2851","1.391761","172.30.1.104","172.30.1.205","TCP","54","49671 > 33482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2852","1.391767","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2853","1.391787","172.30.1.104","172.30.1.205","TCP","54","49671 > 33502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2854","1.391818","172.30.1.104","172.30.1.205","TCP","54","49671 > 33506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2855","1.391844","172.30.1.104","172.30.1.205","TCP","54","49671 > 33510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2856","1.391873","172.30.1.104","172.30.1.205","TCP","54","49671 > 33514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2857","1.391902","172.30.1.104","172.30.1.205","TCP","54","49671 > 33518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2858","1.391929","172.30.1.104","172.30.1.205","TCP","54","49671 > 33522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2859","1.391954","172.30.1.104","172.30.1.205","TCP","54","49671 > 33518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2860","1.391971","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2861","1.391990","172.30.1.104","172.30.1.205","TCP","54","49671 > 33522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2862","1.391993","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2863","1.392007","172.30.1.104","172.30.1.205","TCP","54","49671 > 33514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2864","1.392010","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2865","1.392034","172.30.1.104","172.30.1.205","TCP","54","49671 > 33510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2866","1.392037","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2867","1.392060","172.30.1.104","172.30.1.205","TCP","54","49671 > 33506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2868","1.392063","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2869","1.392086","172.30.1.104","172.30.1.205","TCP","54","49671 > 33502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2870","1.392089","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2871","1.392112","172.30.1.104","172.30.1.205","TCP","54","49671 > 33498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2872","1.392115","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2873","1.392138","172.30.1.104","172.30.1.205","TCP","54","49671 > 33494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2874","1.392141","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2875","1.392166","172.30.1.104","172.30.1.205","TCP","54","49671 > 33486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2876","1.392169","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2877","1.392192","172.30.1.104","172.30.1.205","TCP","54","49671 > 33490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2878","1.392196","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2879","1.392219","172.30.1.104","172.30.1.205","TCP","54","49671 > 33526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2880","1.392245","172.30.1.104","172.30.1.205","TCP","54","49671 > 33526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"2881","1.392249","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"2882","1.393118","172.30.1.205","172.30.1.104","TCP","54","40892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2883","1.393233","172.30.1.205","172.30.1.104","TCP","74","33530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904619 TSecr=0 WS=128" +"2884","1.393376","172.30.1.104","172.30.1.205","TCP","54","135 > 40892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2885","1.393426","172.30.1.104","172.30.1.205","TCP","54","135 > 40892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2886","1.393431","172.30.1.205","172.30.1.104","TCP","54","40892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2887","1.393512","172.30.1.104","172.30.1.205","TCP","66","49671 > 33530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2888","1.393521","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2889","1.393876","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2890","1.394173","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2891","1.394182","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2892","1.396060","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2893","1.396433","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2894","1.396439","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2895","1.397823","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2896","1.398802","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2897","1.398812","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2898","1.399733","172.30.1.205","172.30.1.104","TCP","74","40896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904626 TSecr=0 WS=128" +"2899","1.400080","172.30.1.104","172.30.1.205","TCP","66","135 > 40896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2900","1.400091","172.30.1.205","172.30.1.104","TCP","54","40896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2901","1.400437","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2902","1.400731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2903","1.400748","172.30.1.205","172.30.1.104","TCP","54","40896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2904","1.403127","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2905","1.403528","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2906","1.403535","172.30.1.205","172.30.1.104","TCP","54","40896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2907","1.405362","172.30.1.205","172.30.1.104","TCP","54","40896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2908","1.405478","172.30.1.205","172.30.1.104","TCP","74","33534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904631 TSecr=0 WS=128" +"2909","1.405622","172.30.1.104","172.30.1.205","TCP","54","135 > 40896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2910","1.405647","172.30.1.104","172.30.1.205","TCP","54","135 > 40896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2911","1.405652","172.30.1.205","172.30.1.104","TCP","54","40896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2912","1.405765","172.30.1.104","172.30.1.205","TCP","66","49671 > 33534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2913","1.405774","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2914","1.406116","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2915","1.406399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2916","1.406408","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2917","1.408275","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2918","1.408650","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2919","1.408662","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2920","1.410364","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2921","1.411319","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2922","1.411329","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2923","1.412252","172.30.1.205","172.30.1.104","TCP","74","40900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904638 TSecr=0 WS=128" +"2924","1.412572","172.30.1.104","172.30.1.205","TCP","66","135 > 40900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2925","1.412582","172.30.1.205","172.30.1.104","TCP","54","40900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2926","1.412959","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2927","1.413259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2928","1.413268","172.30.1.205","172.30.1.104","TCP","54","40900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2929","1.415432","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2930","1.415860","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2931","1.415867","172.30.1.205","172.30.1.104","TCP","54","40900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2932","1.417688","172.30.1.205","172.30.1.104","TCP","54","40900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2933","1.417798","172.30.1.205","172.30.1.104","TCP","74","33538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904644 TSecr=0 WS=128" +"2934","1.417946","172.30.1.104","172.30.1.205","TCP","54","135 > 40900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2935","1.417999","172.30.1.104","172.30.1.205","TCP","54","135 > 40900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2936","1.418017","172.30.1.205","172.30.1.104","TCP","54","40900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2937","1.418113","172.30.1.104","172.30.1.205","TCP","66","49671 > 33538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2938","1.418121","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2939","1.418469","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2940","1.418770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2941","1.418779","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2942","1.420643","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2943","1.421038","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2944","1.421045","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2945","1.422443","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2946","1.424117","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2947","1.424136","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2948","1.425232","172.30.1.205","172.30.1.104","TCP","74","40904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904651 TSecr=0 WS=128" +"2949","1.425550","172.30.1.104","172.30.1.205","TCP","66","135 > 40904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2950","1.425559","172.30.1.205","172.30.1.104","TCP","54","40904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2951","1.425904","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2952","1.426219","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2953","1.426228","172.30.1.205","172.30.1.104","TCP","54","40904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2954","1.428449","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2955","1.428843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2956","1.428850","172.30.1.205","172.30.1.104","TCP","54","40904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2957","1.430679","172.30.1.205","172.30.1.104","TCP","54","40904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2958","1.430790","172.30.1.205","172.30.1.104","TCP","74","33542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904657 TSecr=0 WS=128" +"2959","1.430936","172.30.1.104","172.30.1.205","TCP","54","135 > 40904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2960","1.430960","172.30.1.104","172.30.1.205","TCP","54","135 > 40904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2961","1.430965","172.30.1.205","172.30.1.104","TCP","54","40904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2962","1.431069","172.30.1.104","172.30.1.205","TCP","66","49671 > 33542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2963","1.431078","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2964","1.431428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2965","1.431728","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2966","1.431737","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2967","1.433636","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2968","1.434068","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2969","1.434075","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2970","1.435413","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2971","1.436356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2972","1.436365","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2973","1.437320","172.30.1.205","172.30.1.104","TCP","74","40908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904663 TSecr=0 WS=128" +"2974","1.437624","172.30.1.104","172.30.1.205","TCP","66","135 > 40908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2975","1.437634","172.30.1.205","172.30.1.104","TCP","54","40908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2976","1.437981","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"2977","1.438272","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2978","1.438281","172.30.1.205","172.30.1.104","TCP","54","40908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2979","1.440458","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"2980","1.440860","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"2981","1.440867","172.30.1.205","172.30.1.104","TCP","54","40908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2982","1.442678","172.30.1.205","172.30.1.104","TCP","54","40908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"2983","1.442789","172.30.1.205","172.30.1.104","TCP","74","33546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904669 TSecr=0 WS=128" +"2984","1.442943","172.30.1.104","172.30.1.205","TCP","54","135 > 40908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2985","1.442967","172.30.1.104","172.30.1.205","TCP","54","135 > 40908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"2986","1.442972","172.30.1.205","172.30.1.104","TCP","54","40908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"2987","1.443058","172.30.1.104","172.30.1.205","TCP","66","49671 > 33546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"2988","1.443066","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"2989","1.443408","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"2990","1.443701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"2991","1.443710","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"2992","1.445613","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"2993","1.446022","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"2994","1.446031","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"2995","1.447450","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"2996","1.448422","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"2997","1.448433","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"2998","1.449411","172.30.1.205","172.30.1.104","TCP","74","40912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904675 TSecr=0 WS=128" +"2999","1.449737","172.30.1.104","172.30.1.205","TCP","66","135 > 40912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3000","1.449748","172.30.1.205","172.30.1.104","TCP","54","40912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3001","1.450096","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3002","1.450431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3003","1.450440","172.30.1.205","172.30.1.104","TCP","54","40912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3004","1.452619","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3005","1.453020","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3006","1.453027","172.30.1.205","172.30.1.104","TCP","54","40912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3007","1.454827","172.30.1.205","172.30.1.104","TCP","54","40912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3008","1.454936","172.30.1.205","172.30.1.104","TCP","74","33550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904681 TSecr=0 WS=128" +"3009","1.455091","172.30.1.104","172.30.1.205","TCP","54","135 > 40912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3010","1.455116","172.30.1.104","172.30.1.205","TCP","54","135 > 40912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3011","1.455121","172.30.1.205","172.30.1.104","TCP","54","40912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3012","1.455205","172.30.1.104","172.30.1.205","TCP","66","49671 > 33550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3013","1.455214","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3014","1.455558","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3015","1.455855","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3016","1.455871","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3017","1.457965","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3018","1.458349","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3019","1.458355","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3020","1.459684","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3021","1.460651","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3022","1.460660","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3023","1.461609","172.30.1.205","172.30.1.104","TCP","74","40916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904688 TSecr=0 WS=128" +"3024","1.461925","172.30.1.104","172.30.1.205","TCP","66","135 > 40916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3025","1.461936","172.30.1.205","172.30.1.104","TCP","54","40916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3026","1.462278","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3027","1.462580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3028","1.462589","172.30.1.205","172.30.1.104","TCP","54","40916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3029","1.464802","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3030","1.465226","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3031","1.465232","172.30.1.205","172.30.1.104","TCP","54","40916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3032","1.467023","172.30.1.205","172.30.1.104","TCP","54","40916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3033","1.467132","172.30.1.205","172.30.1.104","TCP","74","33554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904693 TSecr=0 WS=128" +"3034","1.467313","172.30.1.104","172.30.1.205","TCP","54","135 > 40916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3035","1.467336","172.30.1.104","172.30.1.205","TCP","54","135 > 40916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3036","1.467342","172.30.1.205","172.30.1.104","TCP","54","40916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3037","1.467421","172.30.1.104","172.30.1.205","TCP","66","49671 > 33554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3038","1.467429","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3039","1.467776","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3040","1.468065","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3041","1.468074","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3042","1.469977","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3043","1.470365","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3044","1.470371","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3045","1.471715","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3046","1.472698","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3047","1.472710","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3048","1.473704","172.30.1.205","172.30.1.104","TCP","74","40920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904700 TSecr=0 WS=128" +"3049","1.474003","172.30.1.104","172.30.1.205","TCP","66","135 > 40920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3050","1.474014","172.30.1.205","172.30.1.104","TCP","54","40920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3051","1.474387","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3052","1.474677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3053","1.474686","172.30.1.205","172.30.1.104","TCP","54","40920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3054","1.476948","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3055","1.477363","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3056","1.477369","172.30.1.205","172.30.1.104","TCP","54","40920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3057","1.479174","172.30.1.205","172.30.1.104","TCP","54","40920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3058","1.479282","172.30.1.205","172.30.1.104","TCP","74","33558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904705 TSecr=0 WS=128" +"3059","1.479465","172.30.1.104","172.30.1.205","TCP","54","135 > 40920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3060","1.479507","172.30.1.104","172.30.1.205","TCP","54","135 > 40920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3061","1.479513","172.30.1.205","172.30.1.104","TCP","54","40920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3062","1.479605","172.30.1.104","172.30.1.205","TCP","66","49671 > 33558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3063","1.479614","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3064","1.479975","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3065","1.480369","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3066","1.480377","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3067","1.482271","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3068","1.482648","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3069","1.482654","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3070","1.483989","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3071","1.484932","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3072","1.484941","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3073","1.485873","172.30.1.205","172.30.1.104","TCP","74","40924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904712 TSecr=0 WS=128" +"3074","1.486187","172.30.1.104","172.30.1.205","TCP","66","135 > 40924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3075","1.486197","172.30.1.205","172.30.1.104","TCP","54","40924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3076","1.486545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3077","1.486862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3078","1.486871","172.30.1.205","172.30.1.104","TCP","54","40924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3079","1.489040","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3080","1.489437","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3081","1.489449","172.30.1.205","172.30.1.104","TCP","54","40924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3082","1.491443","172.30.1.205","172.30.1.104","TCP","54","40924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3083","1.491550","172.30.1.205","172.30.1.104","TCP","74","33562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904717 TSecr=0 WS=128" +"3084","1.491703","172.30.1.104","172.30.1.205","TCP","54","135 > 40924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3085","1.491748","172.30.1.104","172.30.1.205","TCP","54","135 > 40924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3086","1.491754","172.30.1.205","172.30.1.104","TCP","54","40924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3087","1.491863","172.30.1.104","172.30.1.205","TCP","66","49671 > 33562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3088","1.491871","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3089","1.492212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3090","1.492531","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3091","1.492565","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3092","1.494453","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3093","1.494870","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3094","1.494877","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3095","1.496201","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3096","1.497155","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3097","1.497164","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3098","1.498090","172.30.1.205","172.30.1.104","TCP","74","40928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904724 TSecr=0 WS=128" +"3099","1.498375","172.30.1.104","172.30.1.205","TCP","66","135 > 40928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3100","1.498385","172.30.1.205","172.30.1.104","TCP","54","40928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3101","1.498727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3102","1.499026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3103","1.499036","172.30.1.205","172.30.1.104","TCP","54","40928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3104","1.501270","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3105","1.501660","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3106","1.501666","172.30.1.205","172.30.1.104","TCP","54","40928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3107","1.503464","172.30.1.205","172.30.1.104","TCP","54","40928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3108","1.503581","172.30.1.205","172.30.1.104","TCP","74","33566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904730 TSecr=0 WS=128" +"3109","1.503714","172.30.1.104","172.30.1.205","TCP","54","135 > 40928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3110","1.503740","172.30.1.104","172.30.1.205","TCP","54","135 > 40928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3111","1.503745","172.30.1.205","172.30.1.104","TCP","54","40928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3112","1.503858","172.30.1.104","172.30.1.205","TCP","66","49671 > 33566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3113","1.503866","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3114","1.504225","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3115","1.504523","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3116","1.504532","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3117","1.506456","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3118","1.506877","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3119","1.506885","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3120","1.508233","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3121","1.509162","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3122","1.509172","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3123","1.510095","172.30.1.205","172.30.1.104","TCP","74","40932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904736 TSecr=0 WS=128" +"3124","1.510429","172.30.1.104","172.30.1.205","TCP","66","135 > 40932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3125","1.510439","172.30.1.205","172.30.1.104","TCP","54","40932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3126","1.510784","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3127","1.511072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3128","1.511081","172.30.1.205","172.30.1.104","TCP","54","40932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3129","1.513284","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3130","1.513670","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3131","1.513676","172.30.1.205","172.30.1.104","TCP","54","40932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3132","1.515456","172.30.1.205","172.30.1.104","TCP","54","40932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3133","1.515564","172.30.1.205","172.30.1.104","TCP","74","33570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904741 TSecr=0 WS=128" +"3134","1.515731","172.30.1.104","172.30.1.205","TCP","54","135 > 40932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3135","1.515755","172.30.1.104","172.30.1.205","TCP","54","135 > 40932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3136","1.515761","172.30.1.205","172.30.1.104","TCP","54","40932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3137","1.515845","172.30.1.104","172.30.1.205","TCP","66","49671 > 33570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3138","1.515853","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3139","1.516196","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3140","1.516509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3141","1.516515","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3142","1.518405","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3143","1.518864","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3144","1.518870","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3145","1.520195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3146","1.521171","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3147","1.521180","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3148","1.522104","172.30.1.205","172.30.1.104","TCP","74","40936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904748 TSecr=0 WS=128" +"3149","1.522415","172.30.1.104","172.30.1.205","TCP","66","135 > 40936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3150","1.522436","172.30.1.205","172.30.1.104","TCP","54","40936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3151","1.523039","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3152","1.523376","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3153","1.523385","172.30.1.205","172.30.1.104","TCP","54","40936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3154","1.525565","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3155","1.525947","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3156","1.525953","172.30.1.205","172.30.1.104","TCP","54","40936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3157","1.527726","172.30.1.205","172.30.1.104","TCP","54","40936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3158","1.527838","172.30.1.205","172.30.1.104","TCP","74","33574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904754 TSecr=0 WS=128" +"3159","1.528031","172.30.1.104","172.30.1.205","TCP","54","135 > 40936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3160","1.528040","172.30.1.104","172.30.1.205","TCP","54","135 > 40936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3161","1.528045","172.30.1.205","172.30.1.104","TCP","54","40936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3162","1.528143","172.30.1.104","172.30.1.205","TCP","66","49671 > 33574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3163","1.528155","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3164","1.528813","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3165","1.529555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3166","1.529573","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3167","1.531556","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3168","1.531910","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3169","1.531916","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3170","1.533271","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3171","1.535140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3172","1.535150","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3173","1.536065","172.30.1.205","172.30.1.104","TCP","74","40940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904762 TSecr=0 WS=128" +"3174","1.536378","172.30.1.104","172.30.1.205","TCP","66","135 > 40940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3175","1.536388","172.30.1.205","172.30.1.104","TCP","54","40940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3176","1.536730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3177","1.537008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3178","1.537017","172.30.1.205","172.30.1.104","TCP","54","40940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3179","1.539185","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3180","1.539574","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3181","1.539581","172.30.1.205","172.30.1.104","TCP","54","40940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3182","1.540409","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3183","1.540457","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3184","1.540494","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3185","1.540528","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3186","1.540559","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3187","1.540590","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3188","1.540623","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3189","1.540651","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3190","1.540677","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3191","1.540702","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3192","1.540723","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3193","1.540816","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3194","1.540985","172.30.1.104","172.30.1.205","TCP","54","49671 > 33534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3195","1.540994","172.30.1.104","172.30.1.205","TCP","54","49671 > 33538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3196","1.540996","172.30.1.104","172.30.1.205","TCP","54","49671 > 33534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3197","1.541002","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3198","1.541015","172.30.1.104","172.30.1.205","TCP","54","49671 > 33542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3199","1.541022","172.30.1.104","172.30.1.205","TCP","54","49671 > 33546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3200","1.541025","172.30.1.104","172.30.1.205","TCP","54","49671 > 33546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3201","1.541028","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3202","1.541029","172.30.1.104","172.30.1.205","TCP","54","49671 > 33538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3203","1.541031","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3204","1.541032","172.30.1.104","172.30.1.205","TCP","54","49671 > 33542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3205","1.541034","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3206","1.541035","172.30.1.104","172.30.1.205","TCP","54","49671 > 33550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3207","1.541038","172.30.1.104","172.30.1.205","TCP","54","49671 > 33554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3208","1.541272","172.30.1.104","172.30.1.205","TCP","54","49671 > 33558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3209","1.541278","172.30.1.104","172.30.1.205","TCP","54","49671 > 33562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3210","1.541281","172.30.1.104","172.30.1.205","TCP","54","49671 > 33550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3211","1.541285","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3212","1.541292","172.30.1.104","172.30.1.205","TCP","54","49671 > 33562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3213","1.541293","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3214","1.541295","172.30.1.104","172.30.1.205","TCP","54","49671 > 33554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3215","1.541296","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3216","1.541298","172.30.1.104","172.30.1.205","TCP","54","49671 > 33558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3217","1.541302","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3218","1.541304","172.30.1.104","172.30.1.205","TCP","54","49671 > 33566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3219","1.541307","172.30.1.104","172.30.1.205","TCP","54","49671 > 33574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3220","1.541511","172.30.1.104","172.30.1.205","TCP","54","49671 > 33570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3221","1.541517","172.30.1.104","172.30.1.205","TCP","54","49671 > 33530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3222","1.541519","172.30.1.104","172.30.1.205","TCP","54","49671 > 33566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3223","1.541523","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3224","1.541529","172.30.1.104","172.30.1.205","TCP","54","49671 > 33530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3225","1.541531","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3226","1.541532","172.30.1.104","172.30.1.205","TCP","54","49671 > 33574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3227","1.541534","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3228","1.541535","172.30.1.104","172.30.1.205","TCP","54","49671 > 33570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3229","1.541541","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3230","1.542226","172.30.1.205","172.30.1.104","TCP","54","40940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3231","1.542333","172.30.1.205","172.30.1.104","TCP","74","33578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904768 TSecr=0 WS=128" +"3232","1.542472","172.30.1.104","172.30.1.205","TCP","54","135 > 40940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3233","1.542506","172.30.1.104","172.30.1.205","TCP","54","135 > 40940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3234","1.542511","172.30.1.205","172.30.1.104","TCP","54","40940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3235","1.542611","172.30.1.104","172.30.1.205","TCP","66","49671 > 33578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3236","1.542619","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3237","1.542964","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3238","1.543255","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3239","1.543263","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3240","1.545166","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3241","1.545539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3242","1.545545","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3243","1.546883","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3244","1.548714","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3245","1.548723","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3246","1.549674","172.30.1.205","172.30.1.104","TCP","74","40944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904776 TSecr=0 WS=128" +"3247","1.549971","172.30.1.104","172.30.1.205","TCP","66","135 > 40944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3248","1.549992","172.30.1.205","172.30.1.104","TCP","54","40944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3249","1.550543","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3250","1.550813","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3251","1.550822","172.30.1.205","172.30.1.104","TCP","54","40944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3252","1.553009","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3253","1.553404","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3254","1.553410","172.30.1.205","172.30.1.104","TCP","54","40944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3255","1.555229","172.30.1.205","172.30.1.104","TCP","54","40944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3256","1.555347","172.30.1.205","172.30.1.104","TCP","74","33582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904781 TSecr=0 WS=128" +"3257","1.555468","172.30.1.104","172.30.1.205","TCP","54","135 > 40944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3258","1.555498","172.30.1.104","172.30.1.205","TCP","54","135 > 40944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3259","1.555503","172.30.1.205","172.30.1.104","TCP","54","40944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3260","1.555629","172.30.1.104","172.30.1.205","TCP","66","49671 > 33582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3261","1.555637","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3262","1.555980","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3263","1.556249","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3264","1.556258","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3265","1.558143","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3266","1.558540","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3267","1.558546","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3268","1.559865","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3269","1.560802","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3270","1.560811","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3271","1.561737","172.30.1.205","172.30.1.104","TCP","74","40948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904788 TSecr=0 WS=128" +"3272","1.562041","172.30.1.104","172.30.1.205","TCP","66","135 > 40948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3273","1.562062","172.30.1.205","172.30.1.104","TCP","54","40948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3274","1.562604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3275","1.562874","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3276","1.562883","172.30.1.205","172.30.1.104","TCP","54","40948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3277","1.565057","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3278","1.565434","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3279","1.565441","172.30.1.205","172.30.1.104","TCP","54","40948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3280","1.567235","172.30.1.205","172.30.1.104","TCP","54","40948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3281","1.567344","172.30.1.205","172.30.1.104","TCP","74","33586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904793 TSecr=0 WS=128" +"3282","1.567516","172.30.1.104","172.30.1.205","TCP","54","135 > 40948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3283","1.567525","172.30.1.104","172.30.1.205","TCP","54","135 > 40948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3284","1.567530","172.30.1.205","172.30.1.104","TCP","54","40948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3285","1.567647","172.30.1.104","172.30.1.205","TCP","66","49671 > 33586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3286","1.567655","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3287","1.567997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3288","1.568273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3289","1.568282","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3290","1.570161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3291","1.572378","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3292","1.572385","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3293","1.573736","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3294","1.575333","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3295","1.575342","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3296","1.576260","172.30.1.205","172.30.1.104","TCP","74","40952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904802 TSecr=0 WS=128" +"3297","1.576538","172.30.1.104","172.30.1.205","TCP","66","135 > 40952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3298","1.576548","172.30.1.205","172.30.1.104","TCP","54","40952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3299","1.576918","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3300","1.577240","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3301","1.577248","172.30.1.205","172.30.1.104","TCP","54","40952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3302","1.579421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3303","1.579784","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3304","1.579790","172.30.1.205","172.30.1.104","TCP","54","40952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3305","1.581705","172.30.1.205","172.30.1.104","TCP","54","40952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3306","1.581816","172.30.1.205","172.30.1.104","TCP","74","33590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904808 TSecr=0 WS=128" +"3307","1.581987","172.30.1.104","172.30.1.205","TCP","54","135 > 40952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3308","1.581996","172.30.1.104","172.30.1.205","TCP","54","135 > 40952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3309","1.582002","172.30.1.205","172.30.1.104","TCP","54","40952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3310","1.582075","172.30.1.104","172.30.1.205","TCP","66","49671 > 33590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3311","1.582084","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3312","1.582440","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3313","1.582711","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3314","1.582719","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3315","1.584569","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3316","1.584933","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3317","1.584940","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3318","1.586281","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3319","1.587214","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3320","1.587223","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3321","1.588151","172.30.1.205","172.30.1.104","TCP","74","40956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904814 TSecr=0 WS=128" +"3322","1.588430","172.30.1.104","172.30.1.205","TCP","66","135 > 40956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3323","1.588441","172.30.1.205","172.30.1.104","TCP","54","40956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3324","1.588803","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3325","1.589125","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3326","1.589134","172.30.1.205","172.30.1.104","TCP","54","40956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3327","1.591284","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3328","1.591676","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3329","1.591682","172.30.1.205","172.30.1.104","TCP","54","40956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3330","1.593550","172.30.1.205","172.30.1.104","TCP","54","40956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3331","1.593659","172.30.1.205","172.30.1.104","TCP","74","33594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904820 TSecr=0 WS=128" +"3332","1.593817","172.30.1.104","172.30.1.205","TCP","54","135 > 40956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3333","1.593826","172.30.1.104","172.30.1.205","TCP","54","135 > 40956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3334","1.593831","172.30.1.205","172.30.1.104","TCP","54","40956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3335","1.593921","172.30.1.104","172.30.1.205","TCP","66","49671 > 33594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3336","1.593929","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3337","1.594267","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3338","1.594527","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3339","1.594536","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3340","1.596383","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3341","1.596761","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3342","1.596766","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3343","1.598107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3344","1.599053","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3345","1.599062","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3346","1.599983","172.30.1.205","172.30.1.104","TCP","74","40960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904826 TSecr=0 WS=128" +"3347","1.600270","172.30.1.104","172.30.1.205","TCP","66","135 > 40960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3348","1.600280","172.30.1.205","172.30.1.104","TCP","54","40960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3349","1.600620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3350","1.600892","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3351","1.600901","172.30.1.205","172.30.1.104","TCP","54","40960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3352","1.603065","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3353","1.603448","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3354","1.603458","172.30.1.205","172.30.1.104","TCP","54","40960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3355","1.605393","172.30.1.205","172.30.1.104","TCP","54","40960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3356","1.605517","172.30.1.205","172.30.1.104","TCP","74","33598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904831 TSecr=0 WS=128" +"3357","1.605660","172.30.1.104","172.30.1.205","TCP","54","135 > 40960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3358","1.605699","172.30.1.104","172.30.1.205","TCP","54","135 > 40960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3359","1.605706","172.30.1.205","172.30.1.104","TCP","54","40960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3360","1.605778","172.30.1.104","172.30.1.205","TCP","66","49671 > 33598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3361","1.605787","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3362","1.606135","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3363","1.606415","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3364","1.606425","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3365","1.608321","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3366","1.608666","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3367","1.608672","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3368","1.610049","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3369","1.611042","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3370","1.611054","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3371","1.612023","172.30.1.205","172.30.1.104","TCP","74","40964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904838 TSecr=0 WS=128" +"3372","1.612300","172.30.1.104","172.30.1.205","TCP","66","135 > 40964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3373","1.612311","172.30.1.205","172.30.1.104","TCP","54","40964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3374","1.612666","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3375","1.612944","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3376","1.612953","172.30.1.205","172.30.1.104","TCP","54","40964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3377","1.615162","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3378","1.615551","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3379","1.615558","172.30.1.205","172.30.1.104","TCP","54","40964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3380","1.617400","172.30.1.205","172.30.1.104","TCP","54","40964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3381","1.617512","172.30.1.205","172.30.1.104","TCP","74","33602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904843 TSecr=0 WS=128" +"3382","1.617661","172.30.1.104","172.30.1.205","TCP","54","135 > 40964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3383","1.617670","172.30.1.104","172.30.1.205","TCP","54","135 > 40964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3384","1.617675","172.30.1.205","172.30.1.104","TCP","54","40964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3385","1.617761","172.30.1.104","172.30.1.205","TCP","66","49671 > 33602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3386","1.617769","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3387","1.618116","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3388","1.618401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3389","1.618416","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3390","1.620388","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3391","1.620767","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3392","1.620774","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3393","1.622166","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3394","1.623072","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3395","1.623082","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3396","1.624035","172.30.1.205","172.30.1.104","TCP","74","40968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904850 TSecr=0 WS=128" +"3397","1.624318","172.30.1.104","172.30.1.205","TCP","66","135 > 40968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3398","1.624329","172.30.1.205","172.30.1.104","TCP","54","40968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3399","1.624686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3400","1.624974","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3401","1.624988","172.30.1.205","172.30.1.104","TCP","54","40968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3402","1.627269","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3403","1.627684","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3404","1.627692","172.30.1.205","172.30.1.104","TCP","54","40968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3405","1.629575","172.30.1.205","172.30.1.104","TCP","54","40968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3406","1.629691","172.30.1.205","172.30.1.104","TCP","74","33606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904856 TSecr=0 WS=128" +"3407","1.629850","172.30.1.104","172.30.1.205","TCP","54","135 > 40968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3408","1.629896","172.30.1.104","172.30.1.205","TCP","54","135 > 40968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3409","1.629901","172.30.1.205","172.30.1.104","TCP","54","40968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3410","1.629975","172.30.1.104","172.30.1.205","TCP","66","49671 > 33606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3411","1.629984","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3412","1.630332","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3413","1.630632","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3414","1.630641","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3415","1.632489","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3416","1.632843","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3417","1.632850","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3418","1.634214","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3419","1.635149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3420","1.635163","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3421","1.636178","172.30.1.205","172.30.1.104","TCP","74","40972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904862 TSecr=0 WS=128" +"3422","1.636533","172.30.1.104","172.30.1.205","TCP","66","135 > 40972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3423","1.636544","172.30.1.205","172.30.1.104","TCP","54","40972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3424","1.636919","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3425","1.637213","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3426","1.637223","172.30.1.205","172.30.1.104","TCP","54","40972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3427","1.639385","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3428","1.639786","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3429","1.639792","172.30.1.205","172.30.1.104","TCP","54","40972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3430","1.641604","172.30.1.205","172.30.1.104","TCP","54","40972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3431","1.641715","172.30.1.205","172.30.1.104","TCP","74","33610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904868 TSecr=0 WS=128" +"3432","1.641882","172.30.1.104","172.30.1.205","TCP","54","135 > 40972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3433","1.641891","172.30.1.104","172.30.1.205","TCP","54","135 > 40972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3434","1.641896","172.30.1.205","172.30.1.104","TCP","54","40972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3435","1.641986","172.30.1.104","172.30.1.205","TCP","66","49671 > 33610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3436","1.641994","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3437","1.642334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3438","1.642638","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3439","1.642645","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3440","1.644482","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3441","1.644834","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3442","1.644841","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3443","1.646173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3444","1.647138","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3445","1.647147","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3446","1.648067","172.30.1.205","172.30.1.104","TCP","74","40976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904874 TSecr=0 WS=128" +"3447","1.648358","172.30.1.104","172.30.1.205","TCP","66","135 > 40976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3448","1.648369","172.30.1.205","172.30.1.104","TCP","54","40976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3449","1.648716","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3450","1.648985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3451","1.648994","172.30.1.205","172.30.1.104","TCP","54","40976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3452","1.651147","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3453","1.651540","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3454","1.651546","172.30.1.205","172.30.1.104","TCP","54","40976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3455","1.653361","172.30.1.205","172.30.1.104","TCP","54","40976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3456","1.653471","172.30.1.205","172.30.1.104","TCP","74","33614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904879 TSecr=0 WS=128" +"3457","1.653627","172.30.1.104","172.30.1.205","TCP","54","135 > 40976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3458","1.653635","172.30.1.104","172.30.1.205","TCP","54","135 > 40976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3459","1.653640","172.30.1.205","172.30.1.104","TCP","54","40976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3460","1.653736","172.30.1.104","172.30.1.205","TCP","66","49671 > 33614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3461","1.653744","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3462","1.654083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3463","1.654359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3464","1.654366","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3465","1.656191","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3466","1.656530","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3467","1.656537","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3468","1.657887","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3469","1.659914","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3470","1.659924","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3471","1.660855","172.30.1.205","172.30.1.104","TCP","74","40980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904887 TSecr=0 WS=128" +"3472","1.661171","172.30.1.104","172.30.1.205","TCP","66","135 > 40980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3473","1.661182","172.30.1.205","172.30.1.104","TCP","54","40980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3474","1.661531","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3475","1.661825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3476","1.661834","172.30.1.205","172.30.1.104","TCP","54","40980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3477","1.664003","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3478","1.664390","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3479","1.664396","172.30.1.205","172.30.1.104","TCP","54","40980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3480","1.666196","172.30.1.205","172.30.1.104","TCP","54","40980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3481","1.666305","172.30.1.205","172.30.1.104","TCP","74","33618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904892 TSecr=0 WS=128" +"3482","1.666467","172.30.1.104","172.30.1.205","TCP","54","135 > 40980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3483","1.666496","172.30.1.104","172.30.1.205","TCP","54","135 > 40980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3484","1.666502","172.30.1.205","172.30.1.104","TCP","54","40980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3485","1.666577","172.30.1.104","172.30.1.205","TCP","66","49671 > 33618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3486","1.666585","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3487","1.666927","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3488","1.667238","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3489","1.667247","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3490","1.669122","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3491","1.669490","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3492","1.669497","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3493","1.670832","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3494","1.671831","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3495","1.671840","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3496","1.672755","172.30.1.205","172.30.1.104","TCP","74","40984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904899 TSecr=0 WS=128" +"3497","1.673027","172.30.1.104","172.30.1.205","TCP","66","135 > 40984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3498","1.673038","172.30.1.205","172.30.1.104","TCP","54","40984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3499","1.673381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3500","1.673653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3501","1.673661","172.30.1.205","172.30.1.104","TCP","54","40984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3502","1.675815","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3503","1.676262","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3504","1.676268","172.30.1.205","172.30.1.104","TCP","54","40984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3505","1.678075","172.30.1.205","172.30.1.104","TCP","54","40984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3506","1.678182","172.30.1.205","172.30.1.104","TCP","74","33622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904904 TSecr=0 WS=128" +"3507","1.678325","172.30.1.104","172.30.1.205","TCP","54","135 > 40984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3508","1.678348","172.30.1.104","172.30.1.205","TCP","54","135 > 40984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3509","1.678354","172.30.1.205","172.30.1.104","TCP","54","40984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3510","1.678462","172.30.1.104","172.30.1.205","TCP","66","49671 > 33622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3511","1.678471","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3512","1.678818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3513","1.679099","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3514","1.679107","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3515","1.680957","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3516","1.681318","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3517","1.681325","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3518","1.682661","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3519","1.683737","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3520","1.683746","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3521","1.684652","172.30.1.205","172.30.1.104","TCP","74","40988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904911 TSecr=0 WS=128" +"3522","1.684946","172.30.1.104","172.30.1.205","TCP","66","135 > 40988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3523","1.684957","172.30.1.205","172.30.1.104","TCP","54","40988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3524","1.685320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3525","1.685595","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3526","1.685604","172.30.1.205","172.30.1.104","TCP","54","40988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3527","1.687759","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3528","1.688151","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3529","1.688157","172.30.1.205","172.30.1.104","TCP","54","40988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3530","1.689008","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3531","1.689059","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3532","1.689096","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3533","1.689128","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3534","1.689159","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3535","1.689192","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3536","1.689225","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3537","1.689256","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3538","1.689285","172.30.1.104","172.30.1.205","TCP","54","49671 > 33582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3539","1.689307","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3540","1.689347","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3541","1.689374","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3542","1.689419","172.30.1.104","172.30.1.205","TCP","54","49671 > 33586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3543","1.689425","172.30.1.104","172.30.1.205","TCP","54","49671 > 33590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3544","1.689428","172.30.1.104","172.30.1.205","TCP","54","49671 > 33582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3545","1.689434","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3546","1.689477","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3547","1.689520","172.30.1.104","172.30.1.205","TCP","54","49671 > 33586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3548","1.689525","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3549","1.689531","172.30.1.104","172.30.1.205","TCP","54","49671 > 33594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3550","1.689540","172.30.1.104","172.30.1.205","TCP","54","49671 > 33590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3551","1.689543","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3552","1.689544","172.30.1.104","172.30.1.205","TCP","54","49671 > 33594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3553","1.689546","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3554","1.689553","172.30.1.104","172.30.1.205","TCP","54","49671 > 33598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3555","1.689574","172.30.1.104","172.30.1.205","TCP","54","49671 > 33602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3556","1.689766","172.30.1.104","172.30.1.205","TCP","54","49671 > 33606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3557","1.689832","172.30.1.104","172.30.1.205","TCP","54","49671 > 33610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3558","1.689838","172.30.1.104","172.30.1.205","TCP","54","49671 > 33598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3559","1.689842","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3560","1.689848","172.30.1.104","172.30.1.205","TCP","54","49671 > 33610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3561","1.689850","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3562","1.689852","172.30.1.104","172.30.1.205","TCP","54","49671 > 33602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3563","1.689853","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3564","1.690019","172.30.1.104","172.30.1.205","TCP","54","49671 > 33606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3565","1.690024","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3566","1.690029","172.30.1.104","172.30.1.205","TCP","54","49671 > 33614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3567","1.690034","172.30.1.104","172.30.1.205","TCP","54","49671 > 33618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3568","1.690040","172.30.1.104","172.30.1.205","TCP","54","49671 > 33578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3569","1.690043","172.30.1.104","172.30.1.205","TCP","54","49671 > 33622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3570","1.690045","172.30.1.104","172.30.1.205","TCP","54","49671 > 33578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3571","1.690047","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3572","1.690048","172.30.1.104","172.30.1.205","TCP","54","49671 > 33614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3573","1.690050","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3574","1.690051","172.30.1.104","172.30.1.205","TCP","54","49671 > 33618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3575","1.690053","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3576","1.690054","172.30.1.104","172.30.1.205","TCP","54","49671 > 33622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3577","1.690056","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3578","1.690879","172.30.1.205","172.30.1.104","TCP","54","40988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3579","1.690986","172.30.1.205","172.30.1.104","TCP","74","33626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904917 TSecr=0 WS=128" +"3580","1.691130","172.30.1.104","172.30.1.205","TCP","54","135 > 40988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3581","1.691193","172.30.1.104","172.30.1.205","TCP","54","135 > 40988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3582","1.691198","172.30.1.205","172.30.1.104","TCP","54","40988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3583","1.691274","172.30.1.104","172.30.1.205","TCP","66","49671 > 33626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3584","1.691282","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3585","1.691630","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3586","1.691900","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3587","1.691908","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3588","1.693860","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3589","1.694276","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3590","1.694283","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3591","1.695636","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3592","1.696580","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3593","1.696591","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3594","1.697556","172.30.1.205","172.30.1.104","TCP","74","40992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904923 TSecr=0 WS=128" +"3595","1.697829","172.30.1.104","172.30.1.205","TCP","66","135 > 40992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3596","1.697839","172.30.1.205","172.30.1.104","TCP","54","40992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3597","1.698182","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3598","1.698446","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3599","1.698456","172.30.1.205","172.30.1.104","TCP","54","40992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3600","1.700597","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3601","1.700959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3602","1.700966","172.30.1.205","172.30.1.104","TCP","54","40992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3603","1.702771","172.30.1.205","172.30.1.104","TCP","54","40992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3604","1.702879","172.30.1.205","172.30.1.104","TCP","74","33630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904929 TSecr=0 WS=128" +"3605","1.703082","172.30.1.104","172.30.1.205","TCP","54","135 > 40992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3606","1.703090","172.30.1.104","172.30.1.205","TCP","54","135 > 40992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3607","1.703095","172.30.1.205","172.30.1.104","TCP","54","40992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3608","1.703170","172.30.1.104","172.30.1.205","TCP","66","49671 > 33630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3609","1.703178","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3610","1.703516","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3611","1.703796","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3612","1.703805","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3613","1.705686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3614","1.706054","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3615","1.706060","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3616","1.707385","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3617","1.709252","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3618","1.709261","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3619","1.710185","172.30.1.205","172.30.1.104","TCP","74","40996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904936 TSecr=0 WS=128" +"3620","1.710515","172.30.1.104","172.30.1.205","TCP","66","135 > 40996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3621","1.710525","172.30.1.205","172.30.1.104","TCP","54","40996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3622","1.710868","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3623","1.711196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3624","1.711204","172.30.1.205","172.30.1.104","TCP","54","40996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3625","1.713384","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3626","1.713782","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3627","1.713788","172.30.1.205","172.30.1.104","TCP","54","40996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3628","1.715572","172.30.1.205","172.30.1.104","TCP","54","40996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3629","1.715681","172.30.1.205","172.30.1.104","TCP","74","33634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904942 TSecr=0 WS=128" +"3630","1.715832","172.30.1.104","172.30.1.205","TCP","54","135 > 40996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3631","1.715856","172.30.1.104","172.30.1.205","TCP","54","135 > 40996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3632","1.715861","172.30.1.205","172.30.1.104","TCP","54","40996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3633","1.715969","172.30.1.104","172.30.1.205","TCP","66","49671 > 33634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3634","1.715977","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3635","1.716316","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3636","1.716609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3637","1.716617","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3638","1.718500","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3639","1.718861","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3640","1.718867","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3641","1.720217","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3642","1.721171","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3643","1.721180","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3644","1.722107","172.30.1.205","172.30.1.104","TCP","74","41000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904948 TSecr=0 WS=128" +"3645","1.722394","172.30.1.104","172.30.1.205","TCP","66","135 > 41000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3646","1.722405","172.30.1.205","172.30.1.104","TCP","54","41000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3647","1.722745","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3648","1.723030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3649","1.723038","172.30.1.205","172.30.1.104","TCP","54","41000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3650","1.725211","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3651","1.725598","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3652","1.725604","172.30.1.205","172.30.1.104","TCP","54","41000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3653","1.727375","172.30.1.205","172.30.1.104","TCP","54","41000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3654","1.727482","172.30.1.205","172.30.1.104","TCP","74","33638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904953 TSecr=0 WS=128" +"3655","1.727654","172.30.1.104","172.30.1.205","TCP","54","135 > 41000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3656","1.727690","172.30.1.104","172.30.1.205","TCP","54","135 > 41000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3657","1.727695","172.30.1.205","172.30.1.104","TCP","54","41000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3658","1.727783","172.30.1.104","172.30.1.205","TCP","66","49671 > 33638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3659","1.727792","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3660","1.728131","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3661","1.728418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3662","1.728426","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3663","1.730302","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3664","1.730676","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3665","1.730682","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3666","1.732012","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3667","1.732985","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3668","1.732994","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3669","1.733921","172.30.1.205","172.30.1.104","TCP","74","41004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904960 TSecr=0 WS=128" +"3670","1.734198","172.30.1.104","172.30.1.205","TCP","66","135 > 41004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3671","1.734209","172.30.1.205","172.30.1.104","TCP","54","41004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3672","1.734556","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3673","1.734847","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3674","1.734856","172.30.1.205","172.30.1.104","TCP","54","41004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3675","1.737038","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3676","1.737420","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3677","1.737427","172.30.1.205","172.30.1.104","TCP","54","41004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3678","1.739216","172.30.1.205","172.30.1.104","TCP","54","41004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3679","1.739326","172.30.1.205","172.30.1.104","TCP","74","33642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904965 TSecr=0 WS=128" +"3680","1.739493","172.30.1.104","172.30.1.205","TCP","54","135 > 41004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3681","1.739525","172.30.1.104","172.30.1.205","TCP","54","135 > 41004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3682","1.739530","172.30.1.205","172.30.1.104","TCP","54","41004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3683","1.739645","172.30.1.104","172.30.1.205","TCP","66","49671 > 33642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3684","1.739653","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3685","1.739990","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3686","1.740881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3687","1.740890","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3688","1.742757","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3689","1.743121","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3690","1.743133","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3691","1.744650","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3692","1.745605","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3693","1.745615","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3694","1.746545","172.30.1.205","172.30.1.104","TCP","74","41008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904972 TSecr=0 WS=128" +"3695","1.746835","172.30.1.104","172.30.1.205","TCP","66","135 > 41008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3696","1.746845","172.30.1.205","172.30.1.104","TCP","54","41008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3697","1.747188","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3698","1.747481","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3699","1.747490","172.30.1.205","172.30.1.104","TCP","54","41008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3700","1.749674","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3701","1.750048","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3702","1.750055","172.30.1.205","172.30.1.104","TCP","54","41008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3703","1.751846","172.30.1.205","172.30.1.104","TCP","54","41008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3704","1.751953","172.30.1.205","172.30.1.104","TCP","74","33646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904978 TSecr=0 WS=128" +"3705","1.752114","172.30.1.104","172.30.1.205","TCP","54","135 > 41008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3706","1.752197","172.30.1.104","172.30.1.205","TCP","54","135 > 41008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3707","1.752204","172.30.1.205","172.30.1.104","TCP","54","41008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3708","1.752263","172.30.1.104","172.30.1.205","TCP","66","49671 > 33646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3709","1.752272","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3710","1.752622","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3711","1.752918","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3712","1.752927","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3713","1.754777","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3714","1.755139","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3715","1.755143","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3716","1.756468","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3717","1.757441","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3718","1.757450","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3719","1.758379","172.30.1.205","172.30.1.104","TCP","74","41012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904984 TSecr=0 WS=128" +"3720","1.758675","172.30.1.104","172.30.1.205","TCP","66","135 > 41012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3721","1.758686","172.30.1.205","172.30.1.104","TCP","54","41012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3722","1.759030","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3723","1.759298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3724","1.759307","172.30.1.205","172.30.1.104","TCP","54","41012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3725","1.761514","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3726","1.761871","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3727","1.761878","172.30.1.205","172.30.1.104","TCP","54","41012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3728","1.763667","172.30.1.205","172.30.1.104","TCP","54","41012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3729","1.763780","172.30.1.205","172.30.1.104","TCP","74","33650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904990 TSecr=0 WS=128" +"3730","1.763947","172.30.1.104","172.30.1.205","TCP","54","135 > 41012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3731","1.763955","172.30.1.104","172.30.1.205","TCP","54","135 > 41012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3732","1.763960","172.30.1.205","172.30.1.104","TCP","54","41012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3733","1.764034","172.30.1.104","172.30.1.205","TCP","66","49671 > 33650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3734","1.764042","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3735","1.764382","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3736","1.764684","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3737","1.764693","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3738","1.766574","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3739","1.766924","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3740","1.766928","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3741","1.768263","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3742","1.771145","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3743","1.771155","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3744","1.772089","172.30.1.205","172.30.1.104","TCP","74","41016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904998 TSecr=0 WS=128" +"3745","1.772366","172.30.1.104","172.30.1.205","TCP","66","135 > 41016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3746","1.772377","172.30.1.205","172.30.1.104","TCP","54","41016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3747","1.772724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3748","1.773001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3749","1.773010","172.30.1.205","172.30.1.104","TCP","54","41016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3750","1.775180","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3751","1.775617","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3752","1.775629","172.30.1.205","172.30.1.104","TCP","54","41016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3753","1.777642","172.30.1.205","172.30.1.104","TCP","54","41016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3754","1.777749","172.30.1.205","172.30.1.104","TCP","74","33654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905004 TSecr=0 WS=128" +"3755","1.777906","172.30.1.104","172.30.1.205","TCP","54","135 > 41016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3756","1.777945","172.30.1.104","172.30.1.205","TCP","54","135 > 41016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3757","1.777950","172.30.1.205","172.30.1.104","TCP","54","41016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3758","1.778092","172.30.1.104","172.30.1.205","TCP","66","49671 > 33654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3759","1.778101","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3760","1.778448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3761","1.778750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3762","1.778756","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3763","1.780598","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3764","1.781049","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3765","1.781056","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3766","1.782405","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3767","1.783510","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3768","1.783521","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3769","1.784463","172.30.1.205","172.30.1.104","TCP","74","41020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905010 TSecr=0 WS=128" +"3770","1.784784","172.30.1.104","172.30.1.205","TCP","66","135 > 41020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3771","1.784794","172.30.1.205","172.30.1.104","TCP","54","41020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3772","1.785148","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3773","1.785427","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3774","1.785437","172.30.1.205","172.30.1.104","TCP","54","41020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3775","1.787572","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3776","1.787974","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3777","1.787980","172.30.1.205","172.30.1.104","TCP","54","41020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3778","1.789786","172.30.1.205","172.30.1.104","TCP","54","41020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3779","1.789893","172.30.1.205","172.30.1.104","TCP","74","33658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905016 TSecr=0 WS=128" +"3780","1.790062","172.30.1.104","172.30.1.205","TCP","54","135 > 41020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3781","1.790089","172.30.1.104","172.30.1.205","TCP","54","135 > 41020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3782","1.790094","172.30.1.205","172.30.1.104","TCP","54","41020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3783","1.790170","172.30.1.104","172.30.1.205","TCP","66","49671 > 33658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3784","1.790178","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3785","1.790521","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3786","1.790801","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3787","1.790809","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3788","1.792653","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3789","1.793016","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3790","1.793022","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3791","1.794356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3792","1.795351","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3793","1.795360","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3794","1.796272","172.30.1.205","172.30.1.104","TCP","74","41024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905022 TSecr=0 WS=128" +"3795","1.796569","172.30.1.104","172.30.1.205","TCP","66","135 > 41024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3796","1.796579","172.30.1.205","172.30.1.104","TCP","54","41024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3797","1.796950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3798","1.797264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3799","1.797273","172.30.1.205","172.30.1.104","TCP","54","41024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3800","1.799423","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3801","1.799781","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3802","1.799787","172.30.1.205","172.30.1.104","TCP","54","41024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3803","1.801592","172.30.1.205","172.30.1.104","TCP","54","41024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3804","1.801700","172.30.1.205","172.30.1.104","TCP","74","33662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905028 TSecr=0 WS=128" +"3805","1.801845","172.30.1.104","172.30.1.205","TCP","54","135 > 41024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3806","1.801882","172.30.1.104","172.30.1.205","TCP","54","135 > 41024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3807","1.801887","172.30.1.205","172.30.1.104","TCP","54","41024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3808","1.801979","172.30.1.104","172.30.1.205","TCP","66","49671 > 33662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3809","1.801987","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3810","1.802321","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3811","1.802606","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3812","1.802614","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3813","1.804460","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3814","1.804852","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3815","1.804859","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3816","1.806211","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3817","1.807775","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3818","1.807784","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3819","1.808692","172.30.1.205","172.30.1.104","TCP","74","41028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905035 TSecr=0 WS=128" +"3820","1.809040","172.30.1.104","172.30.1.205","TCP","66","135 > 41028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3821","1.809050","172.30.1.205","172.30.1.104","TCP","54","41028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3822","1.809403","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3823","1.809694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3824","1.809703","172.30.1.205","172.30.1.104","TCP","54","41028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3825","1.811864","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3826","1.812273","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3827","1.812279","172.30.1.205","172.30.1.104","TCP","54","41028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3828","1.814078","172.30.1.205","172.30.1.104","TCP","54","41028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3829","1.814185","172.30.1.205","172.30.1.104","TCP","74","33666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905040 TSecr=0 WS=128" +"3830","1.814350","172.30.1.104","172.30.1.205","TCP","54","135 > 41028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3831","1.814399","172.30.1.104","172.30.1.205","TCP","54","135 > 41028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3832","1.814408","172.30.1.205","172.30.1.104","TCP","54","41028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3833","1.814463","172.30.1.104","172.30.1.205","TCP","66","49671 > 33666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3834","1.814474","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3835","1.814874","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3836","1.815165","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3837","1.815174","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3838","1.817095","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3839","1.817444","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3840","1.817451","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3841","1.818792","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3842","1.819754","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3843","1.819765","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3844","1.820710","172.30.1.205","172.30.1.104","TCP","74","41032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905047 TSecr=0 WS=128" +"3845","1.820995","172.30.1.104","172.30.1.205","TCP","66","135 > 41032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3846","1.821006","172.30.1.205","172.30.1.104","TCP","54","41032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3847","1.821372","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3848","1.821653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3849","1.821661","172.30.1.205","172.30.1.104","TCP","54","41032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3850","1.823825","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3851","1.824225","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3852","1.824237","172.30.1.205","172.30.1.104","TCP","54","41032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3853","1.826222","172.30.1.205","172.30.1.104","TCP","54","41032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3854","1.826332","172.30.1.205","172.30.1.104","TCP","74","33670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905052 TSecr=0 WS=128" +"3855","1.826482","172.30.1.104","172.30.1.205","TCP","54","135 > 41032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3856","1.826497","172.30.1.104","172.30.1.205","TCP","54","135 > 41032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3857","1.826503","172.30.1.205","172.30.1.104","TCP","54","41032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3858","1.826607","172.30.1.104","172.30.1.205","TCP","66","49671 > 33670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3859","1.826615","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3860","1.826972","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3861","1.827273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3862","1.827282","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3863","1.829168","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3864","1.829536","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3865","1.829542","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3866","1.830877","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3867","1.831829","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3868","1.831841","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3869","1.832815","172.30.1.205","172.30.1.104","TCP","74","41036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905059 TSecr=0 WS=128" +"3870","1.833123","172.30.1.104","172.30.1.205","TCP","66","135 > 41036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3871","1.833134","172.30.1.205","172.30.1.104","TCP","54","41036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3872","1.833482","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3873","1.833766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3874","1.833775","172.30.1.205","172.30.1.104","TCP","54","41036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3875","1.835974","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3876","1.836375","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3877","1.836381","172.30.1.205","172.30.1.104","TCP","54","41036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3878","1.837257","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3879","1.837307","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3880","1.837345","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3881","1.837378","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3882","1.837406","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3883","1.837437","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3884","1.837466","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3885","1.837488","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3886","1.837505","172.30.1.104","172.30.1.205","TCP","54","49671 > 33630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3887","1.837542","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3888","1.837576","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3889","1.837602","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3890","1.837643","172.30.1.104","172.30.1.205","TCP","54","49671 > 33634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3891","1.837659","172.30.1.104","172.30.1.205","TCP","54","49671 > 33630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3892","1.837667","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3893","1.837682","172.30.1.104","172.30.1.205","TCP","54","49671 > 33634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3894","1.837686","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3895","1.837703","172.30.1.104","172.30.1.205","TCP","54","49671 > 33638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3896","1.837723","172.30.1.104","172.30.1.205","TCP","54","49671 > 33642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3897","1.837738","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3898","1.837813","172.30.1.104","172.30.1.205","TCP","54","49671 > 33646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3899","1.837832","172.30.1.104","172.30.1.205","TCP","54","49671 > 33650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3900","1.837853","172.30.1.104","172.30.1.205","TCP","54","49671 > 33650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3901","1.837858","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3902","1.837873","172.30.1.104","172.30.1.205","TCP","54","49671 > 33638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3903","1.837876","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3904","1.837892","172.30.1.104","172.30.1.205","TCP","54","49671 > 33642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3905","1.837895","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3906","1.837913","172.30.1.104","172.30.1.205","TCP","54","49671 > 33646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3907","1.837916","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3908","1.837934","172.30.1.104","172.30.1.205","TCP","54","49671 > 33658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3909","1.837955","172.30.1.104","172.30.1.205","TCP","54","49671 > 33654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3910","1.838087","172.30.1.104","172.30.1.205","TCP","54","49671 > 33662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3911","1.838107","172.30.1.104","172.30.1.205","TCP","54","49671 > 33666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3912","1.838127","172.30.1.104","172.30.1.205","TCP","54","49671 > 33654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3913","1.838132","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3914","1.838148","172.30.1.104","172.30.1.205","TCP","54","49671 > 33666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3915","1.838151","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3916","1.838169","172.30.1.104","172.30.1.205","TCP","54","49671 > 33658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3917","1.838172","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3918","1.838190","172.30.1.104","172.30.1.205","TCP","54","49671 > 33662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3919","1.838193","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3920","1.838210","172.30.1.104","172.30.1.205","TCP","54","49671 > 33670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3921","1.838317","172.30.1.104","172.30.1.205","TCP","54","49671 > 33670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3922","1.838322","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3923","1.838338","172.30.1.104","172.30.1.205","TCP","54","49671 > 33626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3924","1.838361","172.30.1.104","172.30.1.205","TCP","54","49671 > 33626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"3925","1.838363","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"3926","1.839236","172.30.1.205","172.30.1.104","TCP","54","41036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3927","1.839367","172.30.1.205","172.30.1.104","TCP","74","33674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905065 TSecr=0 WS=128" +"3928","1.839506","172.30.1.104","172.30.1.205","TCP","54","135 > 41036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3929","1.839640","172.30.1.104","172.30.1.205","TCP","66","49671 > 33674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3930","1.839649","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3931","1.839665","172.30.1.104","172.30.1.205","TCP","54","135 > 41036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3932","1.839670","172.30.1.205","172.30.1.104","TCP","54","41036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3933","1.840020","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3934","1.840306","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3935","1.840315","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3936","1.842216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3937","1.842572","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3938","1.842578","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3939","1.843931","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3940","1.844893","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3941","1.844903","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3942","1.845870","172.30.1.205","172.30.1.104","TCP","74","41040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905072 TSecr=0 WS=128" +"3943","1.846150","172.30.1.104","172.30.1.205","TCP","66","135 > 41040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3944","1.846163","172.30.1.205","172.30.1.104","TCP","54","41040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3945","1.846523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3946","1.846783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3947","1.846792","172.30.1.205","172.30.1.104","TCP","54","41040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3948","1.848997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3949","1.849380","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3950","1.849387","172.30.1.205","172.30.1.104","TCP","54","41040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3951","1.851202","172.30.1.205","172.30.1.104","TCP","54","41040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3952","1.851320","172.30.1.205","172.30.1.104","TCP","74","33678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905077 TSecr=0 WS=128" +"3953","1.851467","172.30.1.104","172.30.1.205","TCP","54","135 > 41040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3954","1.851499","172.30.1.104","172.30.1.205","TCP","54","135 > 41040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3955","1.851505","172.30.1.205","172.30.1.104","TCP","54","41040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3956","1.851631","172.30.1.104","172.30.1.205","TCP","66","49671 > 33678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3957","1.851639","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3958","1.851987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3959","1.853885","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3960","1.853896","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3961","1.855767","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3962","1.856132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3963","1.856138","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3964","1.857510","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3965","1.860168","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3966","1.860180","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3967","1.861153","172.30.1.205","172.30.1.104","TCP","74","41044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905087 TSecr=0 WS=128" +"3968","1.861428","172.30.1.104","172.30.1.205","TCP","66","135 > 41044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3969","1.861439","172.30.1.205","172.30.1.104","TCP","54","41044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3970","1.861788","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3971","1.862078","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3972","1.862087","172.30.1.205","172.30.1.104","TCP","54","41044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3973","1.864257","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3974","1.864668","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"3975","1.864675","172.30.1.205","172.30.1.104","TCP","54","41044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3976","1.866490","172.30.1.205","172.30.1.104","TCP","54","41044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"3977","1.866605","172.30.1.205","172.30.1.104","TCP","74","33682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905093 TSecr=0 WS=128" +"3978","1.866835","172.30.1.104","172.30.1.205","TCP","54","135 > 41044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3979","1.866879","172.30.1.104","172.30.1.205","TCP","54","135 > 41044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"3980","1.866884","172.30.1.205","172.30.1.104","TCP","54","41044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"3981","1.866972","172.30.1.104","172.30.1.205","TCP","66","49671 > 33682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3982","1.866984","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3983","1.867324","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"3984","1.868863","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3985","1.868872","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3986","1.870736","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"3987","1.871078","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"3988","1.871085","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"3989","1.872422","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"3990","1.873366","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"3991","1.873376","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"3992","1.874324","172.30.1.205","172.30.1.104","TCP","74","41048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905100 TSecr=0 WS=128" +"3993","1.874600","172.30.1.104","172.30.1.205","TCP","66","135 > 41048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"3994","1.874610","172.30.1.205","172.30.1.104","TCP","54","41048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"3995","1.874959","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"3996","1.875239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"3997","1.875248","172.30.1.205","172.30.1.104","TCP","54","41048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"3998","1.877461","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"3999","1.877824","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4000","1.877830","172.30.1.205","172.30.1.104","TCP","54","41048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4001","1.879623","172.30.1.205","172.30.1.104","TCP","54","41048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4002","1.879738","172.30.1.205","172.30.1.104","TCP","74","33686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905106 TSecr=0 WS=128" +"4003","1.879873","172.30.1.104","172.30.1.205","TCP","54","135 > 41048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4004","1.879887","172.30.1.104","172.30.1.205","TCP","54","135 > 41048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4005","1.879893","172.30.1.205","172.30.1.104","TCP","54","41048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4006","1.880053","172.30.1.104","172.30.1.205","TCP","66","49671 > 33686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4007","1.880062","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4008","1.880402","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4009","1.880681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4010","1.880690","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4011","1.882580","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4012","1.882933","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4013","1.882939","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4014","1.884270","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4015","1.885227","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4016","1.885237","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4017","1.886172","172.30.1.205","172.30.1.104","TCP","74","41052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905112 TSecr=0 WS=128" +"4018","1.886517","172.30.1.104","172.30.1.205","TCP","66","135 > 41052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4019","1.886528","172.30.1.205","172.30.1.104","TCP","54","41052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4020","1.886871","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4021","1.887153","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4022","1.887163","172.30.1.205","172.30.1.104","TCP","54","41052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4023","1.889356","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4024","1.889708","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4025","1.889715","172.30.1.205","172.30.1.104","TCP","54","41052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4026","1.891500","172.30.1.205","172.30.1.104","TCP","54","41052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4027","1.891610","172.30.1.205","172.30.1.104","TCP","74","33690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905118 TSecr=0 WS=128" +"4028","1.891746","172.30.1.104","172.30.1.205","TCP","54","135 > 41052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4029","1.891844","172.30.1.104","172.30.1.205","TCP","54","135 > 41052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4030","1.891850","172.30.1.205","172.30.1.104","TCP","54","41052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4031","1.891872","172.30.1.104","172.30.1.205","TCP","66","49671 > 33690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4032","1.891880","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4033","1.892218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4034","1.892498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4035","1.892506","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4036","1.894393","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4037","1.894766","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4038","1.894776","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4039","1.896188","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4040","1.897180","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4041","1.897191","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4042","1.898151","172.30.1.205","172.30.1.104","TCP","74","41056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905124 TSecr=0 WS=128" +"4043","1.898468","172.30.1.104","172.30.1.205","TCP","66","135 > 41056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4044","1.898480","172.30.1.205","172.30.1.104","TCP","54","41056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4045","1.898826","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4046","1.899143","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4047","1.899154","172.30.1.205","172.30.1.104","TCP","54","41056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4048","1.901377","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4049","1.901797","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4050","1.901804","172.30.1.205","172.30.1.104","TCP","54","41056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4051","1.903622","172.30.1.205","172.30.1.104","TCP","54","41056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4052","1.903741","172.30.1.205","172.30.1.104","TCP","74","33694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905130 TSecr=0 WS=128" +"4053","1.903938","172.30.1.104","172.30.1.205","TCP","54","135 > 41056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4054","1.903983","172.30.1.104","172.30.1.205","TCP","54","135 > 41056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4055","1.903989","172.30.1.205","172.30.1.104","TCP","54","41056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4056","1.904102","172.30.1.104","172.30.1.205","TCP","66","49671 > 33694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4057","1.904111","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4058","1.904470","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4059","1.906274","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4060","1.906284","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4061","1.908138","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4062","1.908540","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4063","1.908549","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4064","1.909992","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4065","1.910994","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4066","1.911004","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4067","1.911954","172.30.1.205","172.30.1.104","TCP","74","41060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905138 TSecr=0 WS=128" +"4068","1.912296","172.30.1.104","172.30.1.205","TCP","66","135 > 41060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4069","1.912307","172.30.1.205","172.30.1.104","TCP","54","41060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4070","1.912652","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4071","1.912948","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4072","1.912957","172.30.1.205","172.30.1.104","TCP","54","41060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4073","1.915169","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4074","1.915569","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4075","1.915576","172.30.1.205","172.30.1.104","TCP","54","41060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4076","1.917399","172.30.1.205","172.30.1.104","TCP","54","41060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4077","1.917512","172.30.1.205","172.30.1.104","TCP","74","33698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905143 TSecr=0 WS=128" +"4078","1.917728","172.30.1.104","172.30.1.205","TCP","54","135 > 41060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4079","1.917778","172.30.1.104","172.30.1.205","TCP","66","49671 > 33698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4080","1.917788","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4081","1.917806","172.30.1.104","172.30.1.205","TCP","54","135 > 41060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4082","1.917811","172.30.1.205","172.30.1.104","TCP","54","41060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4083","1.918145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4084","1.918462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4085","1.918471","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4086","1.920342","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4087","1.920715","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4088","1.920721","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4089","1.922087","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4090","1.923075","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4091","1.923085","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4092","1.924020","172.30.1.205","172.30.1.104","TCP","74","41064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905150 TSecr=0 WS=128" +"4093","1.924329","172.30.1.104","172.30.1.205","TCP","66","135 > 41064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4094","1.924340","172.30.1.205","172.30.1.104","TCP","54","41064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4095","1.924688","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4096","1.924991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4097","1.925001","172.30.1.205","172.30.1.104","TCP","54","41064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4098","1.927178","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4099","1.927578","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4100","1.927585","172.30.1.205","172.30.1.104","TCP","54","41064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4101","1.929411","172.30.1.205","172.30.1.104","TCP","54","41064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4102","1.929521","172.30.1.205","172.30.1.104","TCP","74","33702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905155 TSecr=0 WS=128" +"4103","1.929848","172.30.1.104","172.30.1.205","TCP","66","49671 > 33702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4104","1.929859","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4105","1.929871","172.30.1.104","172.30.1.205","TCP","54","135 > 41064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4106","1.929902","172.30.1.104","172.30.1.205","TCP","54","135 > 41064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4107","1.929908","172.30.1.205","172.30.1.104","TCP","54","41064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4108","1.930232","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4109","1.931492","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4110","1.931510","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4111","1.933418","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4112","1.933901","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4113","1.933913","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4114","1.935499","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4115","1.936477","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4116","1.936486","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4117","1.937439","172.30.1.205","172.30.1.104","TCP","74","41068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905163 TSecr=0 WS=128" +"4118","1.937789","172.30.1.104","172.30.1.205","TCP","66","135 > 41068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4119","1.937800","172.30.1.205","172.30.1.104","TCP","54","41068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4120","1.938145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4121","1.938460","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4122","1.938469","172.30.1.205","172.30.1.104","TCP","54","41068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4123","1.940621","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4124","1.941052","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4125","1.941059","172.30.1.205","172.30.1.104","TCP","54","41068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4126","1.942861","172.30.1.205","172.30.1.104","TCP","54","41068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4127","1.942972","172.30.1.205","172.30.1.104","TCP","74","33706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905169 TSecr=0 WS=128" +"4128","1.943148","172.30.1.104","172.30.1.205","TCP","54","135 > 41068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4129","1.943186","172.30.1.104","172.30.1.205","TCP","54","135 > 41068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4130","1.943192","172.30.1.205","172.30.1.104","TCP","54","41068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4131","1.943303","172.30.1.104","172.30.1.205","TCP","66","49671 > 33706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4132","1.943311","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4133","1.943655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4134","1.943995","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4135","1.944004","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4136","1.945888","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4137","1.946297","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4138","1.946303","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4139","1.947618","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4140","1.948654","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4141","1.948663","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4142","1.949609","172.30.1.205","172.30.1.104","TCP","74","41072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905176 TSecr=0 WS=128" +"4143","1.949961","172.30.1.104","172.30.1.205","TCP","66","135 > 41072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4144","1.949972","172.30.1.205","172.30.1.104","TCP","54","41072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4145","1.950320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4146","1.950642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4147","1.950651","172.30.1.205","172.30.1.104","TCP","54","41072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4148","1.952826","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4149","1.953278","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4150","1.953285","172.30.1.205","172.30.1.104","TCP","54","41072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4151","1.955070","172.30.1.205","172.30.1.104","TCP","54","41072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4152","1.955178","172.30.1.205","172.30.1.104","TCP","74","33710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905181 TSecr=0 WS=128" +"4153","1.955392","172.30.1.104","172.30.1.205","TCP","54","135 > 41072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4154","1.955434","172.30.1.104","172.30.1.205","TCP","54","135 > 41072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4155","1.955443","172.30.1.205","172.30.1.104","TCP","54","41072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4156","1.955468","172.30.1.104","172.30.1.205","TCP","66","49671 > 33710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4157","1.955479","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4158","1.955852","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4159","1.958401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4160","1.958421","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4161","1.960402","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4162","1.960848","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4163","1.960855","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4164","1.962196","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4165","1.963259","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4166","1.963269","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4167","1.964192","172.30.1.205","172.30.1.104","TCP","74","41076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905190 TSecr=0 WS=128" +"4168","1.964536","172.30.1.104","172.30.1.205","TCP","66","135 > 41076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4169","1.964557","172.30.1.205","172.30.1.104","TCP","54","41076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4170","1.965136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4171","1.965540","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4172","1.965548","172.30.1.205","172.30.1.104","TCP","54","41076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4173","1.967714","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4174","1.968211","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4175","1.968221","172.30.1.205","172.30.1.104","TCP","54","41076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4176","1.970114","172.30.1.205","172.30.1.104","TCP","54","41076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4177","1.970235","172.30.1.205","172.30.1.104","TCP","74","33714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905196 TSecr=0 WS=128" +"4178","1.970437","172.30.1.104","172.30.1.205","TCP","54","135 > 41076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4179","1.970510","172.30.1.104","172.30.1.205","TCP","54","135 > 41076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4180","1.970515","172.30.1.205","172.30.1.104","TCP","54","41076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4181","1.970607","172.30.1.104","172.30.1.205","TCP","66","49671 > 33714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4182","1.970616","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4183","1.970972","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4184","1.973314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4185","1.973325","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4186","1.975211","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4187","1.975684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4188","1.975691","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4189","1.977079","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4190","1.978128","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4191","1.978137","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4192","1.979071","172.30.1.205","172.30.1.104","TCP","74","41080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905205 TSecr=0 WS=128" +"4193","1.979400","172.30.1.104","172.30.1.205","TCP","66","135 > 41080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4194","1.979412","172.30.1.205","172.30.1.104","TCP","54","41080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4195","1.979766","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4196","1.980111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4197","1.980120","172.30.1.205","172.30.1.104","TCP","54","41080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4198","1.982313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4199","1.982767","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4200","1.982774","172.30.1.205","172.30.1.104","TCP","54","41080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4201","1.984585","172.30.1.205","172.30.1.104","TCP","54","41080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4202","1.984698","172.30.1.205","172.30.1.104","TCP","74","33718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905211 TSecr=0 WS=128" +"4203","1.984888","172.30.1.104","172.30.1.205","TCP","54","135 > 41080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4204","1.984959","172.30.1.104","172.30.1.205","TCP","54","135 > 41080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4205","1.984965","172.30.1.205","172.30.1.104","TCP","54","41080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4206","1.985026","172.30.1.104","172.30.1.205","TCP","66","49671 > 33718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4207","1.985034","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4208","1.985383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4209","1.985718","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4210","1.985727","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4211","1.987597","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4212","1.988036","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4213","1.988042","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4214","1.989413","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4215","1.990501","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4216","1.990510","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4217","1.991441","172.30.1.205","172.30.1.104","TCP","74","41084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905217 TSecr=0 WS=128" +"4218","1.991759","172.30.1.104","172.30.1.205","TCP","66","135 > 41084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4219","1.991769","172.30.1.205","172.30.1.104","TCP","54","41084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4220","1.992117","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4221","1.992444","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4222","1.992453","172.30.1.205","172.30.1.104","TCP","54","41084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4223","1.994678","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4224","1.995100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4225","1.995107","172.30.1.205","172.30.1.104","TCP","54","41084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4226","1.995949","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4227","1.995997","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4228","1.996030","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4229","1.996060","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4230","1.996088","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4231","1.996116","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4232","1.996143","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4233","1.996166","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4234","1.996193","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4235","1.996219","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4236","1.996245","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4237","1.996317","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4238","1.996383","172.30.1.104","172.30.1.205","TCP","54","49671 > 33678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4239","1.996410","172.30.1.104","172.30.1.205","TCP","54","49671 > 33682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4240","1.996439","172.30.1.104","172.30.1.205","TCP","54","49671 > 33678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4241","1.996445","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4242","1.996465","172.30.1.104","172.30.1.205","TCP","54","49671 > 33682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4243","1.996468","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4244","1.996568","172.30.1.104","172.30.1.205","TCP","54","49671 > 33686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4245","1.996597","172.30.1.104","172.30.1.205","TCP","54","49671 > 33690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4246","1.996627","172.30.1.104","172.30.1.205","TCP","54","49671 > 33694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4247","1.996655","172.30.1.104","172.30.1.205","TCP","54","49671 > 33698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4248","1.996769","172.30.1.104","172.30.1.205","TCP","54","49671 > 33694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4249","1.996789","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4250","1.996812","172.30.1.104","172.30.1.205","TCP","54","49671 > 33698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4251","1.996816","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4252","1.996840","172.30.1.104","172.30.1.205","TCP","54","49671 > 33686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4253","1.996842","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4254","1.996867","172.30.1.104","172.30.1.205","TCP","54","49671 > 33690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4255","1.996869","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4256","1.996904","172.30.1.104","172.30.1.205","TCP","54","49671 > 33702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4257","1.996934","172.30.1.104","172.30.1.205","TCP","54","49671 > 33702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4258","1.996938","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4259","1.996961","172.30.1.104","172.30.1.205","TCP","54","49671 > 33706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4260","1.996990","172.30.1.104","172.30.1.205","TCP","54","49671 > 33710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4261","1.997018","172.30.1.104","172.30.1.205","TCP","54","49671 > 33714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4262","1.997047","172.30.1.104","172.30.1.205","TCP","54","49671 > 33706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4263","1.997052","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4264","1.997077","172.30.1.104","172.30.1.205","TCP","54","49671 > 33718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4265","1.997104","172.30.1.104","172.30.1.205","TCP","54","49671 > 33674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4266","1.997131","172.30.1.104","172.30.1.205","TCP","54","49671 > 33674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4267","1.997136","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4268","1.997159","172.30.1.104","172.30.1.205","TCP","54","49671 > 33718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4269","1.997162","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4270","1.997186","172.30.1.104","172.30.1.205","TCP","54","49671 > 33710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4271","1.997189","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4272","1.997214","172.30.1.104","172.30.1.205","TCP","54","49671 > 33714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4273","1.997217","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4274","1.997945","172.30.1.205","172.30.1.104","TCP","54","41084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4275","1.998056","172.30.1.205","172.30.1.104","TCP","74","33722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905224 TSecr=0 WS=128" +"4276","1.998240","172.30.1.104","172.30.1.205","TCP","54","135 > 41084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4277","1.998265","172.30.1.104","172.30.1.205","TCP","54","135 > 41084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4278","1.998270","172.30.1.205","172.30.1.104","TCP","54","41084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4279","1.998371","172.30.1.104","172.30.1.205","TCP","66","49671 > 33722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4280","1.998380","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4281","1.998732","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4282","1.999039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4283","1.999048","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4284","2.000950","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4285","2.001354","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4286","2.001360","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4287","2.002721","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4288","2.003760","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4289","2.003770","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4290","2.004693","172.30.1.205","172.30.1.104","TCP","74","41088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905231 TSecr=0 WS=128" +"4291","2.005012","172.30.1.104","172.30.1.205","TCP","66","135 > 41088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4292","2.005023","172.30.1.205","172.30.1.104","TCP","54","41088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4293","2.005384","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4294","2.005718","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4295","2.005727","172.30.1.205","172.30.1.104","TCP","54","41088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4296","2.007903","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4297","2.008324","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4298","2.008331","172.30.1.205","172.30.1.104","TCP","54","41088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4299","2.010157","172.30.1.205","172.30.1.104","TCP","54","41088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4300","2.010283","172.30.1.205","172.30.1.104","TCP","74","33726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905236 TSecr=0 WS=128" +"4301","2.010463","172.30.1.104","172.30.1.205","TCP","54","135 > 41088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4302","2.010489","172.30.1.104","172.30.1.205","TCP","54","135 > 41088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4303","2.010496","172.30.1.205","172.30.1.104","TCP","54","41088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4304","2.010592","172.30.1.104","172.30.1.205","TCP","66","49671 > 33726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4305","2.010601","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4306","2.010954","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4307","2.011561","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4308","2.011572","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4309","2.013521","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4310","2.013940","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4311","2.013946","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4312","2.015307","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4313","2.016420","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4314","2.016432","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4315","2.017450","172.30.1.205","172.30.1.104","TCP","74","41092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905243 TSecr=0 WS=128" +"4316","2.017802","172.30.1.104","172.30.1.205","TCP","66","135 > 41092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4317","2.017813","172.30.1.205","172.30.1.104","TCP","54","41092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4318","2.018161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4319","2.018469","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4320","2.018478","172.30.1.205","172.30.1.104","TCP","54","41092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4321","2.020663","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4322","2.021118","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4323","2.021132","172.30.1.205","172.30.1.104","TCP","54","41092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4324","2.023209","172.30.1.205","172.30.1.104","TCP","54","41092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4325","2.023322","172.30.1.205","172.30.1.104","TCP","74","33730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905249 TSecr=0 WS=128" +"4326","2.023511","172.30.1.104","172.30.1.205","TCP","54","135 > 41092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4327","2.023539","172.30.1.104","172.30.1.205","TCP","54","135 > 41092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4328","2.023545","172.30.1.205","172.30.1.104","TCP","54","41092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4329","2.023641","172.30.1.104","172.30.1.205","TCP","66","49671 > 33730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4330","2.023650","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4331","2.023995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4332","2.024345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4333","2.024378","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4334","2.026263","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4335","2.026678","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4336","2.026684","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4337","2.028026","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4338","2.029147","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4339","2.029156","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4340","2.030090","172.30.1.205","172.30.1.104","TCP","74","41096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905256 TSecr=0 WS=128" +"4341","2.030493","172.30.1.104","172.30.1.205","TCP","66","135 > 41096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4342","2.030507","172.30.1.205","172.30.1.104","TCP","54","41096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4343","2.030891","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4344","2.031218","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4345","2.031231","172.30.1.205","172.30.1.104","TCP","54","41096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4346","2.033500","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4347","2.033903","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4348","2.033910","172.30.1.205","172.30.1.104","TCP","54","41096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4349","2.035828","172.30.1.205","172.30.1.104","TCP","54","41096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4350","2.035946","172.30.1.205","172.30.1.104","TCP","74","33734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905262 TSecr=0 WS=128" +"4351","2.036135","172.30.1.104","172.30.1.205","TCP","54","135 > 41096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4352","2.036163","172.30.1.104","172.30.1.205","TCP","54","135 > 41096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4353","2.036169","172.30.1.205","172.30.1.104","TCP","54","41096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4354","2.036278","172.30.1.104","172.30.1.205","TCP","66","49671 > 33734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4355","2.036287","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4356","2.036649","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4357","2.036974","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4358","2.036984","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4359","2.038883","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4360","2.039327","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4361","2.039334","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4362","2.040680","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4363","2.041705","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4364","2.041715","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4365","2.042651","172.30.1.205","172.30.1.104","TCP","74","41100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905269 TSecr=0 WS=128" +"4366","2.042966","172.30.1.104","172.30.1.205","TCP","66","135 > 41100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4367","2.042977","172.30.1.205","172.30.1.104","TCP","54","41100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4368","2.043356","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4369","2.043680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4370","2.043688","172.30.1.205","172.30.1.104","TCP","54","41100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4371","2.045910","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4372","2.046357","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4373","2.046364","172.30.1.205","172.30.1.104","TCP","54","41100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4374","2.048189","172.30.1.205","172.30.1.104","TCP","54","41100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4375","2.048301","172.30.1.205","172.30.1.104","TCP","74","33738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905274 TSecr=0 WS=128" +"4376","2.048518","172.30.1.104","172.30.1.205","TCP","54","135 > 41100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4377","2.048546","172.30.1.104","172.30.1.205","TCP","54","135 > 41100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4378","2.048552","172.30.1.205","172.30.1.104","TCP","54","41100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4379","2.048678","172.30.1.104","172.30.1.205","TCP","66","49671 > 33738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4380","2.048687","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4381","2.049064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4382","2.049379","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4383","2.049388","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4384","2.051254","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4385","2.051639","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4386","2.051646","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4387","2.053014","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4388","2.054086","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4389","2.054096","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4390","2.055020","172.30.1.205","172.30.1.104","TCP","74","41104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905281 TSecr=0 WS=128" +"4391","2.055365","172.30.1.104","172.30.1.205","TCP","66","135 > 41104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4392","2.055376","172.30.1.205","172.30.1.104","TCP","54","41104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4393","2.055727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4394","2.056011","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4395","2.056020","172.30.1.205","172.30.1.104","TCP","54","41104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4396","2.058213","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4397","2.058604","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4398","2.058611","172.30.1.205","172.30.1.104","TCP","54","41104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4399","2.060409","172.30.1.205","172.30.1.104","TCP","54","41104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4400","2.060522","172.30.1.205","172.30.1.104","TCP","74","33742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905286 TSecr=0 WS=128" +"4401","2.060680","172.30.1.104","172.30.1.205","TCP","54","135 > 41104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4402","2.060701","172.30.1.104","172.30.1.205","TCP","54","135 > 41104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4403","2.060707","172.30.1.205","172.30.1.104","TCP","54","41104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4404","2.060819","172.30.1.104","172.30.1.205","TCP","66","49671 > 33742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4405","2.060828","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4406","2.061187","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4407","2.061475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4408","2.061484","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4409","2.063354","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4410","2.063736","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4411","2.063743","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4412","2.065118","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4413","2.066105","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4414","2.066114","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4415","2.067050","172.30.1.205","172.30.1.104","TCP","74","41108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905293 TSecr=0 WS=128" +"4416","2.067355","172.30.1.104","172.30.1.205","TCP","66","135 > 41108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4417","2.067366","172.30.1.205","172.30.1.104","TCP","54","41108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4418","2.067719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4419","2.068019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4420","2.068028","172.30.1.205","172.30.1.104","TCP","54","41108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4421","2.070253","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4422","2.070663","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4423","2.070672","172.30.1.205","172.30.1.104","TCP","54","41108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4424","2.072555","172.30.1.205","172.30.1.104","TCP","54","41108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4425","2.072678","172.30.1.205","172.30.1.104","TCP","74","33746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905299 TSecr=0 WS=128" +"4426","2.072896","172.30.1.104","172.30.1.205","TCP","54","135 > 41108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4427","2.072925","172.30.1.104","172.30.1.205","TCP","54","135 > 41108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4428","2.072931","172.30.1.205","172.30.1.104","TCP","54","41108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4429","2.072957","172.30.1.104","172.30.1.205","TCP","66","49671 > 33746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4430","2.072966","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4431","2.073342","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4432","2.073666","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4433","2.073675","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4434","2.075559","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4435","2.075942","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4436","2.075949","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4437","2.077362","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4438","2.078382","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4439","2.078392","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4440","2.079327","172.30.1.205","172.30.1.104","TCP","74","41112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905305 TSecr=0 WS=128" +"4441","2.079677","172.30.1.104","172.30.1.205","TCP","66","135 > 41112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4442","2.079688","172.30.1.205","172.30.1.104","TCP","54","41112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4443","2.080037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4444","2.080476","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4445","2.080485","172.30.1.205","172.30.1.104","TCP","54","41112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4446","2.082691","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4447","2.083260","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4448","2.083266","172.30.1.205","172.30.1.104","TCP","54","41112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4449","2.085099","172.30.1.205","172.30.1.104","TCP","54","41112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4450","2.085209","172.30.1.205","172.30.1.104","TCP","74","33750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905311 TSecr=0 WS=128" +"4451","2.085364","172.30.1.104","172.30.1.205","TCP","54","135 > 41112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4452","2.085392","172.30.1.104","172.30.1.205","TCP","54","135 > 41112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4453","2.085398","172.30.1.205","172.30.1.104","TCP","54","41112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4454","2.085471","172.30.1.104","172.30.1.205","TCP","66","49671 > 33750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4455","2.085480","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4456","2.085824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4457","2.086090","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4458","2.086101","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4459","2.087985","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4460","2.088419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4461","2.088426","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4462","2.089804","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4463","2.091287","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4464","2.091298","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4465","2.092241","172.30.1.205","172.30.1.104","TCP","74","41116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905318 TSecr=0 WS=128" +"4466","2.092556","172.30.1.104","172.30.1.205","TCP","66","135 > 41116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4467","2.092567","172.30.1.205","172.30.1.104","TCP","54","41116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4468","2.092947","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4469","2.094352","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4470","2.094361","172.30.1.205","172.30.1.104","TCP","54","41116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4471","2.096520","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4472","2.096963","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4473","2.096971","172.30.1.205","172.30.1.104","TCP","54","41116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4474","2.098776","172.30.1.205","172.30.1.104","TCP","54","41116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4475","2.098888","172.30.1.205","172.30.1.104","TCP","74","33754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905325 TSecr=0 WS=128" +"4476","2.099075","172.30.1.104","172.30.1.205","TCP","54","135 > 41116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4477","2.099083","172.30.1.104","172.30.1.205","TCP","54","135 > 41116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4478","2.099089","172.30.1.205","172.30.1.104","TCP","54","41116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4479","2.099162","172.30.1.104","172.30.1.205","TCP","66","49671 > 33754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4480","2.099171","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4481","2.099513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4482","2.099799","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4483","2.099808","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4484","2.101699","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4485","2.102063","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4486","2.102070","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4487","2.103402","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4488","2.104493","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4489","2.104502","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4490","2.105452","172.30.1.205","172.30.1.104","TCP","74","41120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905331 TSecr=0 WS=128" +"4491","2.105784","172.30.1.104","172.30.1.205","TCP","66","135 > 41120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4492","2.105794","172.30.1.205","172.30.1.104","TCP","54","41120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4493","2.106141","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4494","2.106432","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4495","2.106440","172.30.1.205","172.30.1.104","TCP","54","41120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4496","2.108597","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4497","2.109025","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4498","2.109034","172.30.1.205","172.30.1.104","TCP","54","41120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4499","2.110906","172.30.1.205","172.30.1.104","TCP","54","41120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4500","2.111026","172.30.1.205","172.30.1.104","TCP","74","33758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905337 TSecr=0 WS=128" +"4501","2.111177","172.30.1.104","172.30.1.205","TCP","54","135 > 41120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4502","2.111209","172.30.1.104","172.30.1.205","TCP","54","135 > 41120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4503","2.111214","172.30.1.205","172.30.1.104","TCP","54","41120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4504","2.111318","172.30.1.104","172.30.1.205","TCP","66","49671 > 33758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4505","2.111327","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4506","2.111677","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4507","2.111980","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4508","2.111987","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4509","2.113865","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4510","2.114233","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4511","2.114240","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4512","2.115583","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4513","2.116572","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4514","2.116582","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4515","2.117541","172.30.1.205","172.30.1.104","TCP","74","41124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905343 TSecr=0 WS=128" +"4516","2.117857","172.30.1.104","172.30.1.205","TCP","66","135 > 41124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4517","2.117868","172.30.1.205","172.30.1.104","TCP","54","41124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4518","2.118217","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4519","2.118541","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4520","2.118558","172.30.1.205","172.30.1.104","TCP","54","41124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4521","2.120934","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4522","2.121332","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4523","2.121345","172.30.1.205","172.30.1.104","TCP","54","41124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4524","2.123264","172.30.1.205","172.30.1.104","TCP","54","41124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4525","2.123374","172.30.1.205","172.30.1.104","TCP","74","33762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905349 TSecr=0 WS=128" +"4526","2.123542","172.30.1.104","172.30.1.205","TCP","54","135 > 41124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4527","2.123563","172.30.1.104","172.30.1.205","TCP","54","135 > 41124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4528","2.123569","172.30.1.205","172.30.1.104","TCP","54","41124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4529","2.123642","172.30.1.104","172.30.1.205","TCP","66","49671 > 33762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4530","2.123651","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4531","2.124012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4532","2.124283","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4533","2.124291","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4534","2.126187","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4535","2.126543","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4536","2.126550","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4537","2.127880","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4538","2.128883","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4539","2.128892","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4540","2.129829","172.30.1.205","172.30.1.104","TCP","74","41128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905356 TSecr=0 WS=128" +"4541","2.130121","172.30.1.104","172.30.1.205","TCP","66","135 > 41128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4542","2.130131","172.30.1.205","172.30.1.104","TCP","54","41128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4543","2.130479","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4544","2.130756","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4545","2.130765","172.30.1.205","172.30.1.104","TCP","54","41128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4546","2.132952","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4547","2.133400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4548","2.133407","172.30.1.205","172.30.1.104","TCP","54","41128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4549","2.135214","172.30.1.205","172.30.1.104","TCP","54","41128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4550","2.135322","172.30.1.205","172.30.1.104","TCP","74","33766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905361 TSecr=0 WS=128" +"4551","2.135495","172.30.1.104","172.30.1.205","TCP","54","135 > 41128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4552","2.135506","172.30.1.104","172.30.1.205","TCP","54","135 > 41128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4553","2.135511","172.30.1.205","172.30.1.104","TCP","54","41128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4554","2.135620","172.30.1.104","172.30.1.205","TCP","66","49671 > 33766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4555","2.135628","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4556","2.135971","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4557","2.136291","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4558","2.136302","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4559","2.138191","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4560","2.138554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4561","2.138560","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4562","2.139891","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4563","2.140963","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4564","2.140982","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4565","2.142012","172.30.1.205","172.30.1.104","TCP","74","41132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905368 TSecr=0 WS=128" +"4566","2.142341","172.30.1.104","172.30.1.205","TCP","66","135 > 41132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4567","2.142352","172.30.1.205","172.30.1.104","TCP","54","41132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4568","2.142698","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4569","2.143008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4570","2.143017","172.30.1.205","172.30.1.104","TCP","54","41132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4571","2.145206","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4572","2.145597","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4573","2.145604","172.30.1.205","172.30.1.104","TCP","54","41132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4574","2.146439","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4575","2.146488","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4576","2.146524","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4577","2.146558","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4578","2.146591","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4579","2.146623","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4580","2.146652","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4581","2.146685","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4582","2.146713","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4583","2.146745","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4584","2.146773","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4585","2.146843","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4586","2.147125","172.30.1.104","172.30.1.205","TCP","54","49671 > 33726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4587","2.147141","172.30.1.104","172.30.1.205","TCP","54","49671 > 33730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4588","2.147175","172.30.1.104","172.30.1.205","TCP","54","49671 > 33726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4589","2.147182","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4590","2.147194","172.30.1.104","172.30.1.205","TCP","54","49671 > 33734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4591","2.147216","172.30.1.104","172.30.1.205","TCP","54","49671 > 33738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4592","2.147262","172.30.1.104","172.30.1.205","TCP","54","49671 > 33738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4593","2.147266","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4594","2.147282","172.30.1.104","172.30.1.205","TCP","54","49671 > 33730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4595","2.147285","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4596","2.147305","172.30.1.104","172.30.1.205","TCP","54","49671 > 33742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4597","2.147325","172.30.1.104","172.30.1.205","TCP","54","49671 > 33746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4598","2.147346","172.30.1.104","172.30.1.205","TCP","54","49671 > 33742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4599","2.147349","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4600","2.147423","172.30.1.104","172.30.1.205","TCP","54","49671 > 33750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4601","2.147441","172.30.1.104","172.30.1.205","TCP","54","49671 > 33734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4602","2.147446","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4603","2.147461","172.30.1.104","172.30.1.205","TCP","54","49671 > 33754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4604","2.147481","172.30.1.104","172.30.1.205","TCP","54","49671 > 33754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4605","2.147485","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4606","2.147501","172.30.1.104","172.30.1.205","TCP","54","49671 > 33758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4607","2.147521","172.30.1.104","172.30.1.205","TCP","54","49671 > 33750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4608","2.147524","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4609","2.147541","172.30.1.104","172.30.1.205","TCP","54","49671 > 33762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4610","2.147561","172.30.1.104","172.30.1.205","TCP","54","49671 > 33762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4611","2.147564","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4612","2.147580","172.30.1.104","172.30.1.205","TCP","54","49671 > 33766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4613","2.147712","172.30.1.104","172.30.1.205","TCP","54","49671 > 33758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4614","2.147716","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4615","2.147988","172.30.1.104","172.30.1.205","TCP","54","49671 > 33722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4616","2.148017","172.30.1.104","172.30.1.205","TCP","54","49671 > 33766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4617","2.148023","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4618","2.148062","172.30.1.104","172.30.1.205","TCP","54","49671 > 33722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4619","2.148067","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4620","2.148082","172.30.1.104","172.30.1.205","TCP","54","49671 > 33746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4621","2.148085","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4622","2.148424","172.30.1.205","172.30.1.104","TCP","54","41132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4623","2.148531","172.30.1.205","172.30.1.104","TCP","74","33770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905374 TSecr=0 WS=128" +"4624","2.148702","172.30.1.104","172.30.1.205","TCP","54","135 > 41132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4625","2.148722","172.30.1.104","172.30.1.205","TCP","54","135 > 41132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4626","2.148727","172.30.1.205","172.30.1.104","TCP","54","41132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4627","2.148797","172.30.1.104","172.30.1.205","TCP","66","49671 > 33770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4628","2.148807","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4629","2.149184","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4630","2.149474","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4631","2.149482","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4632","2.151344","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4633","2.151721","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4634","2.151728","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4635","2.153107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4636","2.155433","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4637","2.155442","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4638","2.156370","172.30.1.205","172.30.1.104","TCP","74","41136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905382 TSecr=0 WS=128" +"4639","2.156676","172.30.1.104","172.30.1.205","TCP","66","135 > 41136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4640","2.156687","172.30.1.205","172.30.1.104","TCP","54","41136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4641","2.157072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4642","2.157392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4643","2.157415","172.30.1.205","172.30.1.104","TCP","54","41136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4644","2.160085","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4645","2.160516","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4646","2.160523","172.30.1.205","172.30.1.104","TCP","54","41136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4647","2.162337","172.30.1.205","172.30.1.104","TCP","54","41136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4648","2.162447","172.30.1.205","172.30.1.104","TCP","74","33774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905388 TSecr=0 WS=128" +"4649","2.162663","172.30.1.104","172.30.1.205","TCP","54","135 > 41136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4650","2.162693","172.30.1.104","172.30.1.205","TCP","54","135 > 41136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4651","2.162699","172.30.1.205","172.30.1.104","TCP","54","41136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4652","2.162808","172.30.1.104","172.30.1.205","TCP","66","49671 > 33774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4653","2.162818","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4654","2.163162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4655","2.163581","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4656","2.163590","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4657","2.165466","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4658","2.165888","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4659","2.165894","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4660","2.167233","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4661","2.168401","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4662","2.168411","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4663","2.169360","172.30.1.205","172.30.1.104","TCP","74","41140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905395 TSecr=0 WS=128" +"4664","2.169685","172.30.1.104","172.30.1.205","TCP","66","135 > 41140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4665","2.169696","172.30.1.205","172.30.1.104","TCP","54","41140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4666","2.170041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4667","2.170349","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4668","2.170358","172.30.1.205","172.30.1.104","TCP","54","41140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4669","2.172512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4670","2.172884","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4671","2.172891","172.30.1.205","172.30.1.104","TCP","54","41140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4672","2.174687","172.30.1.205","172.30.1.104","TCP","54","41140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4673","2.174796","172.30.1.205","172.30.1.104","TCP","74","33778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905401 TSecr=0 WS=128" +"4674","2.174950","172.30.1.104","172.30.1.205","TCP","54","135 > 41140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4675","2.174977","172.30.1.104","172.30.1.205","TCP","54","135 > 41140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4676","2.174983","172.30.1.205","172.30.1.104","TCP","54","41140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4677","2.175057","172.30.1.104","172.30.1.205","TCP","66","49671 > 33778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4678","2.175065","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4679","2.175407","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4680","2.175701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4681","2.175710","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4682","2.177602","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4683","2.177985","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4684","2.177997","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4685","2.179559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4686","2.180631","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4687","2.180641","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4688","2.181590","172.30.1.205","172.30.1.104","TCP","74","41144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905408 TSecr=0 WS=128" +"4689","2.181878","172.30.1.104","172.30.1.205","TCP","66","135 > 41144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4690","2.181889","172.30.1.205","172.30.1.104","TCP","54","41144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4691","2.182233","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4692","2.182510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4693","2.182520","172.30.1.205","172.30.1.104","TCP","54","41144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4694","2.184685","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4695","2.185066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4696","2.185073","172.30.1.205","172.30.1.104","TCP","54","41144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4697","2.186869","172.30.1.205","172.30.1.104","TCP","54","41144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4698","2.186979","172.30.1.205","172.30.1.104","TCP","74","33782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905413 TSecr=0 WS=128" +"4699","2.187194","172.30.1.104","172.30.1.205","TCP","54","135 > 41144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4700","2.187244","172.30.1.104","172.30.1.205","TCP","54","135 > 41144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4701","2.187249","172.30.1.205","172.30.1.104","TCP","54","41144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4702","2.187321","172.30.1.104","172.30.1.205","TCP","66","49671 > 33782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4703","2.187330","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4704","2.187677","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4705","2.187941","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4706","2.187948","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4707","2.189815","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4708","2.190162","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4709","2.190168","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4710","2.191495","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4711","2.192581","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4712","2.192590","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4713","2.193534","172.30.1.205","172.30.1.104","TCP","74","41148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905419 TSecr=0 WS=128" +"4714","2.193830","172.30.1.104","172.30.1.205","TCP","66","135 > 41148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4715","2.193841","172.30.1.205","172.30.1.104","TCP","54","41148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4716","2.194207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4717","2.194492","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4718","2.194501","172.30.1.205","172.30.1.104","TCP","54","41148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4719","2.196670","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4720","2.197038","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4721","2.197046","172.30.1.205","172.30.1.104","TCP","54","41148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4722","2.198839","172.30.1.205","172.30.1.104","TCP","54","41148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4723","2.198948","172.30.1.205","172.30.1.104","TCP","74","33786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905425 TSecr=0 WS=128" +"4724","2.199103","172.30.1.104","172.30.1.205","TCP","54","135 > 41148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4725","2.199140","172.30.1.104","172.30.1.205","TCP","54","135 > 41148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4726","2.199146","172.30.1.205","172.30.1.104","TCP","54","41148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4727","2.199221","172.30.1.104","172.30.1.205","TCP","66","49671 > 33786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4728","2.199230","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4729","2.199594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4730","2.199899","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4731","2.199910","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4732","2.201779","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4733","2.202139","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4734","2.202146","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4735","2.203478","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4736","2.204538","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4737","2.204548","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4738","2.205504","172.30.1.205","172.30.1.104","TCP","74","41152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905431 TSecr=0 WS=128" +"4739","2.205848","172.30.1.104","172.30.1.205","TCP","66","135 > 41152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4740","2.205859","172.30.1.205","172.30.1.104","TCP","54","41152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4741","2.206207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4742","2.206532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4743","2.206541","172.30.1.205","172.30.1.104","TCP","54","41152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4744","2.208696","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4745","2.209177","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4746","2.209184","172.30.1.205","172.30.1.104","TCP","54","41152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4747","2.211003","172.30.1.205","172.30.1.104","TCP","54","41152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4748","2.211113","172.30.1.205","172.30.1.104","TCP","74","33790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905437 TSecr=0 WS=128" +"4749","2.211321","172.30.1.104","172.30.1.205","TCP","54","135 > 41152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4750","2.211351","172.30.1.104","172.30.1.205","TCP","54","135 > 41152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4751","2.211356","172.30.1.205","172.30.1.104","TCP","54","41152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4752","2.211460","172.30.1.104","172.30.1.205","TCP","66","49671 > 33790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4753","2.211468","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4754","2.211817","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4755","2.212711","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4756","2.212720","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4757","2.214594","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4758","2.214978","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4759","2.214985","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4760","2.216327","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4761","2.217451","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4762","2.217461","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4763","2.218399","172.30.1.205","172.30.1.104","TCP","74","41156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905444 TSecr=0 WS=128" +"4764","2.218714","172.30.1.104","172.30.1.205","TCP","66","135 > 41156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4765","2.218725","172.30.1.205","172.30.1.104","TCP","54","41156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4766","2.219072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4767","2.219394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4768","2.219403","172.30.1.205","172.30.1.104","TCP","54","41156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4769","2.221626","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4770","2.222028","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4771","2.222034","172.30.1.205","172.30.1.104","TCP","54","41156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4772","2.223834","172.30.1.205","172.30.1.104","TCP","54","41156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4773","2.223944","172.30.1.205","172.30.1.104","TCP","74","33794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905450 TSecr=0 WS=128" +"4774","2.224109","172.30.1.104","172.30.1.205","TCP","54","135 > 41156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4775","2.224137","172.30.1.104","172.30.1.205","TCP","54","135 > 41156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4776","2.224143","172.30.1.205","172.30.1.104","TCP","54","41156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4777","2.224239","172.30.1.104","172.30.1.205","TCP","66","49671 > 33794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4778","2.224247","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4779","2.224591","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4780","2.224920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4781","2.224930","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4782","2.226830","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4783","2.227187","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4784","2.227193","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4785","2.228528","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4786","2.229580","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4787","2.229590","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4788","2.230525","172.30.1.205","172.30.1.104","TCP","74","41160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905456 TSecr=0 WS=128" +"4789","2.230873","172.30.1.104","172.30.1.205","TCP","66","135 > 41160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4790","2.230883","172.30.1.205","172.30.1.104","TCP","54","41160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4791","2.231232","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4792","2.231527","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4793","2.231536","172.30.1.205","172.30.1.104","TCP","54","41160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4794","2.233731","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4795","2.234116","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4796","2.234123","172.30.1.205","172.30.1.104","TCP","54","41160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4797","2.235921","172.30.1.205","172.30.1.104","TCP","54","41160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4798","2.236032","172.30.1.205","172.30.1.104","TCP","74","33798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905462 TSecr=0 WS=128" +"4799","2.236177","172.30.1.104","172.30.1.205","TCP","54","135 > 41160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4800","2.236214","172.30.1.104","172.30.1.205","TCP","54","135 > 41160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4801","2.236219","172.30.1.205","172.30.1.104","TCP","54","41160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4802","2.236309","172.30.1.104","172.30.1.205","TCP","66","49671 > 33798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4803","2.236317","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4804","2.236662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4805","2.236924","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4806","2.236933","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4807","2.238808","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4808","2.239159","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4809","2.239166","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4810","2.240502","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4811","2.241500","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4812","2.241510","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4813","2.242449","172.30.1.205","172.30.1.104","TCP","74","41164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905468 TSecr=0 WS=128" +"4814","2.242820","172.30.1.104","172.30.1.205","TCP","66","135 > 41164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4815","2.242830","172.30.1.205","172.30.1.104","TCP","54","41164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4816","2.243175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4817","2.243492","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4818","2.243501","172.30.1.205","172.30.1.104","TCP","54","41164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4819","2.245683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4820","2.246130","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4821","2.246137","172.30.1.205","172.30.1.104","TCP","54","41164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4822","2.247929","172.30.1.205","172.30.1.104","TCP","54","41164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4823","2.248054","172.30.1.205","172.30.1.104","TCP","74","33802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905474 TSecr=0 WS=128" +"4824","2.248195","172.30.1.104","172.30.1.205","TCP","54","135 > 41164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4825","2.248203","172.30.1.104","172.30.1.205","TCP","54","135 > 41164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4826","2.248208","172.30.1.205","172.30.1.104","TCP","54","41164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4827","2.248348","172.30.1.104","172.30.1.205","TCP","66","49671 > 33802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4828","2.248356","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4829","2.248697","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4830","2.248976","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4831","2.248985","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4832","2.250827","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4833","2.251259","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4834","2.251266","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4835","2.252597","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4836","2.254968","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4837","2.254977","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4838","2.255911","172.30.1.205","172.30.1.104","TCP","74","41168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905482 TSecr=0 WS=128" +"4839","2.256205","172.30.1.104","172.30.1.205","TCP","66","135 > 41168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4840","2.256216","172.30.1.205","172.30.1.104","TCP","54","41168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4841","2.256559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4842","2.256829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4843","2.256838","172.30.1.205","172.30.1.104","TCP","54","41168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4844","2.259007","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4845","2.259386","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4846","2.259392","172.30.1.205","172.30.1.104","TCP","54","41168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4847","2.261207","172.30.1.205","172.30.1.104","TCP","54","41168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4848","2.261319","172.30.1.205","172.30.1.104","TCP","74","33806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905487 TSecr=0 WS=128" +"4849","2.261497","172.30.1.104","172.30.1.205","TCP","54","135 > 41168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4850","2.261508","172.30.1.104","172.30.1.205","TCP","54","135 > 41168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4851","2.261513","172.30.1.205","172.30.1.104","TCP","54","41168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4852","2.261588","172.30.1.104","172.30.1.205","TCP","66","49671 > 33806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4853","2.261596","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4854","2.261937","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4855","2.262211","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4856","2.262220","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4857","2.264053","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4858","2.264422","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4859","2.264428","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4860","2.265806","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4861","2.266818","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4862","2.266828","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4863","2.267751","172.30.1.205","172.30.1.104","TCP","74","41172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905494 TSecr=0 WS=128" +"4864","2.268072","172.30.1.104","172.30.1.205","TCP","66","135 > 41172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4865","2.268082","172.30.1.205","172.30.1.104","TCP","54","41172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4866","2.268442","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4867","2.268708","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4868","2.268718","172.30.1.205","172.30.1.104","TCP","54","41172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4869","2.270934","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4870","2.271288","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4871","2.271294","172.30.1.205","172.30.1.104","TCP","54","41172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4872","2.273149","172.30.1.205","172.30.1.104","TCP","54","41172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4873","2.273258","172.30.1.205","172.30.1.104","TCP","74","33810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905499 TSecr=0 WS=128" +"4874","2.273402","172.30.1.104","172.30.1.205","TCP","54","135 > 41172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4875","2.273446","172.30.1.104","172.30.1.205","TCP","54","135 > 41172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4876","2.273451","172.30.1.205","172.30.1.104","TCP","54","41172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4877","2.273523","172.30.1.104","172.30.1.205","TCP","66","49671 > 33810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4878","2.273532","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4879","2.273878","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4880","2.274146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4881","2.274155","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4882","2.276029","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4883","2.276366","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4884","2.276372","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4885","2.277726","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4886","2.278785","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4887","2.278795","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4888","2.279713","172.30.1.205","172.30.1.104","TCP","74","41176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905506 TSecr=0 WS=128" +"4889","2.279970","172.30.1.104","172.30.1.205","TCP","66","135 > 41176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4890","2.279980","172.30.1.205","172.30.1.104","TCP","54","41176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4891","2.280322","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4892","2.280582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4893","2.280590","172.30.1.205","172.30.1.104","TCP","54","41176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4894","2.282767","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4895","2.283144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4896","2.283151","172.30.1.205","172.30.1.104","TCP","54","41176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4897","2.284971","172.30.1.205","172.30.1.104","TCP","54","41176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4898","2.285079","172.30.1.205","172.30.1.104","TCP","74","33814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905511 TSecr=0 WS=128" +"4899","2.285268","172.30.1.104","172.30.1.205","TCP","54","135 > 41176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4900","2.285277","172.30.1.104","172.30.1.205","TCP","54","135 > 41176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4901","2.285282","172.30.1.205","172.30.1.104","TCP","54","41176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4902","2.285389","172.30.1.104","172.30.1.205","TCP","66","49671 > 33814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4903","2.285397","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4904","2.285736","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4905","2.286030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4906","2.286039","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4907","2.287891","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4908","2.288222","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4909","2.288229","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4910","2.289592","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4911","2.291108","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4912","2.291118","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4913","2.292037","172.30.1.205","172.30.1.104","TCP","74","41180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905518 TSecr=0 WS=128" +"4914","2.292387","172.30.1.104","172.30.1.205","TCP","66","135 > 41180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4915","2.292397","172.30.1.205","172.30.1.104","TCP","54","41180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4916","2.292742","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4917","2.293011","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4918","2.293020","172.30.1.205","172.30.1.104","TCP","54","41180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4919","2.295195","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4920","2.296993","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4921","2.297000","172.30.1.205","172.30.1.104","TCP","54","41180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4922","2.297851","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4923","2.297911","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4924","2.297951","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4925","2.297984","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4926","2.298016","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4927","2.298044","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4928","2.298071","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4929","2.298098","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4930","2.298125","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4931","2.298157","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4932","2.298184","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4933","2.298268","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4934","2.298351","172.30.1.104","172.30.1.205","TCP","54","49671 > 33774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4935","2.298369","172.30.1.104","172.30.1.205","TCP","54","49671 > 33778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4936","2.298389","172.30.1.104","172.30.1.205","TCP","54","49671 > 33782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4937","2.298412","172.30.1.104","172.30.1.205","TCP","54","49671 > 33786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4938","2.298435","172.30.1.104","172.30.1.205","TCP","54","49671 > 33790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4939","2.298455","172.30.1.104","172.30.1.205","TCP","54","49671 > 33794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4940","2.298483","172.30.1.104","172.30.1.205","TCP","54","49671 > 33798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4941","2.298497","172.30.1.104","172.30.1.205","TCP","54","49671 > 33802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4942","2.298517","172.30.1.104","172.30.1.205","TCP","54","49671 > 33806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4943","2.298606","172.30.1.104","172.30.1.205","TCP","54","49671 > 33810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4944","2.298624","172.30.1.104","172.30.1.205","TCP","54","49671 > 33790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4945","2.298631","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4946","2.298646","172.30.1.104","172.30.1.205","TCP","54","49671 > 33786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4947","2.298649","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4948","2.298669","172.30.1.104","172.30.1.205","TCP","54","49671 > 33774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4949","2.298672","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4950","2.298689","172.30.1.104","172.30.1.205","TCP","54","49671 > 33810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4951","2.298692","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4952","2.298707","172.30.1.104","172.30.1.205","TCP","54","49671 > 33806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4953","2.298710","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4954","2.298726","172.30.1.104","172.30.1.205","TCP","54","49671 > 33802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4955","2.298730","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4956","2.298746","172.30.1.104","172.30.1.205","TCP","54","49671 > 33798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4957","2.298750","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4958","2.298766","172.30.1.104","172.30.1.205","TCP","54","49671 > 33794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4959","2.298770","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4960","2.298786","172.30.1.104","172.30.1.205","TCP","54","49671 > 33778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4961","2.298789","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4962","2.298806","172.30.1.104","172.30.1.205","TCP","54","49671 > 33782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4963","2.298810","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4964","2.299030","172.30.1.104","172.30.1.205","TCP","54","49671 > 33814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4965","2.299049","172.30.1.104","172.30.1.205","TCP","54","49671 > 33770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4966","2.299069","172.30.1.104","172.30.1.205","TCP","54","49671 > 33814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4967","2.299074","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4968","2.299089","172.30.1.104","172.30.1.205","TCP","54","49671 > 33770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"4969","2.299092","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"4970","2.299853","172.30.1.205","172.30.1.104","TCP","54","41180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4971","2.299975","172.30.1.205","172.30.1.104","TCP","74","33818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905526 TSecr=0 WS=128" +"4972","2.300100","172.30.1.104","172.30.1.205","TCP","54","135 > 41180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4973","2.300121","172.30.1.104","172.30.1.205","TCP","54","135 > 41180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4974","2.300127","172.30.1.205","172.30.1.104","TCP","54","41180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"4975","2.300230","172.30.1.104","172.30.1.205","TCP","66","49671 > 33818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4976","2.300239","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4977","2.300591","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"4978","2.300875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4979","2.300884","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4980","2.302780","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"4981","2.303145","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"4982","2.303151","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"4983","2.304512","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"4984","2.305582","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"4985","2.305591","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"4986","2.306547","172.30.1.205","172.30.1.104","TCP","74","41184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905532 TSecr=0 WS=128" +"4987","2.306830","172.30.1.104","172.30.1.205","TCP","66","135 > 41184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"4988","2.306841","172.30.1.205","172.30.1.104","TCP","54","41184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"4989","2.307186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"4990","2.307455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"4991","2.307464","172.30.1.205","172.30.1.104","TCP","54","41184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"4992","2.309662","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"4993","2.310023","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"4994","2.310030","172.30.1.205","172.30.1.104","TCP","54","41184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4995","2.311818","172.30.1.205","172.30.1.104","TCP","54","41184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"4996","2.311929","172.30.1.205","172.30.1.104","TCP","74","33822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905538 TSecr=0 WS=128" +"4997","2.312094","172.30.1.104","172.30.1.205","TCP","54","135 > 41184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4998","2.312102","172.30.1.104","172.30.1.205","TCP","54","135 > 41184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"4999","2.312108","172.30.1.205","172.30.1.104","TCP","54","41184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5000","2.312208","172.30.1.104","172.30.1.205","TCP","66","49671 > 33822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5001","2.312216","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5002","2.312558","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5003","2.312856","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5004","2.312872","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5005","2.314808","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5006","2.315171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5007","2.315178","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5008","2.316512","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5009","2.317547","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5010","2.317557","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5011","2.318507","172.30.1.205","172.30.1.104","TCP","74","41188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905544 TSecr=0 WS=128" +"5012","2.318831","172.30.1.104","172.30.1.205","TCP","66","135 > 41188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5013","2.318841","172.30.1.205","172.30.1.104","TCP","54","41188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5014","2.319184","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5015","2.319481","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5016","2.319490","172.30.1.205","172.30.1.104","TCP","54","41188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5017","2.321683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5018","2.322091","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5019","2.322098","172.30.1.205","172.30.1.104","TCP","54","41188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5020","2.323882","172.30.1.205","172.30.1.104","TCP","54","41188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5021","2.323991","172.30.1.205","172.30.1.104","TCP","74","33826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905550 TSecr=0 WS=128" +"5022","2.324206","172.30.1.104","172.30.1.205","TCP","54","135 > 41188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5023","2.324215","172.30.1.104","172.30.1.205","TCP","54","135 > 41188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5024","2.324220","172.30.1.205","172.30.1.104","TCP","54","41188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5025","2.324315","172.30.1.104","172.30.1.205","TCP","66","49671 > 33826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5026","2.324324","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5027","2.324664","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5028","2.324968","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5029","2.324980","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5030","2.326925","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5031","2.327286","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5032","2.327293","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5033","2.328658","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5034","2.329690","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5035","2.329701","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5036","2.330667","172.30.1.205","172.30.1.104","TCP","74","41192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905557 TSecr=0 WS=128" +"5037","2.330947","172.30.1.104","172.30.1.205","TCP","66","135 > 41192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5038","2.330958","172.30.1.205","172.30.1.104","TCP","54","41192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5039","2.331305","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5040","2.331572","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5041","2.331582","172.30.1.205","172.30.1.104","TCP","54","41192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5042","2.333779","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5043","2.334135","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5044","2.334141","172.30.1.205","172.30.1.104","TCP","54","41192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5045","2.335941","172.30.1.205","172.30.1.104","TCP","54","41192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5046","2.336053","172.30.1.205","172.30.1.104","TCP","74","33830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905562 TSecr=0 WS=128" +"5047","2.336232","172.30.1.104","172.30.1.205","TCP","54","135 > 41192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5048","2.336242","172.30.1.104","172.30.1.205","TCP","54","135 > 41192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5049","2.336247","172.30.1.205","172.30.1.104","TCP","54","41192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5050","2.336323","172.30.1.104","172.30.1.205","TCP","66","49671 > 33830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5051","2.336332","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5052","2.336678","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5053","2.336943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5054","2.336950","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5055","2.338821","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5056","2.339173","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5057","2.339179","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5058","2.340522","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5059","2.341579","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5060","2.341590","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5061","2.342538","172.30.1.205","172.30.1.104","TCP","74","41196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905568 TSecr=0 WS=128" +"5062","2.342801","172.30.1.104","172.30.1.205","TCP","66","135 > 41196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5063","2.342812","172.30.1.205","172.30.1.104","TCP","54","41196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5064","2.343159","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5065","2.343424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5066","2.343433","172.30.1.205","172.30.1.104","TCP","54","41196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5067","2.345639","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5068","2.345997","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5069","2.346003","172.30.1.205","172.30.1.104","TCP","54","41196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5070","2.347819","172.30.1.205","172.30.1.104","TCP","54","41196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5071","2.347931","172.30.1.205","172.30.1.104","TCP","74","33834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905574 TSecr=0 WS=128" +"5072","2.348083","172.30.1.104","172.30.1.205","TCP","54","135 > 41196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5073","2.348092","172.30.1.104","172.30.1.205","TCP","54","135 > 41196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5074","2.348098","172.30.1.205","172.30.1.104","TCP","54","41196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5075","2.348189","172.30.1.104","172.30.1.205","TCP","66","49671 > 33834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5076","2.348197","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5077","2.348539","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5078","2.348792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5079","2.348802","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5080","2.350707","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5081","2.351054","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5082","2.351060","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5083","2.352406","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5084","2.353404","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5085","2.353413","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5086","2.354358","172.30.1.205","172.30.1.104","TCP","74","41200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905580 TSecr=0 WS=128" +"5087","2.354676","172.30.1.104","172.30.1.205","TCP","66","135 > 41200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5088","2.354687","172.30.1.205","172.30.1.104","TCP","54","41200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5089","2.355036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5090","2.355306","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5091","2.355314","172.30.1.205","172.30.1.104","TCP","54","41200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5092","2.357526","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5093","2.357906","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5094","2.357913","172.30.1.205","172.30.1.104","TCP","54","41200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5095","2.359725","172.30.1.205","172.30.1.104","TCP","54","41200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5096","2.359839","172.30.1.205","172.30.1.104","TCP","74","33838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905586 TSecr=0 WS=128" +"5097","2.359996","172.30.1.104","172.30.1.205","TCP","54","135 > 41200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5098","2.360020","172.30.1.104","172.30.1.205","TCP","54","135 > 41200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5099","2.360026","172.30.1.205","172.30.1.104","TCP","54","41200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5100","2.360109","172.30.1.104","172.30.1.205","TCP","66","49671 > 33838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5101","2.360118","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5102","2.360463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5103","2.360745","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5104","2.360754","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5105","2.362659","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5106","2.363760","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5107","2.363766","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5108","2.365163","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5109","2.366223","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5110","2.366233","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5111","2.367164","172.30.1.205","172.30.1.104","TCP","74","41204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905593 TSecr=0 WS=128" +"5112","2.367501","172.30.1.104","172.30.1.205","TCP","66","135 > 41204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5113","2.367512","172.30.1.205","172.30.1.104","TCP","54","41204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5114","2.367860","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5115","2.368135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5116","2.368144","172.30.1.205","172.30.1.104","TCP","54","41204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5117","2.370378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5118","2.370745","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5119","2.370752","172.30.1.205","172.30.1.104","TCP","54","41204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5120","2.372555","172.30.1.205","172.30.1.104","TCP","54","41204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5121","2.372667","172.30.1.205","172.30.1.104","TCP","74","33842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905599 TSecr=0 WS=128" +"5122","2.372794","172.30.1.104","172.30.1.205","TCP","54","135 > 41204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5123","2.372850","172.30.1.104","172.30.1.205","TCP","54","135 > 41204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5124","2.372856","172.30.1.205","172.30.1.104","TCP","54","41204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5125","2.372960","172.30.1.104","172.30.1.205","TCP","66","49671 > 33842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5126","2.372968","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5127","2.373320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5128","2.373586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5129","2.373595","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5130","2.375474","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5131","2.375811","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5132","2.375817","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5133","2.377210","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5134","2.378220","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5135","2.378230","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5136","2.379163","172.30.1.205","172.30.1.104","TCP","74","41208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905605 TSecr=0 WS=128" +"5137","2.379453","172.30.1.104","172.30.1.205","TCP","66","135 > 41208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5138","2.379463","172.30.1.205","172.30.1.104","TCP","54","41208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5139","2.379823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5140","2.380099","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5141","2.380108","172.30.1.205","172.30.1.104","TCP","54","41208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5142","2.382338","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5143","2.382700","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5144","2.382707","172.30.1.205","172.30.1.104","TCP","54","41208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5145","2.384532","172.30.1.205","172.30.1.104","TCP","54","41208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5146","2.384656","172.30.1.205","172.30.1.104","TCP","74","33846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905611 TSecr=0 WS=128" +"5147","2.384844","172.30.1.104","172.30.1.205","TCP","54","135 > 41208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5148","2.384855","172.30.1.104","172.30.1.205","TCP","54","135 > 41208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5149","2.384862","172.30.1.205","172.30.1.104","TCP","54","41208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5150","2.384930","172.30.1.104","172.30.1.205","TCP","66","49671 > 33846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5151","2.384939","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5152","2.385292","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5153","2.385555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5154","2.385564","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5155","2.387438","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5156","2.387781","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5157","2.387787","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5158","2.389186","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5159","2.390206","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5160","2.390215","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5161","2.391169","172.30.1.205","172.30.1.104","TCP","74","41212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905617 TSecr=0 WS=128" +"5162","2.391444","172.30.1.104","172.30.1.205","TCP","66","135 > 41212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5163","2.391455","172.30.1.205","172.30.1.104","TCP","54","41212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5164","2.391810","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5165","2.392079","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5166","2.392088","172.30.1.205","172.30.1.104","TCP","54","41212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5167","2.394285","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5168","2.394694","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5169","2.394700","172.30.1.205","172.30.1.104","TCP","54","41212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5170","2.396503","172.30.1.205","172.30.1.104","TCP","54","41212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5171","2.396616","172.30.1.205","172.30.1.104","TCP","74","33850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905623 TSecr=0 WS=128" +"5172","2.396763","172.30.1.104","172.30.1.205","TCP","54","135 > 41212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5173","2.396812","172.30.1.104","172.30.1.205","TCP","54","135 > 41212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5174","2.396819","172.30.1.205","172.30.1.104","TCP","54","41212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5175","2.396888","172.30.1.104","172.30.1.205","TCP","66","49671 > 33850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5176","2.396897","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5177","2.397239","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5178","2.397589","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5179","2.397596","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5180","2.399447","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5181","2.399826","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5182","2.399832","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5183","2.401212","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5184","2.402292","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5185","2.402302","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5186","2.403250","172.30.1.205","172.30.1.104","TCP","74","41216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905629 TSecr=0 WS=128" +"5187","2.403525","172.30.1.104","172.30.1.205","TCP","66","135 > 41216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5188","2.403536","172.30.1.205","172.30.1.104","TCP","54","41216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5189","2.403885","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5190","2.404148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5191","2.404157","172.30.1.205","172.30.1.104","TCP","54","41216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5192","2.406374","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5193","2.406793","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5194","2.406799","172.30.1.205","172.30.1.104","TCP","54","41216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5195","2.408623","172.30.1.205","172.30.1.104","TCP","54","41216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5196","2.408746","172.30.1.205","172.30.1.104","TCP","74","33854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905635 TSecr=0 WS=128" +"5197","2.408895","172.30.1.104","172.30.1.205","TCP","54","135 > 41216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5198","2.408905","172.30.1.104","172.30.1.205","TCP","54","135 > 41216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5199","2.408912","172.30.1.205","172.30.1.104","TCP","54","41216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5200","2.409008","172.30.1.104","172.30.1.205","TCP","66","49671 > 33854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5201","2.409016","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5202","2.409388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5203","2.409656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5204","2.409665","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5205","2.411561","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5206","2.411908","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5207","2.411914","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5208","2.413293","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5209","2.414311","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5210","2.414320","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5211","2.415244","172.30.1.205","172.30.1.104","TCP","74","41220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905641 TSecr=0 WS=128" +"5212","2.415532","172.30.1.104","172.30.1.205","TCP","66","135 > 41220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5213","2.415543","172.30.1.205","172.30.1.104","TCP","54","41220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5214","2.415894","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5215","2.416177","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5216","2.416186","172.30.1.205","172.30.1.104","TCP","54","41220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5217","2.418399","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5218","2.418760","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5219","2.418768","172.30.1.205","172.30.1.104","TCP","54","41220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5220","2.420577","172.30.1.205","172.30.1.104","TCP","54","41220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5221","2.420689","172.30.1.205","172.30.1.104","TCP","74","33858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905647 TSecr=0 WS=128" +"5222","2.420820","172.30.1.104","172.30.1.205","TCP","54","135 > 41220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5223","2.420866","172.30.1.104","172.30.1.205","TCP","54","135 > 41220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5224","2.420872","172.30.1.205","172.30.1.104","TCP","54","41220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5225","2.420944","172.30.1.104","172.30.1.205","TCP","66","49671 > 33858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5226","2.420952","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5227","2.421308","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5228","2.421600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5229","2.421609","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5230","2.423488","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5231","2.423834","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5232","2.423840","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5233","2.425217","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5234","2.426237","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5235","2.426246","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5236","2.427182","172.30.1.205","172.30.1.104","TCP","74","41224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905653 TSecr=0 WS=128" +"5237","2.427466","172.30.1.104","172.30.1.205","TCP","66","135 > 41224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5238","2.427477","172.30.1.205","172.30.1.104","TCP","54","41224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5239","2.427824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5240","2.428085","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5241","2.428095","172.30.1.205","172.30.1.104","TCP","54","41224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5242","2.430294","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5243","2.430705","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5244","2.430712","172.30.1.205","172.30.1.104","TCP","54","41224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5245","2.432526","172.30.1.205","172.30.1.104","TCP","54","41224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5246","2.432637","172.30.1.205","172.30.1.104","TCP","74","33862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905659 TSecr=0 WS=128" +"5247","2.432815","172.30.1.104","172.30.1.205","TCP","54","135 > 41224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5248","2.432824","172.30.1.104","172.30.1.205","TCP","54","135 > 41224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5249","2.432830","172.30.1.205","172.30.1.104","TCP","54","41224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5250","2.432904","172.30.1.104","172.30.1.205","TCP","66","49671 > 33862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5251","2.432912","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5252","2.433263","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5253","2.433551","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5254","2.433560","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5255","2.435424","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5256","2.435771","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5257","2.435777","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5258","2.437155","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5259","2.438195","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5260","2.438204","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5261","2.439125","172.30.1.205","172.30.1.104","TCP","74","41228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905665 TSecr=0 WS=128" +"5262","2.439404","172.30.1.104","172.30.1.205","TCP","66","135 > 41228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5263","2.439415","172.30.1.205","172.30.1.104","TCP","54","41228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5264","2.439767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5265","2.440031","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5266","2.440040","172.30.1.205","172.30.1.104","TCP","54","41228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5267","2.442255","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5268","2.442649","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5269","2.442656","172.30.1.205","172.30.1.104","TCP","54","41228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5270","2.443495","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5271","2.443553","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5272","2.443593","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5273","2.443628","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5274","2.443661","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5275","2.443693","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5276","2.443724","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5277","2.443750","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5278","2.443777","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5279","2.443799","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5280","2.443820","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5281","2.443895","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5282","2.444097","172.30.1.104","172.30.1.205","TCP","54","49671 > 33822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5283","2.444107","172.30.1.104","172.30.1.205","TCP","54","49671 > 33826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5284","2.444110","172.30.1.104","172.30.1.205","TCP","54","49671 > 33822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5285","2.444117","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5286","2.444124","172.30.1.104","172.30.1.205","TCP","54","49671 > 33826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5287","2.444126","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5288","2.444127","172.30.1.104","172.30.1.205","TCP","54","49671 > 33830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5289","2.444131","172.30.1.104","172.30.1.205","TCP","54","49671 > 33834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5290","2.444137","172.30.1.104","172.30.1.205","TCP","54","49671 > 33830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5291","2.444139","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5292","2.444141","172.30.1.104","172.30.1.205","TCP","54","49671 > 33834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5293","2.444143","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5294","2.444144","172.30.1.104","172.30.1.205","TCP","54","49671 > 33838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5295","2.444147","172.30.1.104","172.30.1.205","TCP","54","49671 > 33842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5296","2.444540","172.30.1.104","172.30.1.205","TCP","54","49671 > 33838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5297","2.444547","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5298","2.444554","172.30.1.104","172.30.1.205","TCP","54","49671 > 33846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5299","2.444564","172.30.1.104","172.30.1.205","TCP","54","49671 > 33842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5300","2.444566","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5301","2.444567","172.30.1.104","172.30.1.205","TCP","54","49671 > 33846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5302","2.444569","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5303","2.444570","172.30.1.104","172.30.1.205","TCP","54","49671 > 33850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5304","2.444573","172.30.1.104","172.30.1.205","TCP","54","49671 > 33854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5305","2.444575","172.30.1.104","172.30.1.205","TCP","54","49671 > 33858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5306","2.444578","172.30.1.104","172.30.1.205","TCP","54","49671 > 33862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5307","2.444580","172.30.1.104","172.30.1.205","TCP","54","49671 > 33862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5308","2.444582","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5309","2.444583","172.30.1.104","172.30.1.205","TCP","54","49671 > 33858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5310","2.444585","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5311","2.444587","172.30.1.104","172.30.1.205","TCP","54","49671 > 33850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5312","2.444589","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5313","2.444593","172.30.1.104","172.30.1.205","TCP","54","49671 > 33854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5314","2.444595","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5315","2.444597","172.30.1.104","172.30.1.205","TCP","54","49671 > 33818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5316","2.444599","172.30.1.104","172.30.1.205","TCP","54","49671 > 33818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5317","2.444601","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5318","2.445337","172.30.1.205","172.30.1.104","TCP","54","41228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5319","2.445452","172.30.1.205","172.30.1.104","TCP","74","33866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905671 TSecr=0 WS=128" +"5320","2.445575","172.30.1.104","172.30.1.205","TCP","54","135 > 41228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5321","2.445595","172.30.1.104","172.30.1.205","TCP","54","135 > 41228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5322","2.445600","172.30.1.205","172.30.1.104","TCP","54","41228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5323","2.445714","172.30.1.104","172.30.1.205","TCP","66","49671 > 33866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5324","2.445722","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5325","2.446074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5326","2.446343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5327","2.446357","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5328","2.448306","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5329","2.448717","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5330","2.448724","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5331","2.450123","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5332","2.451256","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5333","2.451268","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5334","2.452262","172.30.1.205","172.30.1.104","TCP","74","41232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905678 TSecr=0 WS=128" +"5335","2.452579","172.30.1.104","172.30.1.205","TCP","66","135 > 41232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5336","2.452590","172.30.1.205","172.30.1.104","TCP","54","41232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5337","2.452988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5338","2.453271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5339","2.453280","172.30.1.205","172.30.1.104","TCP","54","41232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5340","2.455485","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5341","2.455868","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5342","2.455875","172.30.1.205","172.30.1.104","TCP","54","41232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5343","2.457718","172.30.1.205","172.30.1.104","TCP","54","41232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5344","2.457839","172.30.1.205","172.30.1.104","TCP","74","33870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905684 TSecr=0 WS=128" +"5345","2.457974","172.30.1.104","172.30.1.205","TCP","54","135 > 41232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5346","2.458019","172.30.1.104","172.30.1.205","TCP","54","135 > 41232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5347","2.458025","172.30.1.205","172.30.1.104","TCP","54","41232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5348","2.458093","172.30.1.104","172.30.1.205","TCP","66","49671 > 33870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5349","2.458102","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5350","2.458452","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5351","2.461033","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5352","2.461042","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5353","2.462930","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5354","2.463290","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5355","2.463297","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5356","2.464662","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5357","2.465770","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5358","2.465781","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5359","2.466767","172.30.1.205","172.30.1.104","TCP","74","41236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905693 TSecr=0 WS=128" +"5360","2.467135","172.30.1.104","172.30.1.205","TCP","66","135 > 41236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5361","2.467146","172.30.1.205","172.30.1.104","TCP","54","41236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5362","2.467500","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5363","2.467780","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5364","2.467788","172.30.1.205","172.30.1.104","TCP","54","41236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5365","2.470018","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5366","2.470400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5367","2.470407","172.30.1.205","172.30.1.104","TCP","54","41236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5368","2.472215","172.30.1.205","172.30.1.104","TCP","54","41236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5369","2.472330","172.30.1.205","172.30.1.104","TCP","74","33874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905698 TSecr=0 WS=128" +"5370","2.472560","172.30.1.104","172.30.1.205","TCP","54","135 > 41236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5371","2.472569","172.30.1.104","172.30.1.205","TCP","54","135 > 41236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5372","2.472575","172.30.1.205","172.30.1.104","TCP","54","41236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5373","2.472674","172.30.1.104","172.30.1.205","TCP","66","49671 > 33874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5374","2.472683","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5375","2.473070","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5376","2.473385","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5377","2.473394","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5378","2.475257","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5379","2.475611","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5380","2.475617","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5381","2.477000","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5382","2.478760","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5383","2.478769","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5384","2.479742","172.30.1.205","172.30.1.104","TCP","74","41240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905706 TSecr=0 WS=128" +"5385","2.480022","172.30.1.104","172.30.1.205","TCP","66","135 > 41240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5386","2.480033","172.30.1.205","172.30.1.104","TCP","54","41240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5387","2.480382","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5388","2.480651","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5389","2.480660","172.30.1.205","172.30.1.104","TCP","54","41240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5390","2.482875","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5391","2.483270","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5392","2.483278","172.30.1.205","172.30.1.104","TCP","54","41240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5393","2.485137","172.30.1.205","172.30.1.104","TCP","54","41240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5394","2.485255","172.30.1.205","172.30.1.104","TCP","74","33878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905711 TSecr=0 WS=128" +"5395","2.485411","172.30.1.104","172.30.1.205","TCP","54","135 > 41240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5396","2.485450","172.30.1.104","172.30.1.205","TCP","54","135 > 41240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5397","2.485457","172.30.1.205","172.30.1.104","TCP","54","41240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5398","2.485564","172.30.1.104","172.30.1.205","TCP","66","49671 > 33878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5399","2.485572","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5400","2.485919","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5401","2.486194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5402","2.486201","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5403","2.488053","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5404","2.488402","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5405","2.488408","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5406","2.489780","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5407","2.490846","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5408","2.490855","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5409","2.491795","172.30.1.205","172.30.1.104","TCP","74","41244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905718 TSecr=0 WS=128" +"5410","2.492121","172.30.1.104","172.30.1.205","TCP","66","135 > 41244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5411","2.492132","172.30.1.205","172.30.1.104","TCP","54","41244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5412","2.492481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5413","2.492759","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5414","2.492768","172.30.1.205","172.30.1.104","TCP","54","41244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5415","2.494958","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5416","2.495317","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5417","2.495324","172.30.1.205","172.30.1.104","TCP","54","41244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5418","2.497154","172.30.1.205","172.30.1.104","TCP","54","41244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5419","2.497267","172.30.1.205","172.30.1.104","TCP","74","33882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905723 TSecr=0 WS=128" +"5420","2.497437","172.30.1.104","172.30.1.205","TCP","54","135 > 41244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5421","2.497446","172.30.1.104","172.30.1.205","TCP","54","135 > 41244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5422","2.497452","172.30.1.205","172.30.1.104","TCP","54","41244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5423","2.497531","172.30.1.104","172.30.1.205","TCP","66","49671 > 33882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5424","2.497539","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5425","2.497882","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5426","2.498148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5427","2.498156","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5428","2.500021","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5429","2.500357","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5430","2.500363","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5431","2.501733","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5432","2.502853","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5433","2.502863","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5434","2.503804","172.30.1.205","172.30.1.104","TCP","74","41248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905730 TSecr=0 WS=128" +"5435","2.504100","172.30.1.104","172.30.1.205","TCP","66","135 > 41248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5436","2.504111","172.30.1.205","172.30.1.104","TCP","54","41248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5437","2.504458","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5438","2.504754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5439","2.504763","172.30.1.205","172.30.1.104","TCP","54","41248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5440","2.506947","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5441","2.507354","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5442","2.507360","172.30.1.205","172.30.1.104","TCP","54","41248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5443","2.509219","172.30.1.205","172.30.1.104","TCP","54","41248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5444","2.509330","172.30.1.205","172.30.1.104","TCP","74","33886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905735 TSecr=0 WS=128" +"5445","2.509491","172.30.1.104","172.30.1.205","TCP","54","135 > 41248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5446","2.509500","172.30.1.104","172.30.1.205","TCP","54","135 > 41248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5447","2.509506","172.30.1.205","172.30.1.104","TCP","54","41248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5448","2.509607","172.30.1.104","172.30.1.205","TCP","66","49671 > 33886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5449","2.509616","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5450","2.509978","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5451","2.510249","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5452","2.510258","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5453","2.512114","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5454","2.512512","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5455","2.512518","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5456","2.513894","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5457","2.514969","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5458","2.514978","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5459","2.515918","172.30.1.205","172.30.1.104","TCP","74","41252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905742 TSecr=0 WS=128" +"5460","2.516215","172.30.1.104","172.30.1.205","TCP","66","135 > 41252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5461","2.516226","172.30.1.205","172.30.1.104","TCP","54","41252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5462","2.516575","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5463","2.516859","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5464","2.516868","172.30.1.205","172.30.1.104","TCP","54","41252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5465","2.519071","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5466","2.519449","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5467","2.519456","172.30.1.205","172.30.1.104","TCP","54","41252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5468","2.521283","172.30.1.205","172.30.1.104","TCP","54","41252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5469","2.521395","172.30.1.205","172.30.1.104","TCP","74","33890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905747 TSecr=0 WS=128" +"5470","2.521552","172.30.1.104","172.30.1.205","TCP","54","135 > 41252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5471","2.521562","172.30.1.104","172.30.1.205","TCP","54","135 > 41252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5472","2.521567","172.30.1.205","172.30.1.104","TCP","54","41252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5473","2.521674","172.30.1.104","172.30.1.205","TCP","66","49671 > 33890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5474","2.521683","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5475","2.522030","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5476","2.523553","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5477","2.523560","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5478","2.525467","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5479","2.525814","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5480","2.525820","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5481","2.527173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5482","2.528297","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5483","2.528306","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5484","2.529272","172.30.1.205","172.30.1.104","TCP","74","41256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905755 TSecr=0 WS=128" +"5485","2.529581","172.30.1.104","172.30.1.205","TCP","66","135 > 41256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5486","2.529592","172.30.1.205","172.30.1.104","TCP","54","41256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5487","2.529941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5488","2.530210","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5489","2.530219","172.30.1.205","172.30.1.104","TCP","54","41256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5490","2.532398","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5491","2.532809","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5492","2.532816","172.30.1.205","172.30.1.104","TCP","54","41256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5493","2.534638","172.30.1.205","172.30.1.104","TCP","54","41256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5494","2.534751","172.30.1.205","172.30.1.104","TCP","74","33894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905761 TSecr=0 WS=128" +"5495","2.534896","172.30.1.104","172.30.1.205","TCP","54","135 > 41256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5496","2.534905","172.30.1.104","172.30.1.205","TCP","54","135 > 41256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5497","2.534911","172.30.1.205","172.30.1.104","TCP","54","41256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5498","2.534998","172.30.1.104","172.30.1.205","TCP","66","49671 > 33894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5499","2.535007","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5500","2.535354","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5501","2.535687","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5502","2.535696","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5503","2.537599","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5504","2.537935","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5505","2.537942","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5506","2.539297","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5507","2.540329","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5508","2.540338","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5509","2.541300","172.30.1.205","172.30.1.104","TCP","74","41260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905767 TSecr=0 WS=128" +"5510","2.541561","172.30.1.104","172.30.1.205","TCP","66","135 > 41260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5511","2.541572","172.30.1.205","172.30.1.104","TCP","54","41260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5512","2.541919","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5513","2.542178","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5514","2.542187","172.30.1.205","172.30.1.104","TCP","54","41260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5515","2.544348","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5516","2.544916","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5517","2.544923","172.30.1.205","172.30.1.104","TCP","54","41260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5518","2.546732","172.30.1.205","172.30.1.104","TCP","54","41260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5519","2.546846","172.30.1.205","172.30.1.104","TCP","74","33898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905773 TSecr=0 WS=128" +"5520","2.546992","172.30.1.104","172.30.1.205","TCP","54","135 > 41260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5521","2.547002","172.30.1.104","172.30.1.205","TCP","54","135 > 41260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5522","2.547007","172.30.1.205","172.30.1.104","TCP","54","41260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5523","2.547113","172.30.1.104","172.30.1.205","TCP","66","49671 > 33898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5524","2.547122","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5525","2.547465","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5526","2.547727","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5527","2.547736","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5528","2.549636","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5529","2.549993","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5530","2.549999","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5531","2.551345","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5532","2.552446","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5533","2.552456","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5534","2.553424","172.30.1.205","172.30.1.104","TCP","74","41264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905779 TSecr=0 WS=128" +"5535","2.553787","172.30.1.104","172.30.1.205","TCP","66","135 > 41264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5536","2.553799","172.30.1.205","172.30.1.104","TCP","54","41264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5537","2.554163","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5538","2.554473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5539","2.554482","172.30.1.205","172.30.1.104","TCP","54","41264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5540","2.556660","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5541","2.557057","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5542","2.557064","172.30.1.205","172.30.1.104","TCP","54","41264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5543","2.558881","172.30.1.205","172.30.1.104","TCP","54","41264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5544","2.558995","172.30.1.205","172.30.1.104","TCP","74","33902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905785 TSecr=0 WS=128" +"5545","2.559165","172.30.1.104","172.30.1.205","TCP","54","135 > 41264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5546","2.559176","172.30.1.104","172.30.1.205","TCP","54","135 > 41264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5547","2.559182","172.30.1.205","172.30.1.104","TCP","54","41264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5548","2.559283","172.30.1.104","172.30.1.205","TCP","66","49671 > 33902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5549","2.559292","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5550","2.559640","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5551","2.562131","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5552","2.562139","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5553","2.563999","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5554","2.564363","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5555","2.564369","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5556","2.565740","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5557","2.566865","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5558","2.566874","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5559","2.567811","172.30.1.205","172.30.1.104","TCP","74","41268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905794 TSecr=0 WS=128" +"5560","2.568152","172.30.1.104","172.30.1.205","TCP","66","135 > 41268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5561","2.568163","172.30.1.205","172.30.1.104","TCP","54","41268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5562","2.568512","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5563","2.568805","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5564","2.568815","172.30.1.205","172.30.1.104","TCP","54","41268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5565","2.571010","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5566","2.571373","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5567","2.571380","172.30.1.205","172.30.1.104","TCP","54","41268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5568","2.573197","172.30.1.205","172.30.1.104","TCP","54","41268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5569","2.573309","172.30.1.205","172.30.1.104","TCP","74","33906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905799 TSecr=0 WS=128" +"5570","2.573475","172.30.1.104","172.30.1.205","TCP","54","135 > 41268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5571","2.573484","172.30.1.104","172.30.1.205","TCP","54","135 > 41268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5572","2.573490","172.30.1.205","172.30.1.104","TCP","54","41268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5573","2.573666","172.30.1.104","172.30.1.205","TCP","66","49671 > 33906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5574","2.573674","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5575","2.574021","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5576","2.574323","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5577","2.574332","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5578","2.576213","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5579","2.576729","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5580","2.576736","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5581","2.578094","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5582","2.579162","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5583","2.579172","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5584","2.580105","172.30.1.205","172.30.1.104","TCP","74","41272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905806 TSecr=0 WS=128" +"5585","2.580409","172.30.1.104","172.30.1.205","TCP","66","135 > 41272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5586","2.580420","172.30.1.205","172.30.1.104","TCP","54","41272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5587","2.580765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5588","2.581040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5589","2.581049","172.30.1.205","172.30.1.104","TCP","54","41272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5590","2.583211","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5591","2.583580","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5592","2.583586","172.30.1.205","172.30.1.104","TCP","54","41272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5593","2.585409","172.30.1.205","172.30.1.104","TCP","54","41272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5594","2.585521","172.30.1.205","172.30.1.104","TCP","74","33910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905811 TSecr=0 WS=128" +"5595","2.585661","172.30.1.104","172.30.1.205","TCP","54","135 > 41272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5596","2.585684","172.30.1.104","172.30.1.205","TCP","54","135 > 41272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5597","2.585690","172.30.1.205","172.30.1.104","TCP","54","41272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5598","2.585810","172.30.1.104","172.30.1.205","TCP","66","49671 > 33910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5599","2.585818","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5600","2.586169","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5601","2.586475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5602","2.586484","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5603","2.588343","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5604","2.588680","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5605","2.588687","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5606","2.590055","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5607","2.591154","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5608","2.591164","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5609","2.592090","172.30.1.205","172.30.1.104","TCP","74","41276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905818 TSecr=0 WS=128" +"5610","2.592460","172.30.1.104","172.30.1.205","TCP","66","135 > 41276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5611","2.592471","172.30.1.205","172.30.1.104","TCP","54","41276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5612","2.592844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5613","2.593172","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5614","2.593181","172.30.1.205","172.30.1.104","TCP","54","41276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5615","2.595376","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5616","2.595774","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5617","2.595781","172.30.1.205","172.30.1.104","TCP","54","41276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5618","2.596617","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5619","2.596667","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5620","2.596705","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5621","2.596739","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5622","2.596771","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5623","2.596830","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5624","2.596864","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5625","2.596892","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5626","2.596918","172.30.1.104","172.30.1.205","TCP","54","49671 > 33870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5627","2.596931","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5628","2.596936","172.30.1.104","172.30.1.205","TCP","54","49671 > 33874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5629","2.596973","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5630","2.596995","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5631","2.597007","172.30.1.104","172.30.1.205","TCP","54","49671 > 33870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5632","2.597013","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5633","2.597027","172.30.1.104","172.30.1.205","TCP","54","49671 > 33878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5634","2.597047","172.30.1.104","172.30.1.205","TCP","54","49671 > 33874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5635","2.597050","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5636","2.597066","172.30.1.104","172.30.1.205","TCP","54","49671 > 33878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5637","2.597070","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5638","2.597088","172.30.1.104","172.30.1.205","TCP","54","49671 > 33882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5639","2.597131","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5640","2.597250","172.30.1.104","172.30.1.205","TCP","54","49671 > 33886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5641","2.597268","172.30.1.104","172.30.1.205","TCP","54","49671 > 33882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5642","2.597273","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5643","2.597287","172.30.1.104","172.30.1.205","TCP","54","49671 > 33886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5644","2.597289","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5645","2.597390","172.30.1.104","172.30.1.205","TCP","54","49671 > 33890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5646","2.597410","172.30.1.104","172.30.1.205","TCP","54","49671 > 33890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5647","2.597415","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5648","2.597430","172.30.1.104","172.30.1.205","TCP","54","49671 > 33898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5649","2.597453","172.30.1.104","172.30.1.205","TCP","54","49671 > 33894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5650","2.597477","172.30.1.104","172.30.1.205","TCP","54","49671 > 33902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5651","2.597498","172.30.1.104","172.30.1.205","TCP","54","49671 > 33898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5652","2.597503","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5653","2.597518","172.30.1.104","172.30.1.205","TCP","54","49671 > 33906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5654","2.597536","172.30.1.104","172.30.1.205","TCP","54","49671 > 33910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5655","2.597618","172.30.1.104","172.30.1.205","TCP","54","49671 > 33910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5656","2.597623","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5657","2.597631","172.30.1.104","172.30.1.205","TCP","54","49671 > 33906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5658","2.597633","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5659","2.597658","172.30.1.104","172.30.1.205","TCP","54","49671 > 33894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5660","2.597661","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5661","2.597677","172.30.1.104","172.30.1.205","TCP","54","49671 > 33902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5662","2.597680","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5663","2.597698","172.30.1.104","172.30.1.205","TCP","54","49671 > 33866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5664","2.597807","172.30.1.104","172.30.1.205","TCP","54","49671 > 33866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5665","2.597811","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5666","2.598619","172.30.1.205","172.30.1.104","TCP","54","41276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5667","2.598730","172.30.1.205","172.30.1.104","TCP","74","33914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905825 TSecr=0 WS=128" +"5668","2.598857","172.30.1.104","172.30.1.205","TCP","54","135 > 41276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5669","2.598900","172.30.1.104","172.30.1.205","TCP","54","135 > 41276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5670","2.598906","172.30.1.205","172.30.1.104","TCP","54","41276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5671","2.599050","172.30.1.104","172.30.1.205","TCP","66","49671 > 33914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5672","2.599059","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5673","2.599414","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5674","2.599665","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5675","2.599673","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5676","2.601600","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5677","2.601954","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5678","2.601961","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5679","2.603318","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5680","2.604420","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5681","2.604429","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5682","2.605392","172.30.1.205","172.30.1.104","TCP","74","41280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905831 TSecr=0 WS=128" +"5683","2.605674","172.30.1.104","172.30.1.205","TCP","66","135 > 41280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5684","2.605685","172.30.1.205","172.30.1.104","TCP","54","41280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5685","2.606031","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5686","2.606313","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5687","2.606322","172.30.1.205","172.30.1.104","TCP","54","41280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5688","2.608491","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5689","2.608857","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5690","2.608864","172.30.1.205","172.30.1.104","TCP","54","41280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5691","2.610675","172.30.1.205","172.30.1.104","TCP","54","41280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5692","2.610788","172.30.1.205","172.30.1.104","TCP","74","33918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905837 TSecr=0 WS=128" +"5693","2.610940","172.30.1.104","172.30.1.205","TCP","54","135 > 41280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5694","2.610974","172.30.1.104","172.30.1.205","TCP","54","135 > 41280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5695","2.610980","172.30.1.205","172.30.1.104","TCP","54","41280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5696","2.611050","172.30.1.104","172.30.1.205","TCP","66","49671 > 33918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5697","2.611059","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5698","2.611404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5699","2.611670","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5700","2.611679","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5701","2.613613","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5702","2.613949","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5703","2.613956","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5704","2.615309","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5705","2.616351","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5706","2.616361","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5707","2.617314","172.30.1.205","172.30.1.104","TCP","74","41284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905843 TSecr=0 WS=128" +"5708","2.617643","172.30.1.104","172.30.1.205","TCP","66","135 > 41284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5709","2.617654","172.30.1.205","172.30.1.104","TCP","54","41284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5710","2.617997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5711","2.618269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5712","2.618278","172.30.1.205","172.30.1.104","TCP","54","41284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5713","2.620436","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5714","2.620801","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5715","2.620808","172.30.1.205","172.30.1.104","TCP","54","41284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5716","2.622609","172.30.1.205","172.30.1.104","TCP","54","41284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5717","2.622722","172.30.1.205","172.30.1.104","TCP","74","33922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905849 TSecr=0 WS=128" +"5718","2.622871","172.30.1.104","172.30.1.205","TCP","54","135 > 41284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5719","2.622880","172.30.1.104","172.30.1.205","TCP","54","135 > 41284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5720","2.622885","172.30.1.205","172.30.1.104","TCP","54","41284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5721","2.622991","172.30.1.104","172.30.1.205","TCP","66","49671 > 33922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5722","2.623003","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5723","2.623377","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5724","2.623653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5725","2.623662","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5726","2.625540","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5727","2.625874","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5728","2.625881","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5729","2.627238","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5730","2.628316","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5731","2.628325","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5732","2.629288","172.30.1.205","172.30.1.104","TCP","74","41288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905855 TSecr=0 WS=128" +"5733","2.629549","172.30.1.104","172.30.1.205","TCP","66","135 > 41288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5734","2.629560","172.30.1.205","172.30.1.104","TCP","54","41288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5735","2.629907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5736","2.630221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5737","2.630230","172.30.1.205","172.30.1.104","TCP","54","41288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5738","2.632415","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5739","2.632793","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5740","2.632800","172.30.1.205","172.30.1.104","TCP","54","41288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5741","2.634610","172.30.1.205","172.30.1.104","TCP","54","41288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5742","2.634727","172.30.1.205","172.30.1.104","TCP","74","33926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905861 TSecr=0 WS=128" +"5743","2.634886","172.30.1.104","172.30.1.205","TCP","54","135 > 41288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5744","2.634896","172.30.1.104","172.30.1.205","TCP","54","135 > 41288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5745","2.634902","172.30.1.205","172.30.1.104","TCP","54","41288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5746","2.635025","172.30.1.104","172.30.1.205","TCP","66","49671 > 33926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5747","2.635034","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5748","2.635377","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5749","2.635631","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5750","2.635640","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5751","2.637543","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5752","2.637892","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5753","2.637898","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5754","2.639240","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5755","2.640295","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5756","2.640305","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5757","2.641269","172.30.1.205","172.30.1.104","TCP","74","41292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905867 TSecr=0 WS=128" +"5758","2.641568","172.30.1.104","172.30.1.205","TCP","66","135 > 41292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5759","2.641578","172.30.1.205","172.30.1.104","TCP","54","41292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5760","2.641926","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5761","2.642241","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5762","2.642250","172.30.1.205","172.30.1.104","TCP","54","41292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5763","2.644408","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5764","2.644764","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5765","2.644771","172.30.1.205","172.30.1.104","TCP","54","41292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5766","2.646575","172.30.1.205","172.30.1.104","TCP","54","41292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5767","2.646686","172.30.1.205","172.30.1.104","TCP","74","33930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905873 TSecr=0 WS=128" +"5768","2.646812","172.30.1.104","172.30.1.205","TCP","54","135 > 41292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5769","2.646848","172.30.1.104","172.30.1.205","TCP","54","135 > 41292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5770","2.646854","172.30.1.205","172.30.1.104","TCP","54","41292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5771","2.646950","172.30.1.104","172.30.1.205","TCP","66","49671 > 33930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5772","2.646958","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5773","2.647299","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5774","2.647575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5775","2.647584","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5776","2.649481","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5777","2.649844","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5778","2.649850","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5779","2.651191","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5780","2.652307","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5781","2.652316","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5782","2.653265","172.30.1.205","172.30.1.104","TCP","74","41296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905879 TSecr=0 WS=128" +"5783","2.653572","172.30.1.104","172.30.1.205","TCP","66","135 > 41296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5784","2.653583","172.30.1.205","172.30.1.104","TCP","54","41296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5785","2.653929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5786","2.654206","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5787","2.654215","172.30.1.205","172.30.1.104","TCP","54","41296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5788","2.656369","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5789","2.656731","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5790","2.656737","172.30.1.205","172.30.1.104","TCP","54","41296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5791","2.658556","172.30.1.205","172.30.1.104","TCP","54","41296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5792","2.658662","172.30.1.205","172.30.1.104","TCP","74","33934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905885 TSecr=0 WS=128" +"5793","2.659129","172.30.1.104","172.30.1.205","TCP","66","49671 > 33934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5794","2.659140","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5795","2.659151","172.30.1.104","172.30.1.205","TCP","54","135 > 41296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5796","2.659177","172.30.1.104","172.30.1.205","TCP","54","135 > 41296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5797","2.659182","172.30.1.205","172.30.1.104","TCP","54","41296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5798","2.659519","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5799","2.659790","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5800","2.659799","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5801","2.661713","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5802","2.662068","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5803","2.662075","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5804","2.663407","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5805","2.664506","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5806","2.664516","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5807","2.665459","172.30.1.205","172.30.1.104","TCP","74","41300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905891 TSecr=0 WS=128" +"5808","2.665740","172.30.1.104","172.30.1.205","TCP","66","135 > 41300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5809","2.665751","172.30.1.205","172.30.1.104","TCP","54","41300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5810","2.666097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5811","2.666385","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5812","2.666394","172.30.1.205","172.30.1.104","TCP","54","41300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5813","2.668579","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5814","2.671123","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5815","2.671130","172.30.1.205","172.30.1.104","TCP","54","41300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5816","2.672968","172.30.1.205","172.30.1.104","TCP","54","41300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5817","2.673079","172.30.1.205","172.30.1.104","TCP","74","33938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905899 TSecr=0 WS=128" +"5818","2.673258","172.30.1.104","172.30.1.205","TCP","54","135 > 41300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5819","2.673268","172.30.1.104","172.30.1.205","TCP","54","135 > 41300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5820","2.673274","172.30.1.205","172.30.1.104","TCP","54","41300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5821","2.673350","172.30.1.104","172.30.1.205","TCP","66","49671 > 33938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5822","2.673359","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5823","2.673721","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5824","2.674015","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5825","2.674024","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5826","2.675921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5827","2.676476","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5828","2.676483","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5829","2.677860","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5830","2.678956","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5831","2.678965","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5832","2.679904","172.30.1.205","172.30.1.104","TCP","74","41304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905906 TSecr=0 WS=128" +"5833","2.680212","172.30.1.104","172.30.1.205","TCP","66","135 > 41304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5834","2.680223","172.30.1.205","172.30.1.104","TCP","54","41304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5835","2.680572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5836","2.680858","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5837","2.680868","172.30.1.205","172.30.1.104","TCP","54","41304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5838","2.683054","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5839","2.683648","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5840","2.683654","172.30.1.205","172.30.1.104","TCP","54","41304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5841","2.685482","172.30.1.205","172.30.1.104","TCP","54","41304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5842","2.685593","172.30.1.205","172.30.1.104","TCP","74","33942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905912 TSecr=0 WS=128" +"5843","2.685781","172.30.1.104","172.30.1.205","TCP","54","135 > 41304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5844","2.685824","172.30.1.104","172.30.1.205","TCP","54","135 > 41304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5845","2.685829","172.30.1.205","172.30.1.104","TCP","54","41304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5846","2.685910","172.30.1.104","172.30.1.205","TCP","66","49671 > 33942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5847","2.685918","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5848","2.686271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5849","2.686550","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5850","2.686558","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5851","2.688440","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5852","2.688786","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5853","2.688793","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5854","2.690145","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5855","2.691115","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5856","2.691127","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5857","2.692078","172.30.1.205","172.30.1.104","TCP","74","41308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905918 TSecr=0 WS=128" +"5858","2.692408","172.30.1.104","172.30.1.205","TCP","66","135 > 41308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5859","2.692419","172.30.1.205","172.30.1.104","TCP","54","41308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5860","2.692765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5861","2.693030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5862","2.693039","172.30.1.205","172.30.1.104","TCP","54","41308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5863","2.695197","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5864","2.695606","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5865","2.695613","172.30.1.205","172.30.1.104","TCP","54","41308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5866","2.697431","172.30.1.205","172.30.1.104","TCP","54","41308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5867","2.697542","172.30.1.205","172.30.1.104","TCP","74","33946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905923 TSecr=0 WS=128" +"5868","2.697700","172.30.1.104","172.30.1.205","TCP","54","135 > 41308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5869","2.697708","172.30.1.104","172.30.1.205","TCP","54","135 > 41308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5870","2.697713","172.30.1.205","172.30.1.104","TCP","54","41308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5871","2.697810","172.30.1.104","172.30.1.205","TCP","66","49671 > 33946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5872","2.697819","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5873","2.698166","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5874","2.698597","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5875","2.698606","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5876","2.700505","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5877","2.700822","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5878","2.700829","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5879","2.702175","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5880","2.703302","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5881","2.703311","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5882","2.704233","172.30.1.205","172.30.1.104","TCP","74","41312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905930 TSecr=0 WS=128" +"5883","2.704530","172.30.1.104","172.30.1.205","TCP","66","135 > 41312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5884","2.704540","172.30.1.205","172.30.1.104","TCP","54","41312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5885","2.704915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5886","2.705224","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5887","2.705233","172.30.1.205","172.30.1.104","TCP","54","41312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5888","2.707387","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5889","2.707756","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5890","2.707763","172.30.1.205","172.30.1.104","TCP","54","41312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5891","2.709578","172.30.1.205","172.30.1.104","TCP","54","41312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5892","2.709687","172.30.1.205","172.30.1.104","TCP","74","33950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905936 TSecr=0 WS=128" +"5893","2.709829","172.30.1.104","172.30.1.205","TCP","54","135 > 41312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5894","2.709870","172.30.1.104","172.30.1.205","TCP","54","135 > 41312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5895","2.709875","172.30.1.205","172.30.1.104","TCP","54","41312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5896","2.709949","172.30.1.104","172.30.1.205","TCP","66","49671 > 33950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5897","2.709957","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5898","2.710304","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5899","2.710576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5900","2.710585","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5901","2.712437","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5902","2.712811","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5903","2.712818","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5904","2.714168","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5905","2.718362","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5906","2.718372","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5907","2.719305","172.30.1.205","172.30.1.104","TCP","74","41316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905945 TSecr=0 WS=128" +"5908","2.719599","172.30.1.104","172.30.1.205","TCP","66","135 > 41316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5909","2.719610","172.30.1.205","172.30.1.104","TCP","54","41316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5910","2.719994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5911","2.720282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5912","2.720291","172.30.1.205","172.30.1.104","TCP","54","41316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5913","2.722641","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5914","2.723045","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5915","2.723052","172.30.1.205","172.30.1.104","TCP","54","41316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5916","2.724861","172.30.1.205","172.30.1.104","TCP","54","41316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5917","2.724969","172.30.1.205","172.30.1.104","TCP","74","33954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905951 TSecr=0 WS=128" +"5918","2.725114","172.30.1.104","172.30.1.205","TCP","54","135 > 41316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5919","2.725144","172.30.1.104","172.30.1.205","TCP","54","135 > 41316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5920","2.725149","172.30.1.205","172.30.1.104","TCP","54","41316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5921","2.725250","172.30.1.104","172.30.1.205","TCP","66","49671 > 33954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5922","2.725258","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5923","2.725603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5924","2.725871","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5925","2.725880","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5926","2.727754","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5927","2.728099","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5928","2.728105","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5929","2.729468","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5930","2.730604","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5931","2.730613","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5932","2.731533","172.30.1.205","172.30.1.104","TCP","74","41320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905957 TSecr=0 WS=128" +"5933","2.731822","172.30.1.104","172.30.1.205","TCP","66","135 > 41320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5934","2.731833","172.30.1.205","172.30.1.104","TCP","54","41320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5935","2.732178","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5936","2.732436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5937","2.732445","172.30.1.205","172.30.1.104","TCP","54","41320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5938","2.734640","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5939","2.735018","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5940","2.735024","172.30.1.205","172.30.1.104","TCP","54","41320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5941","2.736856","172.30.1.205","172.30.1.104","TCP","54","41320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5942","2.736962","172.30.1.205","172.30.1.104","TCP","74","33958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905963 TSecr=0 WS=128" +"5943","2.737194","172.30.1.104","172.30.1.205","TCP","54","135 > 41320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5944","2.737220","172.30.1.104","172.30.1.205","TCP","54","135 > 41320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"5945","2.737225","172.30.1.205","172.30.1.104","TCP","54","41320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"5946","2.737247","172.30.1.104","172.30.1.205","TCP","66","49671 > 33958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5947","2.737255","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5948","2.737598","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"5949","2.738672","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5950","2.738687","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5951","2.740634","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"5952","2.741016","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"5953","2.741023","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"5954","2.742383","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"5955","2.745668","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"5956","2.745679","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5957","2.746634","172.30.1.205","172.30.1.104","TCP","74","41324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905973 TSecr=0 WS=128" +"5958","2.746976","172.30.1.104","172.30.1.205","TCP","66","135 > 41324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"5959","2.746987","172.30.1.205","172.30.1.104","TCP","54","41324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"5960","2.747334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"5961","2.747645","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"5962","2.747654","172.30.1.205","172.30.1.104","TCP","54","41324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"5963","2.749867","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"5964","2.750243","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"5965","2.750251","172.30.1.205","172.30.1.104","TCP","54","41324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"5966","2.751122","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5967","2.751171","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5968","2.751207","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5969","2.751241","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5970","2.751272","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5971","2.751300","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5972","2.751327","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5973","2.751359","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5974","2.751391","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5975","2.751403","172.30.1.104","172.30.1.205","TCP","54","49671 > 33918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5976","2.751425","172.30.1.104","172.30.1.205","TCP","54","49671 > 33922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5977","2.751453","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5978","2.751481","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5979","2.751550","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"5980","2.751561","172.30.1.104","172.30.1.205","TCP","54","49671 > 33918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5981","2.751567","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5982","2.751577","172.30.1.104","172.30.1.205","TCP","54","49671 > 33926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5983","2.751611","172.30.1.104","172.30.1.205","TCP","54","49671 > 33922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5984","2.751616","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5985","2.751647","172.30.1.104","172.30.1.205","TCP","54","49671 > 33926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5986","2.751650","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5987","2.751669","172.30.1.104","172.30.1.205","TCP","54","49671 > 33930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5988","2.751691","172.30.1.104","172.30.1.205","TCP","54","49671 > 33934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5989","2.751804","172.30.1.104","172.30.1.205","TCP","54","49671 > 33938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5990","2.751820","172.30.1.104","172.30.1.205","TCP","54","49671 > 33930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5991","2.751825","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5992","2.751841","172.30.1.104","172.30.1.205","TCP","54","49671 > 33942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5993","2.751864","172.30.1.104","172.30.1.205","TCP","54","49671 > 33942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5994","2.751868","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5995","2.751886","172.30.1.104","172.30.1.205","TCP","54","49671 > 33934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5996","2.751889","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5997","2.751906","172.30.1.104","172.30.1.205","TCP","54","49671 > 33938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"5998","2.751909","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"5999","2.751925","172.30.1.104","172.30.1.205","TCP","54","49671 > 33946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6000","2.751946","172.30.1.104","172.30.1.205","TCP","54","49671 > 33950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6001","2.751966","172.30.1.104","172.30.1.205","TCP","54","49671 > 33954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6002","2.752073","172.30.1.104","172.30.1.205","TCP","54","49671 > 33946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6003","2.752078","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6004","2.752092","172.30.1.104","172.30.1.205","TCP","54","49671 > 33958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6005","2.752116","172.30.1.104","172.30.1.205","TCP","54","49671 > 33958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6006","2.752119","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6007","2.752136","172.30.1.104","172.30.1.205","TCP","54","49671 > 33950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6008","2.752139","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6009","2.752156","172.30.1.104","172.30.1.205","TCP","54","49671 > 33954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6010","2.752159","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6011","2.752176","172.30.1.104","172.30.1.205","TCP","54","49671 > 33914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6012","2.752284","172.30.1.104","172.30.1.205","TCP","54","49671 > 33914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6013","2.752287","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6014","2.753119","172.30.1.205","172.30.1.104","TCP","54","41324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6015","2.753229","172.30.1.205","172.30.1.104","TCP","74","33962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905979 TSecr=0 WS=128" +"6016","2.753367","172.30.1.104","172.30.1.205","TCP","54","135 > 41324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6017","2.753388","172.30.1.104","172.30.1.205","TCP","54","135 > 41324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6018","2.753394","172.30.1.205","172.30.1.104","TCP","54","41324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6019","2.753493","172.30.1.104","172.30.1.205","TCP","66","49671 > 33962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6020","2.753501","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6021","2.753856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6022","2.754148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6023","2.754158","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6024","2.756045","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6025","2.756413","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6026","2.756420","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6027","2.757791","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6028","2.758830","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6029","2.758839","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6030","2.759786","172.30.1.205","172.30.1.104","TCP","74","41328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905986 TSecr=0 WS=128" +"6031","2.760084","172.30.1.104","172.30.1.205","TCP","66","135 > 41328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6032","2.760095","172.30.1.205","172.30.1.104","TCP","54","41328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6033","2.760443","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6034","2.760726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6035","2.760735","172.30.1.205","172.30.1.104","TCP","54","41328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6036","2.762928","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6037","2.763298","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6038","2.763305","172.30.1.205","172.30.1.104","TCP","54","41328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6039","2.765130","172.30.1.205","172.30.1.104","TCP","54","41328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6040","2.765241","172.30.1.205","172.30.1.104","TCP","74","33966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905991 TSecr=0 WS=128" +"6041","2.765401","172.30.1.104","172.30.1.205","TCP","54","135 > 41328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6042","2.765416","172.30.1.104","172.30.1.205","TCP","54","135 > 41328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6043","2.765422","172.30.1.205","172.30.1.104","TCP","54","41328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6044","2.765543","172.30.1.104","172.30.1.205","TCP","66","49671 > 33966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6045","2.765551","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6046","2.765894","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6047","2.766184","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6048","2.766193","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6049","2.768062","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6050","2.768455","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6051","2.768461","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6052","2.769824","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6053","2.770918","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6054","2.770927","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6055","2.771852","172.30.1.205","172.30.1.104","TCP","74","41332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905998 TSecr=0 WS=128" +"6056","2.772150","172.30.1.104","172.30.1.205","TCP","66","135 > 41332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6057","2.772161","172.30.1.205","172.30.1.104","TCP","54","41332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6058","2.772507","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6059","2.772772","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6060","2.772791","172.30.1.205","172.30.1.104","TCP","54","41332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6061","2.774966","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6062","2.775373","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6063","2.775379","172.30.1.205","172.30.1.104","TCP","54","41332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6064","2.777228","172.30.1.205","172.30.1.104","TCP","54","41332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6065","2.777337","172.30.1.205","172.30.1.104","TCP","74","33970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906003 TSecr=0 WS=128" +"6066","2.777504","172.30.1.104","172.30.1.205","TCP","54","135 > 41332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6067","2.777551","172.30.1.104","172.30.1.205","TCP","54","135 > 41332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6068","2.777556","172.30.1.205","172.30.1.104","TCP","54","41332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6069","2.777658","172.30.1.104","172.30.1.205","TCP","66","49671 > 33970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6070","2.777666","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6071","2.778010","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6072","2.778322","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6073","2.778332","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6074","2.780173","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6075","2.780570","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6076","2.780576","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6077","2.781937","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6078","2.783043","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6079","2.783053","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6080","2.783986","172.30.1.205","172.30.1.104","TCP","74","41336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906010 TSecr=0 WS=128" +"6081","2.784307","172.30.1.104","172.30.1.205","TCP","66","135 > 41336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6082","2.784319","172.30.1.205","172.30.1.104","TCP","54","41336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6083","2.784671","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6084","2.784985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6085","2.784994","172.30.1.205","172.30.1.104","TCP","54","41336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6086","2.787170","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6087","2.787597","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6088","2.787604","172.30.1.205","172.30.1.104","TCP","54","41336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6089","2.789428","172.30.1.205","172.30.1.104","TCP","54","41336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6090","2.789539","172.30.1.205","172.30.1.104","TCP","74","33974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906015 TSecr=0 WS=128" +"6091","2.789715","172.30.1.104","172.30.1.205","TCP","54","135 > 41336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6092","2.789769","172.30.1.104","172.30.1.205","TCP","54","135 > 41336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6093","2.789775","172.30.1.205","172.30.1.104","TCP","54","41336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6094","2.789819","172.30.1.104","172.30.1.205","TCP","66","49671 > 33974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6095","2.789827","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6096","2.790173","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6097","2.790465","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6098","2.790473","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6099","2.792316","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6100","2.792770","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6101","2.792786","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6102","2.794147","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6103","2.795240","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6104","2.795249","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6105","2.796167","172.30.1.205","172.30.1.104","TCP","74","41340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906022 TSecr=0 WS=128" +"6106","2.796467","172.30.1.104","172.30.1.205","TCP","66","135 > 41340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6107","2.796483","172.30.1.205","172.30.1.104","TCP","54","41340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6108","2.796861","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6109","2.797185","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6110","2.797194","172.30.1.205","172.30.1.104","TCP","54","41340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6111","2.799371","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6112","2.799780","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6113","2.799790","172.30.1.205","172.30.1.104","TCP","54","41340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6114","2.801921","172.30.1.205","172.30.1.104","TCP","54","41340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6115","2.802040","172.30.1.205","172.30.1.104","TCP","74","33978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906028 TSecr=0 WS=128" +"6116","2.802239","172.30.1.104","172.30.1.205","TCP","54","135 > 41340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6117","2.802249","172.30.1.104","172.30.1.205","TCP","54","135 > 41340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6118","2.802254","172.30.1.205","172.30.1.104","TCP","54","41340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6119","2.802346","172.30.1.104","172.30.1.205","TCP","66","49671 > 33978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6120","2.802355","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6121","2.802735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6122","2.803097","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6123","2.803111","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6124","2.805082","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6125","2.805510","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6126","2.805524","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6127","2.807091","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6128","2.808457","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6129","2.808466","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6130","2.809447","172.30.1.205","172.30.1.104","TCP","74","41344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906035 TSecr=0 WS=128" +"6131","2.809746","172.30.1.104","172.30.1.205","TCP","66","135 > 41344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6132","2.809759","172.30.1.205","172.30.1.104","TCP","54","41344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6133","2.810121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6134","2.810419","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6135","2.810428","172.30.1.205","172.30.1.104","TCP","54","41344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6136","2.812595","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6137","2.812994","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6138","2.813002","172.30.1.205","172.30.1.104","TCP","54","41344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6139","2.814811","172.30.1.205","172.30.1.104","TCP","54","41344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6140","2.814922","172.30.1.205","172.30.1.104","TCP","74","33982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906041 TSecr=0 WS=128" +"6141","2.815084","172.30.1.104","172.30.1.205","TCP","54","135 > 41344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6142","2.815112","172.30.1.104","172.30.1.205","TCP","54","135 > 41344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6143","2.815118","172.30.1.205","172.30.1.104","TCP","54","41344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6144","2.815220","172.30.1.104","172.30.1.205","TCP","66","49671 > 33982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6145","2.815229","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6146","2.815578","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6147","2.815878","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6148","2.815886","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6149","2.817778","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6150","2.818182","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6151","2.818189","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6152","2.819529","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6153","2.820628","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6154","2.820637","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6155","2.821587","172.30.1.205","172.30.1.104","TCP","74","41348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906048 TSecr=0 WS=128" +"6156","2.821898","172.30.1.104","172.30.1.205","TCP","66","135 > 41348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6157","2.821909","172.30.1.205","172.30.1.104","TCP","54","41348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6158","2.822261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6159","2.822629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6160","2.822639","172.30.1.205","172.30.1.104","TCP","54","41348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6161","2.824852","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6162","2.825243","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6163","2.825249","172.30.1.205","172.30.1.104","TCP","54","41348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6164","2.827041","172.30.1.205","172.30.1.104","TCP","54","41348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6165","2.827150","172.30.1.205","172.30.1.104","TCP","74","33986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906053 TSecr=0 WS=128" +"6166","2.827375","172.30.1.104","172.30.1.205","TCP","54","135 > 41348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6167","2.827384","172.30.1.104","172.30.1.205","TCP","54","135 > 41348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6168","2.827389","172.30.1.205","172.30.1.104","TCP","54","41348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6169","2.827475","172.30.1.104","172.30.1.205","TCP","66","49671 > 33986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6170","2.827483","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6171","2.827846","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6172","2.828146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6173","2.828154","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6174","2.830039","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6175","2.830407","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6176","2.830414","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6177","2.831762","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6178","2.832981","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6179","2.832990","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6180","2.833921","172.30.1.205","172.30.1.104","TCP","74","41352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906060 TSecr=0 WS=128" +"6181","2.834223","172.30.1.104","172.30.1.205","TCP","66","135 > 41352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6182","2.834234","172.30.1.205","172.30.1.104","TCP","54","41352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6183","2.834582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6184","2.834887","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6185","2.834897","172.30.1.205","172.30.1.104","TCP","54","41352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6186","2.837100","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6187","2.837493","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6188","2.837500","172.30.1.205","172.30.1.104","TCP","54","41352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6189","2.839307","172.30.1.205","172.30.1.104","TCP","54","41352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6190","2.839416","172.30.1.205","172.30.1.104","TCP","74","33990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906065 TSecr=0 WS=128" +"6191","2.839646","172.30.1.104","172.30.1.205","TCP","54","135 > 41352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6192","2.839704","172.30.1.104","172.30.1.205","TCP","66","49671 > 33990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6193","2.839713","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6194","2.839756","172.30.1.104","172.30.1.205","TCP","54","135 > 41352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6195","2.839762","172.30.1.205","172.30.1.104","TCP","54","41352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6196","2.840075","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6197","2.840421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6198","2.840430","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6199","2.842347","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6200","2.842814","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6201","2.842820","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6202","2.844168","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6203","2.845278","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6204","2.845291","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6205","2.846331","172.30.1.205","172.30.1.104","TCP","74","41356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906072 TSecr=0 WS=128" +"6206","2.846714","172.30.1.104","172.30.1.205","TCP","66","135 > 41356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6207","2.846729","172.30.1.205","172.30.1.104","TCP","54","41356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6208","2.847092","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6209","2.847415","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6210","2.847425","172.30.1.205","172.30.1.104","TCP","54","41356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6211","2.849641","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6212","2.850066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6213","2.850073","172.30.1.205","172.30.1.104","TCP","54","41356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6214","2.851874","172.30.1.205","172.30.1.104","TCP","54","41356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6215","2.851988","172.30.1.205","172.30.1.104","TCP","74","33994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906078 TSecr=0 WS=128" +"6216","2.852216","172.30.1.104","172.30.1.205","TCP","54","135 > 41356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6217","2.852227","172.30.1.104","172.30.1.205","TCP","54","135 > 41356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6218","2.852233","172.30.1.205","172.30.1.104","TCP","54","41356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6219","2.852338","172.30.1.104","172.30.1.205","TCP","66","49671 > 33994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6220","2.852347","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6221","2.852699","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6222","2.853027","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6223","2.853037","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6224","2.854915","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6225","2.855375","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6226","2.855381","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6227","2.856718","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6228","2.857845","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6229","2.857855","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6230","2.858797","172.30.1.205","172.30.1.104","TCP","74","41360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906085 TSecr=0 WS=128" +"6231","2.859138","172.30.1.104","172.30.1.205","TCP","66","135 > 41360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6232","2.859149","172.30.1.205","172.30.1.104","TCP","54","41360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6233","2.859502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6234","2.859822","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6235","2.859831","172.30.1.205","172.30.1.104","TCP","54","41360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6236","2.862043","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6237","2.862442","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6238","2.862449","172.30.1.205","172.30.1.104","TCP","54","41360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6239","2.864262","172.30.1.205","172.30.1.104","TCP","54","41360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6240","2.864375","172.30.1.205","172.30.1.104","TCP","74","33998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906090 TSecr=0 WS=128" +"6241","2.864568","172.30.1.104","172.30.1.205","TCP","54","135 > 41360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6242","2.864686","172.30.1.104","172.30.1.205","TCP","54","135 > 41360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6243","2.864692","172.30.1.205","172.30.1.104","TCP","54","41360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6244","2.864697","172.30.1.104","172.30.1.205","TCP","66","49671 > 33998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6245","2.864705","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6246","2.865081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6247","2.865383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6248","2.865393","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6249","2.867249","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6250","2.867715","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6251","2.867722","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6252","2.869105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6253","2.871795","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6254","2.871805","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6255","2.872774","172.30.1.205","172.30.1.104","TCP","74","41364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906099 TSecr=0 WS=128" +"6256","2.873081","172.30.1.104","172.30.1.205","TCP","66","135 > 41364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6257","2.873092","172.30.1.205","172.30.1.104","TCP","54","41364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6258","2.873447","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6259","2.873799","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6260","2.873808","172.30.1.205","172.30.1.104","TCP","54","41364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6261","2.875997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6262","2.876383","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6263","2.876390","172.30.1.205","172.30.1.104","TCP","54","41364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6264","2.878202","172.30.1.205","172.30.1.104","TCP","54","41364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6265","2.878314","172.30.1.205","172.30.1.104","TCP","74","34002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906104 TSecr=0 WS=128" +"6266","2.878541","172.30.1.104","172.30.1.205","TCP","54","135 > 41364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6267","2.878551","172.30.1.104","172.30.1.205","TCP","54","135 > 41364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6268","2.878557","172.30.1.205","172.30.1.104","TCP","54","41364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6269","2.878689","172.30.1.104","172.30.1.205","TCP","66","49671 > 34002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6270","2.878698","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6271","2.879045","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6272","2.879379","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6273","2.879388","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6274","2.881310","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6275","2.881675","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6276","2.881682","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6277","2.883027","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6278","2.884130","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6279","2.884140","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6280","2.885101","172.30.1.205","172.30.1.104","TCP","74","41368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906111 TSecr=0 WS=128" +"6281","2.885431","172.30.1.104","172.30.1.205","TCP","66","135 > 41368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6282","2.885442","172.30.1.205","172.30.1.104","TCP","54","41368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6283","2.885790","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6284","2.886099","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6285","2.886108","172.30.1.205","172.30.1.104","TCP","54","41368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6286","2.888264","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6287","2.888681","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6288","2.888687","172.30.1.205","172.30.1.104","TCP","54","41368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6289","2.890506","172.30.1.205","172.30.1.104","TCP","54","41368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6290","2.890618","172.30.1.205","172.30.1.104","TCP","74","34006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906117 TSecr=0 WS=128" +"6291","2.890837","172.30.1.104","172.30.1.205","TCP","54","135 > 41368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6292","2.890846","172.30.1.104","172.30.1.205","TCP","54","135 > 41368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6293","2.890851","172.30.1.205","172.30.1.104","TCP","54","41368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6294","2.890963","172.30.1.104","172.30.1.205","TCP","66","49671 > 34006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6295","2.890971","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6296","2.891316","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6297","2.891653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6298","2.891662","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6299","2.893556","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6300","2.893991","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6301","2.893998","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6302","2.895332","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6303","2.896581","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6304","2.896593","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6305","2.897568","172.30.1.205","172.30.1.104","TCP","74","41372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906123 TSecr=0 WS=128" +"6306","2.897910","172.30.1.104","172.30.1.205","TCP","66","135 > 41372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6307","2.897920","172.30.1.205","172.30.1.104","TCP","54","41372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6308","2.898273","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6309","2.898580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6310","2.898588","172.30.1.205","172.30.1.104","TCP","54","41372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6311","2.900748","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6312","2.901171","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6313","2.901178","172.30.1.205","172.30.1.104","TCP","54","41372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6314","2.902016","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6315","2.902068","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6316","2.902102","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6317","2.902131","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6318","2.902155","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6319","2.902182","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6320","2.902210","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6321","2.902237","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6322","2.902260","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6323","2.902286","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6324","2.902312","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6325","2.902379","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6326","2.903119","172.30.1.104","172.30.1.205","TCP","54","49671 > 33966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6327","2.903129","172.30.1.104","172.30.1.205","TCP","54","49671 > 33970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6328","2.903133","172.30.1.104","172.30.1.205","TCP","54","49671 > 33974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6329","2.903135","172.30.1.104","172.30.1.205","TCP","54","49671 > 33966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6330","2.903141","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6331","2.903149","172.30.1.104","172.30.1.205","TCP","54","49671 > 33970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6332","2.903151","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6333","2.903153","172.30.1.104","172.30.1.205","TCP","54","49671 > 33978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6334","2.903156","172.30.1.104","172.30.1.205","TCP","54","49671 > 33974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6335","2.903159","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6336","2.903160","172.30.1.104","172.30.1.205","TCP","54","49671 > 33982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6337","2.903166","172.30.1.104","172.30.1.205","TCP","54","49671 > 33986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6338","2.903169","172.30.1.104","172.30.1.205","TCP","54","49671 > 33986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6339","2.903171","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6340","2.903172","172.30.1.104","172.30.1.205","TCP","54","49671 > 33990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6341","2.903175","172.30.1.104","172.30.1.205","TCP","54","49671 > 33994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6342","2.903178","172.30.1.104","172.30.1.205","TCP","54","49671 > 33994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6343","2.903180","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6344","2.903181","172.30.1.104","172.30.1.205","TCP","54","49671 > 33990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6345","2.903183","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6346","2.903186","172.30.1.104","172.30.1.205","TCP","54","49671 > 33978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6347","2.903188","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6348","2.903189","172.30.1.104","172.30.1.205","TCP","54","49671 > 33982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6349","2.903191","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6350","2.903192","172.30.1.104","172.30.1.205","TCP","54","49671 > 33998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6351","2.903198","172.30.1.104","172.30.1.205","TCP","54","49671 > 34002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6352","2.903200","172.30.1.104","172.30.1.205","TCP","54","49671 > 34006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6353","2.903202","172.30.1.104","172.30.1.205","TCP","54","49671 > 33998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6354","2.903205","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6355","2.903206","172.30.1.104","172.30.1.205","TCP","54","49671 > 34002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6356","2.903208","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6357","2.903209","172.30.1.104","172.30.1.205","TCP","54","49671 > 34006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6358","2.903211","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6359","2.903610","172.30.1.104","172.30.1.205","TCP","54","49671 > 33962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6360","2.903617","172.30.1.104","172.30.1.205","TCP","54","49671 > 33962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6361","2.903622","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6362","2.903813","172.30.1.205","172.30.1.104","TCP","54","41372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6363","2.903923","172.30.1.205","172.30.1.104","TCP","74","34010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906130 TSecr=0 WS=128" +"6364","2.904118","172.30.1.104","172.30.1.205","TCP","54","135 > 41372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6365","2.904126","172.30.1.104","172.30.1.205","TCP","54","135 > 41372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6366","2.904131","172.30.1.205","172.30.1.104","TCP","54","41372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6367","2.904233","172.30.1.104","172.30.1.205","TCP","66","49671 > 34010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6368","2.904242","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6369","2.904593","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6370","2.904899","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6371","2.904908","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6372","2.906790","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6373","2.907193","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6374","2.907200","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6375","2.908555","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6376","2.909761","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6377","2.909770","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6378","2.910714","172.30.1.205","172.30.1.104","TCP","74","41376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906137 TSecr=0 WS=128" +"6379","2.911035","172.30.1.104","172.30.1.205","TCP","66","135 > 41376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6380","2.911046","172.30.1.205","172.30.1.104","TCP","54","41376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6381","2.911399","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6382","2.911697","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6383","2.911706","172.30.1.205","172.30.1.104","TCP","54","41376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6384","2.913906","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6385","2.914321","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6386","2.914327","172.30.1.205","172.30.1.104","TCP","54","41376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6387","2.916130","172.30.1.205","172.30.1.104","TCP","54","41376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6388","2.916241","172.30.1.205","172.30.1.104","TCP","74","34014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906142 TSecr=0 WS=128" +"6389","2.916449","172.30.1.104","172.30.1.205","TCP","54","135 > 41376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6390","2.916458","172.30.1.104","172.30.1.205","TCP","54","135 > 41376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6391","2.916463","172.30.1.205","172.30.1.104","TCP","54","41376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6392","2.916565","172.30.1.104","172.30.1.205","TCP","66","49671 > 34014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6393","2.916574","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6394","2.916953","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6395","2.917320","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6396","2.917334","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6397","2.919284","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6398","2.919700","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6399","2.919707","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6400","2.921107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6401","2.922312","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6402","2.922323","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6403","2.923281","172.30.1.205","172.30.1.104","TCP","74","41380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906149 TSecr=0 WS=128" +"6404","2.923618","172.30.1.104","172.30.1.205","TCP","66","135 > 41380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6405","2.923629","172.30.1.205","172.30.1.104","TCP","54","41380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6406","2.923974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6407","2.924270","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6408","2.924286","172.30.1.205","172.30.1.104","TCP","54","41380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6409","2.926493","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6410","2.926930","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6411","2.926938","172.30.1.205","172.30.1.104","TCP","54","41380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6412","2.928793","172.30.1.205","172.30.1.104","TCP","54","41380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6413","2.928907","172.30.1.205","172.30.1.104","TCP","74","34018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906155 TSecr=0 WS=128" +"6414","2.929128","172.30.1.104","172.30.1.205","TCP","54","135 > 41380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6415","2.929137","172.30.1.104","172.30.1.205","TCP","54","135 > 41380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6416","2.929142","172.30.1.205","172.30.1.104","TCP","54","41380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6417","2.929251","172.30.1.104","172.30.1.205","TCP","66","49671 > 34018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6418","2.929260","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6419","2.929606","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6420","2.929927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6421","2.929936","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6422","2.931807","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6423","2.932214","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6424","2.932220","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6425","2.933597","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6426","2.934910","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6427","2.934921","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6428","2.935875","172.30.1.205","172.30.1.104","TCP","74","41384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906162 TSecr=0 WS=128" +"6429","2.936193","172.30.1.104","172.30.1.205","TCP","66","135 > 41384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6430","2.936203","172.30.1.205","172.30.1.104","TCP","54","41384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6431","2.936550","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6432","2.936853","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6433","2.936863","172.30.1.205","172.30.1.104","TCP","54","41384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6434","2.939041","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6435","2.939466","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6436","2.939473","172.30.1.205","172.30.1.104","TCP","54","41384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6437","2.941290","172.30.1.205","172.30.1.104","TCP","54","41384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6438","2.941402","172.30.1.205","172.30.1.104","TCP","74","34022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906167 TSecr=0 WS=128" +"6439","2.941601","172.30.1.104","172.30.1.205","TCP","54","135 > 41384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6440","2.941610","172.30.1.104","172.30.1.205","TCP","54","135 > 41384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6441","2.941615","172.30.1.205","172.30.1.104","TCP","54","41384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6442","2.941761","172.30.1.104","172.30.1.205","TCP","66","49671 > 34022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6443","2.941769","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6444","2.942133","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6445","2.942659","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6446","2.942668","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6447","2.944521","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6448","2.944927","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6449","2.944934","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6450","2.946288","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6451","2.947474","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6452","2.947485","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6453","2.948431","172.30.1.205","172.30.1.104","TCP","74","41388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906174 TSecr=0 WS=128" +"6454","2.948764","172.30.1.104","172.30.1.205","TCP","66","135 > 41388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6455","2.948784","172.30.1.205","172.30.1.104","TCP","54","41388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6456","2.949137","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6457","2.949455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6458","2.949465","172.30.1.205","172.30.1.104","TCP","54","41388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6459","2.951741","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6460","2.952185","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6461","2.952193","172.30.1.205","172.30.1.104","TCP","54","41388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6462","2.954033","172.30.1.205","172.30.1.104","TCP","54","41388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6463","2.954152","172.30.1.205","172.30.1.104","TCP","74","34026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906180 TSecr=0 WS=128" +"6464","2.954363","172.30.1.104","172.30.1.205","TCP","54","135 > 41388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6465","2.954373","172.30.1.104","172.30.1.205","TCP","54","135 > 41388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6466","2.954379","172.30.1.205","172.30.1.104","TCP","54","41388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6467","2.954469","172.30.1.104","172.30.1.205","TCP","66","49671 > 34026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6468","2.954478","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6469","2.954823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6470","2.955162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6471","2.955171","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6472","2.957071","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6473","2.957483","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6474","2.957489","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6475","2.958826","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6476","2.960122","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6477","2.960137","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6478","2.961176","172.30.1.205","172.30.1.104","TCP","74","41392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906187 TSecr=0 WS=128" +"6479","2.961542","172.30.1.104","172.30.1.205","TCP","66","135 > 41392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6480","2.961553","172.30.1.205","172.30.1.104","TCP","54","41392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6481","2.961905","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6482","2.962219","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6483","2.962229","172.30.1.205","172.30.1.104","TCP","54","41392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6484","2.964416","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6485","2.964843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6486","2.964851","172.30.1.205","172.30.1.104","TCP","54","41392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6487","2.966669","172.30.1.205","172.30.1.104","TCP","54","41392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6488","2.966784","172.30.1.205","172.30.1.104","TCP","74","34030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906193 TSecr=0 WS=128" +"6489","2.967023","172.30.1.104","172.30.1.205","TCP","54","135 > 41392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6490","2.967041","172.30.1.104","172.30.1.205","TCP","54","135 > 41392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6491","2.967051","172.30.1.205","172.30.1.104","TCP","54","41392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6492","2.967142","172.30.1.104","172.30.1.205","TCP","66","49671 > 34030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6493","2.967159","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6494","2.967668","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6495","2.967983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6496","2.967992","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6497","2.969895","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6498","2.970283","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6499","2.970290","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6500","2.971637","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6501","2.973982","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6502","2.973992","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6503","2.974938","172.30.1.205","172.30.1.104","TCP","74","41396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906201 TSecr=0 WS=128" +"6504","2.975269","172.30.1.104","172.30.1.205","TCP","66","135 > 41396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6505","2.975282","172.30.1.205","172.30.1.104","TCP","54","41396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6506","2.975644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6507","2.975963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6508","2.975973","172.30.1.205","172.30.1.104","TCP","54","41396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6509","2.978196","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6510","2.978622","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6511","2.978629","172.30.1.205","172.30.1.104","TCP","54","41396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6512","2.980435","172.30.1.205","172.30.1.104","TCP","54","41396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6513","2.980546","172.30.1.205","172.30.1.104","TCP","74","34034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906206 TSecr=0 WS=128" +"6514","2.980720","172.30.1.104","172.30.1.205","TCP","54","135 > 41396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6515","2.980755","172.30.1.104","172.30.1.205","TCP","54","135 > 41396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6516","2.980761","172.30.1.205","172.30.1.104","TCP","54","41396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6517","2.980874","172.30.1.104","172.30.1.205","TCP","66","49671 > 34034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6518","2.980883","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6519","2.981245","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6520","2.981994","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6521","2.982003","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6522","2.983871","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6523","2.984243","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6524","2.984256","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6525","2.985725","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6526","2.987990","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6527","2.988001","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6528","2.988985","172.30.1.205","172.30.1.104","TCP","74","41400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906215 TSecr=0 WS=128" +"6529","2.989321","172.30.1.104","172.30.1.205","TCP","66","135 > 41400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6530","2.989332","172.30.1.205","172.30.1.104","TCP","54","41400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6531","2.989692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6532","2.990019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6533","2.990032","172.30.1.205","172.30.1.104","TCP","54","41400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6534","2.992277","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6535","2.992677","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6536","2.992684","172.30.1.205","172.30.1.104","TCP","54","41400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6537","2.994521","172.30.1.205","172.30.1.104","TCP","54","41400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6538","2.994634","172.30.1.205","172.30.1.104","TCP","74","34038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906221 TSecr=0 WS=128" +"6539","2.994872","172.30.1.104","172.30.1.205","TCP","54","135 > 41400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6540","2.994882","172.30.1.104","172.30.1.205","TCP","54","135 > 41400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6541","2.994887","172.30.1.205","172.30.1.104","TCP","54","41400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6542","2.994971","172.30.1.104","172.30.1.205","TCP","66","49671 > 34038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6543","2.994980","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6544","2.995327","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6545","2.995693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6546","2.995702","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6547","2.997598","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6548","2.997965","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6549","2.997971","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6550","2.999316","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6551","3.000514","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6552","3.000524","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6553","3.001492","172.30.1.205","172.30.1.104","TCP","74","41404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906227 TSecr=0 WS=128" +"6554","3.001774","172.30.1.104","172.30.1.205","TCP","66","135 > 41404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6555","3.001785","172.30.1.205","172.30.1.104","TCP","54","41404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6556","3.002132","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6557","3.002430","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6558","3.002439","172.30.1.205","172.30.1.104","TCP","54","41404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6559","3.004589","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6560","3.005007","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6561","3.005014","172.30.1.205","172.30.1.104","TCP","54","41404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6562","3.006839","172.30.1.205","172.30.1.104","TCP","54","41404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6563","3.006948","172.30.1.205","172.30.1.104","TCP","74","34042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906233 TSecr=0 WS=128" +"6564","3.007131","172.30.1.104","172.30.1.205","TCP","54","135 > 41404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6565","3.007171","172.30.1.104","172.30.1.205","TCP","54","135 > 41404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6566","3.007177","172.30.1.205","172.30.1.104","TCP","54","41404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6567","3.007261","172.30.1.104","172.30.1.205","TCP","66","49671 > 34042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6568","3.007269","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6569","3.007615","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6570","3.009035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6571","3.009044","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6572","3.010915","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6573","3.011319","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6574","3.011325","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6575","3.012665","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6576","3.013836","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6577","3.013845","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6578","3.014815","172.30.1.205","172.30.1.104","TCP","74","41408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906241 TSecr=0 WS=128" +"6579","3.015151","172.30.1.104","172.30.1.205","TCP","66","135 > 41408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6580","3.015163","172.30.1.205","172.30.1.104","TCP","54","41408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6581","3.015515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6582","3.015818","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6583","3.015827","172.30.1.205","172.30.1.104","TCP","54","41408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6584","3.018048","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6585","3.018461","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6586","3.018468","172.30.1.205","172.30.1.104","TCP","54","41408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6587","3.020263","172.30.1.205","172.30.1.104","TCP","54","41408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6588","3.020378","172.30.1.205","172.30.1.104","TCP","74","34046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906246 TSecr=0 WS=128" +"6589","3.020608","172.30.1.104","172.30.1.205","TCP","54","135 > 41408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6590","3.020618","172.30.1.104","172.30.1.205","TCP","54","135 > 41408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6591","3.020624","172.30.1.205","172.30.1.104","TCP","54","41408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6592","3.020730","172.30.1.104","172.30.1.205","TCP","66","49671 > 34046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6593","3.020739","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6594","3.021103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6595","3.021416","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6596","3.021429","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6597","3.023339","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6598","3.023752","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6599","3.023759","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6600","3.025204","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6601","3.026328","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6602","3.026340","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6603","3.027283","172.30.1.205","172.30.1.104","TCP","74","41412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906253 TSecr=0 WS=128" +"6604","3.027602","172.30.1.104","172.30.1.205","TCP","66","135 > 41412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6605","3.027613","172.30.1.205","172.30.1.104","TCP","54","41412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6606","3.027965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6607","3.028266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6608","3.028275","172.30.1.205","172.30.1.104","TCP","54","41412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6609","3.030482","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6610","3.030935","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6611","3.030943","172.30.1.205","172.30.1.104","TCP","54","41412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6612","3.032772","172.30.1.205","172.30.1.104","TCP","54","41412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6613","3.032881","172.30.1.205","172.30.1.104","TCP","74","34050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906259 TSecr=0 WS=128" +"6614","3.033058","172.30.1.104","172.30.1.205","TCP","54","135 > 41412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6615","3.033103","172.30.1.104","172.30.1.205","TCP","54","135 > 41412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6616","3.033109","172.30.1.205","172.30.1.104","TCP","54","41412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6617","3.033206","172.30.1.104","172.30.1.205","TCP","66","49671 > 34050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6618","3.033214","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6619","3.033560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6620","3.033866","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6621","3.033875","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6622","3.035750","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6623","3.036133","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6624","3.036139","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6625","3.037498","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6626","3.038600","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6627","3.038609","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6628","3.039529","172.30.1.205","172.30.1.104","TCP","74","41416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906265 TSecr=0 WS=128" +"6629","3.039823","172.30.1.104","172.30.1.205","TCP","66","135 > 41416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6630","3.039833","172.30.1.205","172.30.1.104","TCP","54","41416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6631","3.040177","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6632","3.040494","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6633","3.040503","172.30.1.205","172.30.1.104","TCP","54","41416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6634","3.042688","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6635","3.043093","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6636","3.043100","172.30.1.205","172.30.1.104","TCP","54","41416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6637","3.044917","172.30.1.205","172.30.1.104","TCP","54","41416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6638","3.045025","172.30.1.205","172.30.1.104","TCP","74","34054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906271 TSecr=0 WS=128" +"6639","3.045255","172.30.1.104","172.30.1.205","TCP","54","135 > 41416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6640","3.045263","172.30.1.104","172.30.1.205","TCP","54","135 > 41416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6641","3.045268","172.30.1.205","172.30.1.104","TCP","54","41416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6642","3.045385","172.30.1.104","172.30.1.205","TCP","66","49671 > 34054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6643","3.045393","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6644","3.045735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6645","3.048155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6646","3.048162","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6647","3.050033","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6648","3.050569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6649","3.050575","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6650","3.051904","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6651","3.053052","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6652","3.053062","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6653","3.053993","172.30.1.205","172.30.1.104","TCP","74","41420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906280 TSecr=0 WS=128" +"6654","3.054308","172.30.1.104","172.30.1.205","TCP","66","135 > 41420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6655","3.054319","172.30.1.205","172.30.1.104","TCP","54","41420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6656","3.054672","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6657","3.054968","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6658","3.054977","172.30.1.205","172.30.1.104","TCP","54","41420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6659","3.057172","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6660","3.057543","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6661","3.057550","172.30.1.205","172.30.1.104","TCP","54","41420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6662","3.058388","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6663","3.058436","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6664","3.058471","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6665","3.058505","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6666","3.058533","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6667","3.058560","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6668","3.058586","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6669","3.058618","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6670","3.058641","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6671","3.058666","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6672","3.058692","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6673","3.058760","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6674","3.058785","172.30.1.104","172.30.1.205","TCP","54","49671 > 34014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6675","3.058811","172.30.1.104","172.30.1.205","TCP","54","49671 > 34018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6676","3.058838","172.30.1.104","172.30.1.205","TCP","54","49671 > 34014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6677","3.058844","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6678","3.058864","172.30.1.104","172.30.1.205","TCP","54","49671 > 34018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6679","3.058868","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6680","3.059075","172.30.1.104","172.30.1.205","TCP","54","49671 > 34022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6681","3.059098","172.30.1.104","172.30.1.205","TCP","54","49671 > 34026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6682","3.059126","172.30.1.104","172.30.1.205","TCP","54","49671 > 34030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6683","3.059154","172.30.1.104","172.30.1.205","TCP","54","49671 > 34034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6684","3.059460","172.30.1.104","172.30.1.205","TCP","54","49671 > 34038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6685","3.059467","172.30.1.104","172.30.1.205","TCP","54","49671 > 34042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6686","3.059470","172.30.1.104","172.30.1.205","TCP","54","49671 > 34046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6687","3.059472","172.30.1.104","172.30.1.205","TCP","54","49671 > 34050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6688","3.059474","172.30.1.104","172.30.1.205","TCP","54","49671 > 34054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6689","3.059476","172.30.1.104","172.30.1.205","TCP","54","49671 > 34054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6690","3.059482","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6691","3.059488","172.30.1.104","172.30.1.205","TCP","54","49671 > 34050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6692","3.059490","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6693","3.059491","172.30.1.104","172.30.1.205","TCP","54","49671 > 34046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6694","3.059493","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6695","3.059494","172.30.1.104","172.30.1.205","TCP","54","49671 > 34042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6696","3.059496","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6697","3.059497","172.30.1.104","172.30.1.205","TCP","54","49671 > 34038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6698","3.059499","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6699","3.059500","172.30.1.104","172.30.1.205","TCP","54","49671 > 34034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6700","3.059502","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6701","3.059503","172.30.1.104","172.30.1.205","TCP","54","49671 > 34022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6702","3.059505","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6703","3.059506","172.30.1.104","172.30.1.205","TCP","54","49671 > 34026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6704","3.059507","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6705","3.059509","172.30.1.104","172.30.1.205","TCP","54","49671 > 34030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6706","3.059510","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6707","3.059528","172.30.1.104","172.30.1.205","TCP","54","49671 > 34010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6708","3.059710","172.30.1.104","172.30.1.205","TCP","54","49671 > 34010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"6709","3.059714","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"6710","3.060224","172.30.1.205","172.30.1.104","TCP","54","41420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6711","3.060346","172.30.1.205","172.30.1.104","TCP","74","34058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906286 TSecr=0 WS=128" +"6712","3.060483","172.30.1.104","172.30.1.205","TCP","54","135 > 41420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6713","3.060490","172.30.1.104","172.30.1.205","TCP","54","135 > 41420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6714","3.060495","172.30.1.205","172.30.1.104","TCP","54","41420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6715","3.060628","172.30.1.104","172.30.1.205","TCP","66","49671 > 34058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6716","3.060636","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6717","3.061017","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6718","3.061279","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6719","3.061287","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6720","3.063138","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6721","3.063498","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6722","3.063505","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6723","3.064867","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6724","3.066028","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6725","3.066037","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6726","3.066953","172.30.1.205","172.30.1.104","TCP","74","41424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906293 TSecr=0 WS=128" +"6727","3.067271","172.30.1.104","172.30.1.205","TCP","66","135 > 41424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6728","3.067281","172.30.1.205","172.30.1.104","TCP","54","41424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6729","3.067631","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6730","3.067901","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6731","3.067910","172.30.1.205","172.30.1.104","TCP","54","41424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6732","3.070108","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6733","3.070507","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6734","3.070514","172.30.1.205","172.30.1.104","TCP","54","41424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6735","3.072315","172.30.1.205","172.30.1.104","TCP","54","41424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6736","3.072431","172.30.1.205","172.30.1.104","TCP","74","34062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906298 TSecr=0 WS=128" +"6737","3.072592","172.30.1.104","172.30.1.205","TCP","54","135 > 41424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6738","3.072640","172.30.1.104","172.30.1.205","TCP","54","135 > 41424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6739","3.072646","172.30.1.205","172.30.1.104","TCP","54","41424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6740","3.072747","172.30.1.104","172.30.1.205","TCP","66","49671 > 34062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6741","3.072755","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6742","3.073117","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6743","3.073392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6744","3.073401","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6745","3.075257","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6746","3.075635","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6747","3.075642","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6748","3.076999","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6749","3.078163","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6750","3.078172","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6751","3.079092","172.30.1.205","172.30.1.104","TCP","74","41428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906305 TSecr=0 WS=128" +"6752","3.079374","172.30.1.104","172.30.1.205","TCP","66","135 > 41428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6753","3.079384","172.30.1.205","172.30.1.104","TCP","54","41428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6754","3.079726","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6755","3.079990","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6756","3.079998","172.30.1.205","172.30.1.104","TCP","54","41428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6757","3.082186","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6758","3.082585","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6759","3.082591","172.30.1.205","172.30.1.104","TCP","54","41428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6760","3.084414","172.30.1.205","172.30.1.104","TCP","54","41428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6761","3.084524","172.30.1.205","172.30.1.104","TCP","74","34066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906310 TSecr=0 WS=128" +"6762","3.084717","172.30.1.104","172.30.1.205","TCP","54","135 > 41428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6763","3.084743","172.30.1.104","172.30.1.205","TCP","54","135 > 41428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6764","3.084748","172.30.1.205","172.30.1.104","TCP","54","41428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6765","3.084807","172.30.1.104","172.30.1.205","TCP","66","49671 > 34066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6766","3.084816","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6767","3.085185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6768","3.087621","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6769","3.087628","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6770","3.089512","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6771","3.089867","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6772","3.089873","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6773","3.091204","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6774","3.093452","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6775","3.093462","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6776","3.094432","172.30.1.205","172.30.1.104","TCP","74","41432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906320 TSecr=0 WS=128" +"6777","3.094723","172.30.1.104","172.30.1.205","TCP","66","135 > 41432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6778","3.094734","172.30.1.205","172.30.1.104","TCP","54","41432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6779","3.095081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6780","3.095373","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6781","3.095382","172.30.1.205","172.30.1.104","TCP","54","41432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6782","3.097569","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6783","3.098019","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6784","3.098026","172.30.1.205","172.30.1.104","TCP","54","41432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6785","3.099818","172.30.1.205","172.30.1.104","TCP","54","41432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6786","3.099930","172.30.1.205","172.30.1.104","TCP","74","34070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906326 TSecr=0 WS=128" +"6787","3.100141","172.30.1.104","172.30.1.205","TCP","54","135 > 41432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6788","3.100151","172.30.1.104","172.30.1.205","TCP","54","135 > 41432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6789","3.100157","172.30.1.205","172.30.1.104","TCP","54","41432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6790","3.100257","172.30.1.104","172.30.1.205","TCP","66","49671 > 34070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6791","3.100265","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6792","3.100606","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6793","3.100938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6794","3.100947","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6795","3.102793","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6796","3.103322","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6797","3.103326","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6798","3.104656","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6799","3.105879","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6800","3.105888","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6801","3.106832","172.30.1.205","172.30.1.104","TCP","74","41436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906333 TSecr=0 WS=128" +"6802","3.107212","172.30.1.104","172.30.1.205","TCP","66","135 > 41436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6803","3.107222","172.30.1.205","172.30.1.104","TCP","54","41436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6804","3.107572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6805","3.107895","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6806","3.107904","172.30.1.205","172.30.1.104","TCP","54","41436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6807","3.110106","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6808","3.110524","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6809","3.110531","172.30.1.205","172.30.1.104","TCP","54","41436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6810","3.112326","172.30.1.205","172.30.1.104","TCP","54","41436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6811","3.112437","172.30.1.205","172.30.1.104","TCP","74","34074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906338 TSecr=0 WS=128" +"6812","3.112666","172.30.1.104","172.30.1.205","TCP","54","135 > 41436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6813","3.112675","172.30.1.104","172.30.1.205","TCP","54","135 > 41436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6814","3.112682","172.30.1.205","172.30.1.104","TCP","54","41436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6815","3.112783","172.30.1.104","172.30.1.205","TCP","66","49671 > 34074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6816","3.112792","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6817","3.113139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6818","3.113450","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6819","3.113459","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6820","3.115335","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6821","3.115746","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6822","3.115753","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6823","3.117120","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6824","3.118312","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6825","3.118322","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6826","3.119255","172.30.1.205","172.30.1.104","TCP","74","41440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906345 TSecr=0 WS=128" +"6827","3.119621","172.30.1.104","172.30.1.205","TCP","66","135 > 41440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6828","3.119631","172.30.1.205","172.30.1.104","TCP","54","41440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6829","3.119973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6830","3.120289","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6831","3.120302","172.30.1.205","172.30.1.104","TCP","54","41440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6832","3.122596","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6833","3.123012","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6834","3.123019","172.30.1.205","172.30.1.104","TCP","54","41440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6835","3.124868","172.30.1.205","172.30.1.104","TCP","54","41440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6836","3.124985","172.30.1.205","172.30.1.104","TCP","74","34078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906351 TSecr=0 WS=128" +"6837","3.125178","172.30.1.104","172.30.1.205","TCP","54","135 > 41440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6838","3.125188","172.30.1.104","172.30.1.205","TCP","54","135 > 41440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6839","3.125194","172.30.1.205","172.30.1.104","TCP","54","41440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6840","3.125296","172.30.1.104","172.30.1.205","TCP","66","49671 > 34078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6841","3.125304","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6842","3.125647","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6843","3.125940","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6844","3.125949","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6845","3.127831","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6846","3.129434","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6847","3.129441","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6848","3.130793","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6849","3.131944","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6850","3.131954","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6851","3.132904","172.30.1.205","172.30.1.104","TCP","74","41444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906359 TSecr=0 WS=128" +"6852","3.133203","172.30.1.104","172.30.1.205","TCP","66","135 > 41444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6853","3.133214","172.30.1.205","172.30.1.104","TCP","54","41444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6854","3.133557","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6855","3.133845","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6856","3.133858","172.30.1.205","172.30.1.104","TCP","54","41444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6857","3.136053","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6858","3.136437","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6859","3.136443","172.30.1.205","172.30.1.104","TCP","54","41444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6860","3.138259","172.30.1.205","172.30.1.104","TCP","54","41444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6861","3.138370","172.30.1.205","172.30.1.104","TCP","74","34082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906364 TSecr=0 WS=128" +"6862","3.138586","172.30.1.104","172.30.1.205","TCP","54","135 > 41444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6863","3.138595","172.30.1.104","172.30.1.205","TCP","54","135 > 41444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6864","3.138601","172.30.1.205","172.30.1.104","TCP","54","41444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6865","3.138701","172.30.1.104","172.30.1.205","TCP","66","49671 > 34082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6866","3.138709","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6867","3.139059","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6868","3.139366","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6869","3.139375","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6870","3.141264","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6871","3.141736","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6872","3.141742","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6873","3.143097","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6874","3.144249","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6875","3.144263","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6876","3.145305","172.30.1.205","172.30.1.104","TCP","74","41448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906371 TSecr=0 WS=128" +"6877","3.145641","172.30.1.104","172.30.1.205","TCP","66","135 > 41448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6878","3.145652","172.30.1.205","172.30.1.104","TCP","54","41448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6879","3.146013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6880","3.146308","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6881","3.146318","172.30.1.205","172.30.1.104","TCP","54","41448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6882","3.148504","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6883","3.148908","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6884","3.148916","172.30.1.205","172.30.1.104","TCP","54","41448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6885","3.150737","172.30.1.205","172.30.1.104","TCP","54","41448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6886","3.150849","172.30.1.205","172.30.1.104","TCP","74","34086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906377 TSecr=0 WS=128" +"6887","3.151012","172.30.1.104","172.30.1.205","TCP","54","135 > 41448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6888","3.151055","172.30.1.104","172.30.1.205","TCP","54","135 > 41448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6889","3.151061","172.30.1.205","172.30.1.104","TCP","54","41448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6890","3.151113","172.30.1.104","172.30.1.205","TCP","66","49671 > 34086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6891","3.151122","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6892","3.151472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6893","3.151767","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6894","3.151777","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6895","3.153660","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6896","3.154038","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6897","3.154042","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6898","3.155397","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6899","3.156607","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6900","3.156617","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6901","3.157580","172.30.1.205","172.30.1.104","TCP","74","41452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906384 TSecr=0 WS=128" +"6902","3.157912","172.30.1.104","172.30.1.205","TCP","66","135 > 41452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6903","3.157923","172.30.1.205","172.30.1.104","TCP","54","41452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6904","3.158278","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6905","3.158633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6906","3.158642","172.30.1.205","172.30.1.104","TCP","54","41452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6907","3.160816","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6908","3.161203","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6909","3.161209","172.30.1.205","172.30.1.104","TCP","54","41452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6910","3.162998","172.30.1.205","172.30.1.104","TCP","54","41452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6911","3.163110","172.30.1.205","172.30.1.104","TCP","74","34090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906389 TSecr=0 WS=128" +"6912","3.163284","172.30.1.104","172.30.1.205","TCP","54","135 > 41452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6913","3.163316","172.30.1.104","172.30.1.205","TCP","54","135 > 41452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6914","3.163322","172.30.1.205","172.30.1.104","TCP","54","41452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6915","3.163414","172.30.1.104","172.30.1.205","TCP","66","49671 > 34090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6916","3.163423","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6917","3.163765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6918","3.164084","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6919","3.164092","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6920","3.165981","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6921","3.166363","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6922","3.166370","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6923","3.167702","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6924","3.168850","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6925","3.168860","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6926","3.169793","172.30.1.205","172.30.1.104","TCP","74","41456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906396 TSecr=0 WS=128" +"6927","3.170085","172.30.1.104","172.30.1.205","TCP","66","135 > 41456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6928","3.170096","172.30.1.205","172.30.1.104","TCP","54","41456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6929","3.170440","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6930","3.170732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6931","3.170741","172.30.1.205","172.30.1.104","TCP","54","41456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6932","3.172931","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6933","3.173317","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6934","3.173323","172.30.1.205","172.30.1.104","TCP","54","41456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6935","3.175125","172.30.1.205","172.30.1.104","TCP","54","41456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6936","3.175237","172.30.1.205","172.30.1.104","TCP","74","34094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906401 TSecr=0 WS=128" +"6937","3.175465","172.30.1.104","172.30.1.205","TCP","54","135 > 41456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6938","3.175474","172.30.1.104","172.30.1.205","TCP","54","135 > 41456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6939","3.175480","172.30.1.205","172.30.1.104","TCP","54","41456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6940","3.175562","172.30.1.104","172.30.1.205","TCP","66","49671 > 34094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6941","3.175571","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6942","3.175913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6943","3.176197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6944","3.176206","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6945","3.178098","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6946","3.178483","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6947","3.178489","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6948","3.179822","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6949","3.180950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6950","3.180960","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6951","3.181890","172.30.1.205","172.30.1.104","TCP","74","41460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906408 TSecr=0 WS=128" +"6952","3.182225","172.30.1.104","172.30.1.205","TCP","66","135 > 41460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6953","3.182236","172.30.1.205","172.30.1.104","TCP","54","41460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6954","3.182585","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6955","3.182875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6956","3.182884","172.30.1.205","172.30.1.104","TCP","54","41460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6957","3.185092","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6958","3.185465","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6959","3.185472","172.30.1.205","172.30.1.104","TCP","54","41460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6960","3.187264","172.30.1.205","172.30.1.104","TCP","54","41460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6961","3.187377","172.30.1.205","172.30.1.104","TCP","74","34098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906413 TSecr=0 WS=128" +"6962","3.187536","172.30.1.104","172.30.1.205","TCP","54","135 > 41460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6963","3.187553","172.30.1.104","172.30.1.205","TCP","54","135 > 41460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6964","3.187558","172.30.1.205","172.30.1.104","TCP","54","41460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6965","3.187637","172.30.1.104","172.30.1.205","TCP","66","49671 > 34098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6966","3.187646","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6967","3.188000","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6968","3.188276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6969","3.188285","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6970","3.190199","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6971","3.192653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6972","3.192657","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6973","3.194018","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6974","3.196151","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"6975","3.196162","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"6976","3.197128","172.30.1.205","172.30.1.104","TCP","74","41464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906423 TSecr=0 WS=128" +"6977","3.197414","172.30.1.104","172.30.1.205","TCP","66","135 > 41464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6978","3.197428","172.30.1.205","172.30.1.104","TCP","54","41464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6979","3.197778","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"6980","3.198088","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6981","3.198097","172.30.1.205","172.30.1.104","TCP","54","41464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6982","3.200258","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"6983","3.200640","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"6984","3.200646","172.30.1.205","172.30.1.104","TCP","54","41464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6985","3.202458","172.30.1.205","172.30.1.104","TCP","54","41464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"6986","3.202570","172.30.1.205","172.30.1.104","TCP","74","34102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906428 TSecr=0 WS=128" +"6987","3.202733","172.30.1.104","172.30.1.205","TCP","54","135 > 41464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6988","3.202742","172.30.1.104","172.30.1.205","TCP","54","135 > 41464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"6989","3.202748","172.30.1.205","172.30.1.104","TCP","54","41464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"6990","3.202849","172.30.1.104","172.30.1.205","TCP","66","49671 > 34102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"6991","3.202858","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"6992","3.203199","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"6993","3.203465","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"6994","3.203473","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"6995","3.205369","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"6996","3.205727","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"6997","3.205734","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"6998","3.207095","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"6999","3.208244","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7000","3.208253","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7001","3.209212","172.30.1.205","172.30.1.104","TCP","74","41468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906435 TSecr=0 WS=128" +"7002","3.209477","172.30.1.104","172.30.1.205","TCP","66","135 > 41468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7003","3.209488","172.30.1.205","172.30.1.104","TCP","54","41468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7004","3.209832","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7005","3.210086","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7006","3.210095","172.30.1.205","172.30.1.104","TCP","54","41468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7007","3.212247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7008","3.212608","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7009","3.212615","172.30.1.205","172.30.1.104","TCP","54","41468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7010","3.213476","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7011","3.213536","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7012","3.213573","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7013","3.213607","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7014","3.213639","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7015","3.213672","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7016","3.213704","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7017","3.213730","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7018","3.213752","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7019","3.213783","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7020","3.213809","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7021","3.213837","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7022","3.213981","172.30.1.104","172.30.1.205","TCP","54","49671 > 34058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7023","3.213991","172.30.1.104","172.30.1.205","TCP","54","49671 > 34062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7024","3.213994","172.30.1.104","172.30.1.205","TCP","54","49671 > 34066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7025","3.213997","172.30.1.104","172.30.1.205","TCP","54","49671 > 34058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7026","3.214003","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7027","3.214010","172.30.1.104","172.30.1.205","TCP","54","49671 > 34062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7028","3.214013","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7029","3.214014","172.30.1.104","172.30.1.205","TCP","54","49671 > 34070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7030","3.214236","172.30.1.104","172.30.1.205","TCP","54","49671 > 34074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7031","3.214242","172.30.1.104","172.30.1.205","TCP","54","49671 > 34078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7032","3.214245","172.30.1.104","172.30.1.205","TCP","54","49671 > 34078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7033","3.214249","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7034","3.214256","172.30.1.104","172.30.1.205","TCP","54","49671 > 34074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7035","3.214258","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7036","3.214260","172.30.1.104","172.30.1.205","TCP","54","49671 > 34066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7037","3.214261","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7038","3.214263","172.30.1.104","172.30.1.205","TCP","54","49671 > 34070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7039","3.214268","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7040","3.214269","172.30.1.104","172.30.1.205","TCP","54","49671 > 34082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7041","3.214273","172.30.1.104","172.30.1.205","TCP","54","49671 > 34086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7042","3.214275","172.30.1.104","172.30.1.205","TCP","54","49671 > 34094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7043","3.214357","172.30.1.104","172.30.1.205","TCP","54","49671 > 34090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7044","3.214376","172.30.1.104","172.30.1.205","TCP","54","49671 > 34082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7045","3.214379","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7046","3.214396","172.30.1.104","172.30.1.205","TCP","54","49671 > 34098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7047","3.214423","172.30.1.104","172.30.1.205","TCP","54","49671 > 34098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7048","3.214425","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7049","3.214444","172.30.1.104","172.30.1.205","TCP","54","49671 > 34090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7050","3.214447","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7051","3.214465","172.30.1.104","172.30.1.205","TCP","54","49671 > 34086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7052","3.214468","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7053","3.214484","172.30.1.104","172.30.1.205","TCP","54","49671 > 34094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7054","3.214487","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7055","3.214504","172.30.1.104","172.30.1.205","TCP","54","49671 > 34102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7056","3.214525","172.30.1.104","172.30.1.205","TCP","54","49671 > 34102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7057","3.214531","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7058","3.215348","172.30.1.205","172.30.1.104","TCP","54","41468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7059","3.215476","172.30.1.205","172.30.1.104","TCP","74","34106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906441 TSecr=0 WS=128" +"7060","3.215692","172.30.1.104","172.30.1.205","TCP","54","135 > 41468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7061","3.215773","172.30.1.104","172.30.1.205","TCP","66","49671 > 34106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7062","3.215782","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7063","3.215788","172.30.1.104","172.30.1.205","TCP","54","135 > 41468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7064","3.215792","172.30.1.205","172.30.1.104","TCP","54","41468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7065","3.216149","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7066","3.216412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7067","3.216420","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7068","3.218327","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7069","3.218734","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7070","3.218741","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7071","3.220094","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7072","3.221196","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7073","3.221205","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7074","3.222152","172.30.1.205","172.30.1.104","TCP","74","41472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906448 TSecr=0 WS=128" +"7075","3.222434","172.30.1.104","172.30.1.205","TCP","66","135 > 41472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7076","3.222445","172.30.1.205","172.30.1.104","TCP","54","41472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7077","3.222824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7078","3.223087","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7079","3.223096","172.30.1.205","172.30.1.104","TCP","54","41472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7080","3.225365","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7081","3.225732","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7082","3.225739","172.30.1.205","172.30.1.104","TCP","54","41472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7083","3.227556","172.30.1.205","172.30.1.104","TCP","54","41472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7084","3.227667","172.30.1.205","172.30.1.104","TCP","74","34110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906454 TSecr=0 WS=128" +"7085","3.227843","172.30.1.104","172.30.1.205","TCP","54","135 > 41472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7086","3.227871","172.30.1.104","172.30.1.205","TCP","54","135 > 41472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7087","3.227876","172.30.1.205","172.30.1.104","TCP","54","41472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7088","3.227953","172.30.1.104","172.30.1.205","TCP","66","49671 > 34110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7089","3.227962","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7090","3.228304","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7091","3.228573","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7092","3.228582","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7093","3.230479","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7094","3.230820","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7095","3.230824","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7096","3.232162","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7097","3.233429","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7098","3.233439","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7099","3.234372","172.30.1.205","172.30.1.104","TCP","74","41476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906460 TSecr=0 WS=128" +"7100","3.234687","172.30.1.104","172.30.1.205","TCP","66","135 > 41476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7101","3.234698","172.30.1.205","172.30.1.104","TCP","54","41476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7102","3.235043","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7103","3.235334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7104","3.235343","172.30.1.205","172.30.1.104","TCP","54","41476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7105","3.237543","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7106","3.237992","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7107","3.237998","172.30.1.205","172.30.1.104","TCP","54","41476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7108","3.239785","172.30.1.205","172.30.1.104","TCP","54","41476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7109","3.239895","172.30.1.205","172.30.1.104","TCP","74","34114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906466 TSecr=0 WS=128" +"7110","3.240083","172.30.1.104","172.30.1.205","TCP","54","135 > 41476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7111","3.240107","172.30.1.104","172.30.1.205","TCP","54","135 > 41476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7112","3.240113","172.30.1.205","172.30.1.104","TCP","54","41476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7113","3.240215","172.30.1.104","172.30.1.205","TCP","66","49671 > 34114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7114","3.240223","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7115","3.240564","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7116","3.240876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7117","3.240884","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7118","3.242741","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7119","3.243134","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7120","3.243140","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7121","3.244473","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7122","3.245747","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7123","3.245759","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7124","3.246725","172.30.1.205","172.30.1.104","TCP","74","41480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906473 TSecr=0 WS=128" +"7125","3.247015","172.30.1.104","172.30.1.205","TCP","66","135 > 41480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7126","3.247028","172.30.1.205","172.30.1.104","TCP","54","41480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7127","3.247389","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7128","3.247659","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7129","3.247668","172.30.1.205","172.30.1.104","TCP","54","41480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7130","3.249884","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7131","3.250749","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7132","3.250756","172.30.1.205","172.30.1.104","TCP","54","41480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7133","3.252589","172.30.1.205","172.30.1.104","TCP","54","41480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7134","3.252702","172.30.1.205","172.30.1.104","TCP","74","34118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906479 TSecr=0 WS=128" +"7135","3.252868","172.30.1.104","172.30.1.205","TCP","54","135 > 41480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7136","3.252877","172.30.1.104","172.30.1.205","TCP","54","135 > 41480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7137","3.252883","172.30.1.205","172.30.1.104","TCP","54","41480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7138","3.252978","172.30.1.104","172.30.1.205","TCP","66","49671 > 34118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7139","3.252986","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7140","3.253334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7141","3.253618","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7142","3.253627","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7143","3.255513","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7144","3.255869","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7145","3.255875","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7146","3.257266","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7147","3.258400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7148","3.258409","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7149","3.259332","172.30.1.205","172.30.1.104","TCP","74","41484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906485 TSecr=0 WS=128" +"7150","3.259671","172.30.1.104","172.30.1.205","TCP","66","135 > 41484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7151","3.259682","172.30.1.205","172.30.1.104","TCP","54","41484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7152","3.260026","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7153","3.260326","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7154","3.260335","172.30.1.205","172.30.1.104","TCP","54","41484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7155","3.262585","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7156","3.262951","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7157","3.262957","172.30.1.205","172.30.1.104","TCP","54","41484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7158","3.264750","172.30.1.205","172.30.1.104","TCP","54","41484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7159","3.264890","172.30.1.205","172.30.1.104","TCP","74","34122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906491 TSecr=0 WS=128" +"7160","3.265032","172.30.1.104","172.30.1.205","TCP","54","135 > 41484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7161","3.265041","172.30.1.104","172.30.1.205","TCP","54","135 > 41484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7162","3.265047","172.30.1.205","172.30.1.104","TCP","54","41484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7163","3.265185","172.30.1.104","172.30.1.205","TCP","66","49671 > 34122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7164","3.265193","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7165","3.265537","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7166","3.265824","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7167","3.265833","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7168","3.267689","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7169","3.268087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7170","3.268091","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7171","3.269470","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7172","3.270616","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7173","3.270626","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7174","3.271567","172.30.1.205","172.30.1.104","TCP","74","41488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906497 TSecr=0 WS=128" +"7175","3.271868","172.30.1.104","172.30.1.205","TCP","66","135 > 41488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7176","3.271879","172.30.1.205","172.30.1.104","TCP","54","41488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7177","3.272223","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7178","3.272506","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7179","3.272515","172.30.1.205","172.30.1.104","TCP","54","41488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7180","3.274711","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7181","3.275126","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7182","3.275133","172.30.1.205","172.30.1.104","TCP","54","41488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7183","3.276961","172.30.1.205","172.30.1.104","TCP","54","41488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7184","3.277072","172.30.1.205","172.30.1.104","TCP","74","34126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906503 TSecr=0 WS=128" +"7185","3.277332","172.30.1.104","172.30.1.205","TCP","54","135 > 41488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7186","3.277341","172.30.1.104","172.30.1.205","TCP","66","49671 > 34126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7187","3.277350","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7188","3.277393","172.30.1.104","172.30.1.205","TCP","54","135 > 41488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7189","3.277399","172.30.1.205","172.30.1.104","TCP","54","41488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7190","3.277719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7191","3.278050","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7192","3.278057","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7193","3.279898","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7194","3.280266","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7195","3.280272","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7196","3.281641","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7197","3.282758","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7198","3.282768","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7199","3.283696","172.30.1.205","172.30.1.104","TCP","74","41492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906510 TSecr=0 WS=128" +"7200","3.284009","172.30.1.104","172.30.1.205","TCP","66","135 > 41492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7201","3.284020","172.30.1.205","172.30.1.104","TCP","54","41492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7202","3.284365","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7203","3.284626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7204","3.284635","172.30.1.205","172.30.1.104","TCP","54","41492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7205","3.286861","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7206","3.287255","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7207","3.287263","172.30.1.205","172.30.1.104","TCP","54","41492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7208","3.289096","172.30.1.205","172.30.1.104","TCP","54","41492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7209","3.289206","172.30.1.205","172.30.1.104","TCP","74","34130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906515 TSecr=0 WS=128" +"7210","3.289389","172.30.1.104","172.30.1.205","TCP","54","135 > 41492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7211","3.289395","172.30.1.104","172.30.1.205","TCP","54","135 > 41492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7212","3.289400","172.30.1.205","172.30.1.104","TCP","54","41492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7213","3.289483","172.30.1.104","172.30.1.205","TCP","66","49671 > 34130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7214","3.289491","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7215","3.289835","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7216","3.290106","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7217","3.290115","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7218","3.291978","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7219","3.292316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7220","3.292323","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7221","3.293708","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7222","3.294853","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7223","3.294862","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7224","3.295794","172.30.1.205","172.30.1.104","TCP","74","41496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906522 TSecr=0 WS=128" +"7225","3.296091","172.30.1.104","172.30.1.205","TCP","66","135 > 41496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7226","3.296101","172.30.1.205","172.30.1.104","TCP","54","41496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7227","3.296448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7228","3.296717","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7229","3.296725","172.30.1.205","172.30.1.104","TCP","54","41496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7230","3.298920","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7231","3.299275","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7232","3.299281","172.30.1.205","172.30.1.104","TCP","54","41496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7233","3.301111","172.30.1.205","172.30.1.104","TCP","54","41496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7234","3.301221","172.30.1.205","172.30.1.104","TCP","74","34134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906527 TSecr=0 WS=128" +"7235","3.301350","172.30.1.104","172.30.1.205","TCP","54","135 > 41496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7236","3.301383","172.30.1.104","172.30.1.205","TCP","54","135 > 41496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7237","3.301389","172.30.1.205","172.30.1.104","TCP","54","41496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7238","3.301488","172.30.1.104","172.30.1.205","TCP","66","49671 > 34134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7239","3.301497","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7240","3.301840","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7241","3.302111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7242","3.302120","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7243","3.303983","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7244","3.304343","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7245","3.304349","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7246","3.305736","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7247","3.306910","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7248","3.306921","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7249","3.307865","172.30.1.205","172.30.1.104","TCP","74","41500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906534 TSecr=0 WS=128" +"7250","3.308157","172.30.1.104","172.30.1.205","TCP","66","135 > 41500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7251","3.308168","172.30.1.205","172.30.1.104","TCP","54","41500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7252","3.308514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7253","3.308792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7254","3.308801","172.30.1.205","172.30.1.104","TCP","54","41500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7255","3.310965","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7256","3.311335","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7257","3.311341","172.30.1.205","172.30.1.104","TCP","54","41500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7258","3.313156","172.30.1.205","172.30.1.104","TCP","54","41500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7259","3.313265","172.30.1.205","172.30.1.104","TCP","74","34138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906539 TSecr=0 WS=128" +"7260","3.313433","172.30.1.104","172.30.1.205","TCP","54","135 > 41500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7261","3.313441","172.30.1.104","172.30.1.205","TCP","54","135 > 41500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7262","3.313446","172.30.1.205","172.30.1.104","TCP","54","41500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7263","3.313560","172.30.1.104","172.30.1.205","TCP","66","49671 > 34138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7264","3.313569","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7265","3.313911","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7266","3.315297","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7267","3.315309","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7268","3.317216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7269","3.317551","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7270","3.317557","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7271","3.318890","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7272","3.320030","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7273","3.320039","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7274","3.320987","172.30.1.205","172.30.1.104","TCP","74","41504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906547 TSecr=0 WS=128" +"7275","3.321278","172.30.1.104","172.30.1.205","TCP","66","135 > 41504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7276","3.321289","172.30.1.205","172.30.1.104","TCP","54","41504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7277","3.321635","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7278","3.321905","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7279","3.321914","172.30.1.205","172.30.1.104","TCP","54","41504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7280","3.324065","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7281","3.324427","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7282","3.324434","172.30.1.205","172.30.1.104","TCP","54","41504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7283","3.326248","172.30.1.205","172.30.1.104","TCP","54","41504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7284","3.326358","172.30.1.205","172.30.1.104","TCP","74","34142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906552 TSecr=0 WS=128" +"7285","3.326534","172.30.1.104","172.30.1.205","TCP","54","135 > 41504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7286","3.326584","172.30.1.104","172.30.1.205","TCP","54","135 > 41504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7287","3.326589","172.30.1.205","172.30.1.104","TCP","54","41504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7288","3.326664","172.30.1.104","172.30.1.205","TCP","66","49671 > 34142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7289","3.326672","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7290","3.327013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7291","3.327293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7292","3.327301","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7293","3.329188","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7294","3.329566","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7295","3.329573","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7296","3.330906","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7297","3.332055","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7298","3.332064","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7299","3.333014","172.30.1.205","172.30.1.104","TCP","74","41508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906559 TSecr=0 WS=128" +"7300","3.333372","172.30.1.104","172.30.1.205","TCP","66","135 > 41508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7301","3.333383","172.30.1.205","172.30.1.104","TCP","54","41508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7302","3.333735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7303","3.334234","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7304","3.334243","172.30.1.205","172.30.1.104","TCP","54","41508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7305","3.336415","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7306","3.336792","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7307","3.336803","172.30.1.205","172.30.1.104","TCP","54","41508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7308","3.338603","172.30.1.205","172.30.1.104","TCP","54","41508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7309","3.338714","172.30.1.205","172.30.1.104","TCP","74","34146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906565 TSecr=0 WS=128" +"7310","3.338887","172.30.1.104","172.30.1.205","TCP","54","135 > 41508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7311","3.338932","172.30.1.104","172.30.1.205","TCP","54","135 > 41508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7312","3.338937","172.30.1.205","172.30.1.104","TCP","54","41508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7313","3.338987","172.30.1.104","172.30.1.205","TCP","66","49671 > 34146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7314","3.338995","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7315","3.339344","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7316","3.339701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7317","3.339708","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7318","3.341599","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7319","3.341973","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7320","3.341979","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7321","3.343307","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7322","3.344508","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7323","3.344517","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7324","3.345464","172.30.1.205","172.30.1.104","TCP","74","41512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906571 TSecr=0 WS=128" +"7325","3.345761","172.30.1.104","172.30.1.205","TCP","66","135 > 41512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7326","3.345772","172.30.1.205","172.30.1.104","TCP","54","41512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7327","3.346120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7328","3.346391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7329","3.346400","172.30.1.205","172.30.1.104","TCP","54","41512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7330","3.348578","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7331","3.349128","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7332","3.349135","172.30.1.205","172.30.1.104","TCP","54","41512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7333","3.351018","172.30.1.205","172.30.1.104","TCP","54","41512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7334","3.351128","172.30.1.205","172.30.1.104","TCP","74","34150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906577 TSecr=0 WS=128" +"7335","3.351268","172.30.1.104","172.30.1.205","TCP","54","135 > 41512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7336","3.351295","172.30.1.104","172.30.1.205","TCP","54","135 > 41512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7337","3.351300","172.30.1.205","172.30.1.104","TCP","54","41512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7338","3.351396","172.30.1.104","172.30.1.205","TCP","66","49671 > 34150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7339","3.351404","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7340","3.351756","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7341","3.352030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7342","3.352039","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7343","3.353968","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7344","3.354320","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7345","3.354327","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7346","3.355651","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7347","3.358789","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7348","3.358798","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7349","3.359761","172.30.1.205","172.30.1.104","TCP","74","41516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906586 TSecr=0 WS=128" +"7350","3.360077","172.30.1.104","172.30.1.205","TCP","66","135 > 41516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7351","3.360088","172.30.1.205","172.30.1.104","TCP","54","41516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7352","3.360434","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7353","3.360747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7354","3.360762","172.30.1.205","172.30.1.104","TCP","54","41516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7355","3.362952","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7356","3.363325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7357","3.363331","172.30.1.205","172.30.1.104","TCP","54","41516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7358","3.364164","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7359","3.364213","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7360","3.364250","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7361","3.364284","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7362","3.364315","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7363","3.364346","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7364","3.364374","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7365","3.364401","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7366","3.364429","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7367","3.364451","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7368","3.364472","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7369","3.364547","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7370","3.364602","172.30.1.104","172.30.1.205","TCP","54","49671 > 34110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7371","3.364611","172.30.1.104","172.30.1.205","TCP","54","49671 > 34114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7372","3.364614","172.30.1.104","172.30.1.205","TCP","54","49671 > 34110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7373","3.364621","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7374","3.364855","172.30.1.104","172.30.1.205","TCP","54","49671 > 34118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7375","3.364863","172.30.1.104","172.30.1.205","TCP","54","49671 > 34122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7376","3.365070","172.30.1.104","172.30.1.205","TCP","54","49671 > 34122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7377","3.365077","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7378","3.365083","172.30.1.104","172.30.1.205","TCP","54","49671 > 34114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7379","3.365086","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7380","3.365088","172.30.1.104","172.30.1.205","TCP","54","49671 > 34118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7381","3.365089","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7382","3.365094","172.30.1.104","172.30.1.205","TCP","54","49671 > 34126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7383","3.365100","172.30.1.104","172.30.1.205","TCP","54","49671 > 34130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7384","3.365102","172.30.1.104","172.30.1.205","TCP","54","49671 > 34130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7385","3.365104","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7386","3.365106","172.30.1.104","172.30.1.205","TCP","54","49671 > 34134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7387","3.365108","172.30.1.104","172.30.1.205","TCP","54","49671 > 34138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7388","3.365111","172.30.1.104","172.30.1.205","TCP","54","49671 > 34126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7389","3.365113","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7390","3.365128","172.30.1.104","172.30.1.205","TCP","54","49671 > 34142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7391","3.365131","172.30.1.104","172.30.1.205","TCP","54","49671 > 34142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7392","3.365133","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7393","3.365135","172.30.1.104","172.30.1.205","TCP","54","49671 > 34146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7394","3.365137","172.30.1.104","172.30.1.205","TCP","54","49671 > 34150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7395","3.365139","172.30.1.104","172.30.1.205","TCP","54","49671 > 34138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7396","3.365141","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7397","3.365184","172.30.1.104","172.30.1.205","TCP","54","49671 > 34150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7398","3.365188","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7399","3.365200","172.30.1.104","172.30.1.205","TCP","54","49671 > 34106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7400","3.365225","172.30.1.104","172.30.1.205","TCP","54","49671 > 34106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7401","3.365230","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7402","3.365246","172.30.1.104","172.30.1.205","TCP","54","49671 > 34146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7403","3.365249","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7404","3.365267","172.30.1.104","172.30.1.205","TCP","54","49671 > 34134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7405","3.365273","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7406","3.366034","172.30.1.205","172.30.1.104","TCP","54","41516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7407","3.366147","172.30.1.205","172.30.1.104","TCP","74","34154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906592 TSecr=0 WS=128" +"7408","3.366298","172.30.1.104","172.30.1.205","TCP","54","135 > 41516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7409","3.366323","172.30.1.104","172.30.1.205","TCP","54","135 > 41516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7410","3.366328","172.30.1.205","172.30.1.104","TCP","54","41516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7411","3.366444","172.30.1.104","172.30.1.205","TCP","66","49671 > 34154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7412","3.366452","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7413","3.366803","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7414","3.368346","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7415","3.368353","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7416","3.370258","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7417","3.370602","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7418","3.370608","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7419","3.371964","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7420","3.373334","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7421","3.373343","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7422","3.374296","172.30.1.205","172.30.1.104","TCP","74","41520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906600 TSecr=0 WS=128" +"7423","3.374605","172.30.1.104","172.30.1.205","TCP","66","135 > 41520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7424","3.374615","172.30.1.205","172.30.1.104","TCP","54","41520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7425","3.374968","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7426","3.375242","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7427","3.375251","172.30.1.205","172.30.1.104","TCP","54","41520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7428","3.377442","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7429","3.377812","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7430","3.377818","172.30.1.205","172.30.1.104","TCP","54","41520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7431","3.379643","172.30.1.205","172.30.1.104","TCP","54","41520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7432","3.379753","172.30.1.205","172.30.1.104","TCP","74","34158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906606 TSecr=0 WS=128" +"7433","3.379901","172.30.1.104","172.30.1.205","TCP","54","135 > 41520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7434","3.379937","172.30.1.104","172.30.1.205","TCP","54","135 > 41520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7435","3.379943","172.30.1.205","172.30.1.104","TCP","54","41520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7436","3.380051","172.30.1.104","172.30.1.205","TCP","66","49671 > 34158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7437","3.380059","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7438","3.380402","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7439","3.381913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7440","3.381922","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7441","3.383793","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7442","3.384168","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7443","3.384175","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7444","3.385547","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7445","3.386747","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7446","3.386757","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7447","3.387690","172.30.1.205","172.30.1.104","TCP","74","41524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906614 TSecr=0 WS=128" +"7448","3.388044","172.30.1.104","172.30.1.205","TCP","66","135 > 41524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7449","3.388055","172.30.1.205","172.30.1.104","TCP","54","41524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7450","3.388403","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7451","3.388695","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7452","3.388705","172.30.1.205","172.30.1.104","TCP","54","41524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7453","3.390898","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7454","3.391295","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7455","3.391302","172.30.1.205","172.30.1.104","TCP","54","41524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7456","3.393119","172.30.1.205","172.30.1.104","TCP","54","41524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7457","3.393228","172.30.1.205","172.30.1.104","TCP","74","34162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906619 TSecr=0 WS=128" +"7458","3.393367","172.30.1.104","172.30.1.205","TCP","54","135 > 41524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7459","3.393389","172.30.1.104","172.30.1.205","TCP","54","135 > 41524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7460","3.393394","172.30.1.205","172.30.1.104","TCP","54","41524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7461","3.393518","172.30.1.104","172.30.1.205","TCP","66","49671 > 34162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7462","3.393527","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7463","3.393867","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7464","3.394170","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7465","3.394179","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7466","3.396023","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7467","3.396382","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7468","3.396386","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7469","3.397750","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7470","3.398913","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7471","3.398923","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7472","3.399859","172.30.1.205","172.30.1.104","TCP","74","41528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906626 TSecr=0 WS=128" +"7473","3.400174","172.30.1.104","172.30.1.205","TCP","66","135 > 41528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7474","3.400185","172.30.1.205","172.30.1.104","TCP","54","41528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7475","3.400530","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7476","3.400817","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7477","3.400827","172.30.1.205","172.30.1.104","TCP","54","41528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7478","3.402997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7479","3.403629","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7480","3.403636","172.30.1.205","172.30.1.104","TCP","54","41528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7481","3.405456","172.30.1.205","172.30.1.104","TCP","54","41528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7482","3.405567","172.30.1.205","172.30.1.104","TCP","74","34166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906631 TSecr=0 WS=128" +"7483","3.405740","172.30.1.104","172.30.1.205","TCP","54","135 > 41528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7484","3.405772","172.30.1.104","172.30.1.205","TCP","54","135 > 41528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7485","3.405778","172.30.1.205","172.30.1.104","TCP","54","41528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7486","3.405856","172.30.1.104","172.30.1.205","TCP","66","49671 > 34166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7487","3.405864","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7488","3.406215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7489","3.406506","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7490","3.406517","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7491","3.408381","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7492","3.408739","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7493","3.408745","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7494","3.410123","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7495","3.411674","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7496","3.411684","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7497","3.412618","172.30.1.205","172.30.1.104","TCP","74","41532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906639 TSecr=0 WS=128" +"7498","3.412928","172.30.1.104","172.30.1.205","TCP","66","135 > 41532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7499","3.412940","172.30.1.205","172.30.1.104","TCP","54","41532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7500","3.413292","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7501","3.413594","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7502","3.413604","172.30.1.205","172.30.1.104","TCP","54","41532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7503","3.415782","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7504","3.416145","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7505","3.416152","172.30.1.205","172.30.1.104","TCP","54","41532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7506","3.417965","172.30.1.205","172.30.1.104","TCP","54","41532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7507","3.418078","172.30.1.205","172.30.1.104","TCP","74","34170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906644 TSecr=0 WS=128" +"7508","3.418246","172.30.1.104","172.30.1.205","TCP","54","135 > 41532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7509","3.418261","172.30.1.104","172.30.1.205","TCP","54","135 > 41532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7510","3.418266","172.30.1.205","172.30.1.104","TCP","54","41532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7511","3.418357","172.30.1.104","172.30.1.205","TCP","66","49671 > 34170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7512","3.418365","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7513","3.418706","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7514","3.418985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7515","3.418994","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7516","3.420882","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7517","3.421255","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7518","3.421262","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7519","3.422615","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7520","3.423792","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7521","3.423801","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7522","3.424724","172.30.1.205","172.30.1.104","TCP","74","41536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906651 TSecr=0 WS=128" +"7523","3.425022","172.30.1.104","172.30.1.205","TCP","66","135 > 41536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7524","3.425033","172.30.1.205","172.30.1.104","TCP","54","41536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7525","3.425392","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7526","3.425656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7527","3.425664","172.30.1.205","172.30.1.104","TCP","54","41536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7528","3.427837","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7529","3.428211","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7530","3.428217","172.30.1.205","172.30.1.104","TCP","54","41536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7531","3.430047","172.30.1.205","172.30.1.104","TCP","54","41536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7532","3.430159","172.30.1.205","172.30.1.104","TCP","74","34174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906656 TSecr=0 WS=128" +"7533","3.430309","172.30.1.104","172.30.1.205","TCP","54","135 > 41536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7534","3.430318","172.30.1.104","172.30.1.205","TCP","54","135 > 41536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7535","3.430323","172.30.1.205","172.30.1.104","TCP","54","41536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7536","3.430459","172.30.1.104","172.30.1.205","TCP","66","49671 > 34174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7537","3.430468","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7538","3.430830","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7539","3.431108","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7540","3.431117","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7541","3.433003","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7542","3.433447","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7543","3.433454","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7544","3.434794","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7545","3.436000","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7546","3.436010","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7547","3.436952","172.30.1.205","172.30.1.104","TCP","74","41540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906663 TSecr=0 WS=128" +"7548","3.437241","172.30.1.104","172.30.1.205","TCP","66","135 > 41540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7549","3.437251","172.30.1.205","172.30.1.104","TCP","54","41540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7550","3.437597","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7551","3.437881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7552","3.437891","172.30.1.205","172.30.1.104","TCP","54","41540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7553","3.440078","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7554","3.440481","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7555","3.440488","172.30.1.205","172.30.1.104","TCP","54","41540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7556","3.442314","172.30.1.205","172.30.1.104","TCP","54","41540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7557","3.442426","172.30.1.205","172.30.1.104","TCP","74","34178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906668 TSecr=0 WS=128" +"7558","3.442571","172.30.1.104","172.30.1.205","TCP","54","135 > 41540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7559","3.442615","172.30.1.104","172.30.1.205","TCP","54","135 > 41540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7560","3.442620","172.30.1.205","172.30.1.104","TCP","54","41540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7561","3.442690","172.30.1.104","172.30.1.205","TCP","66","49671 > 34178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7562","3.442699","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7563","3.443046","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7564","3.443317","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7565","3.443326","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7566","3.445260","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7567","3.446667","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7568","3.446677","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7569","3.448138","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7570","3.449415","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7571","3.449425","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7572","3.450393","172.30.1.205","172.30.1.104","TCP","74","41544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906676 TSecr=0 WS=128" +"7573","3.450692","172.30.1.104","172.30.1.205","TCP","66","135 > 41544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7574","3.450703","172.30.1.205","172.30.1.104","TCP","54","41544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7575","3.451066","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7576","3.451371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7577","3.451381","172.30.1.205","172.30.1.104","TCP","54","41544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7578","3.453610","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7579","3.454192","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7580","3.454199","172.30.1.205","172.30.1.104","TCP","54","41544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7581","3.456021","172.30.1.205","172.30.1.104","TCP","54","41544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7582","3.456134","172.30.1.205","172.30.1.104","TCP","74","34182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906682 TSecr=0 WS=128" +"7583","3.456289","172.30.1.104","172.30.1.205","TCP","54","135 > 41544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7584","3.456318","172.30.1.104","172.30.1.205","TCP","54","135 > 41544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7585","3.456324","172.30.1.205","172.30.1.104","TCP","54","41544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7586","3.456407","172.30.1.104","172.30.1.205","TCP","66","49671 > 34182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7587","3.456414","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7588","3.456889","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7589","3.457183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7590","3.457193","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7591","3.459082","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7592","3.459478","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7593","3.459485","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7594","3.460873","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7595","3.462046","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7596","3.462057","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7597","3.463005","172.30.1.205","172.30.1.104","TCP","74","41548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906689 TSecr=0 WS=128" +"7598","3.463295","172.30.1.104","172.30.1.205","TCP","66","135 > 41548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7599","3.463306","172.30.1.205","172.30.1.104","TCP","54","41548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7600","3.463655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7601","3.463986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7602","3.463995","172.30.1.205","172.30.1.104","TCP","54","41548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7603","3.466211","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7604","3.466589","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7605","3.466595","172.30.1.205","172.30.1.104","TCP","54","41548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7606","3.468389","172.30.1.205","172.30.1.104","TCP","54","41548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7607","3.468501","172.30.1.205","172.30.1.104","TCP","74","34186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906694 TSecr=0 WS=128" +"7608","3.468673","172.30.1.104","172.30.1.205","TCP","54","135 > 41548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7609","3.468697","172.30.1.104","172.30.1.205","TCP","54","135 > 41548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7610","3.468702","172.30.1.205","172.30.1.104","TCP","54","41548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7611","3.468791","172.30.1.104","172.30.1.205","TCP","66","49671 > 34186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7612","3.468801","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7613","3.469157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7614","3.469473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7615","3.469483","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7616","3.471346","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7617","3.471716","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7618","3.471722","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7619","3.473125","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7620","3.474298","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7621","3.474308","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7622","3.475229","172.30.1.205","172.30.1.104","TCP","74","41552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906701 TSecr=0 WS=128" +"7623","3.475513","172.30.1.104","172.30.1.205","TCP","66","135 > 41552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7624","3.475524","172.30.1.205","172.30.1.104","TCP","54","41552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7625","3.475868","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7626","3.476133","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7627","3.476142","172.30.1.205","172.30.1.104","TCP","54","41552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7628","3.478346","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7629","3.478716","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7630","3.478723","172.30.1.205","172.30.1.104","TCP","54","41552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7631","3.480525","172.30.1.205","172.30.1.104","TCP","54","41552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7632","3.480644","172.30.1.205","172.30.1.104","TCP","74","34190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906707 TSecr=0 WS=128" +"7633","3.480765","172.30.1.104","172.30.1.205","TCP","54","135 > 41552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7634","3.480819","172.30.1.104","172.30.1.205","TCP","54","135 > 41552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7635","3.480825","172.30.1.205","172.30.1.104","TCP","54","41552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7636","3.480925","172.30.1.104","172.30.1.205","TCP","66","49671 > 34190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7637","3.480933","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7638","3.481295","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7639","3.481580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7640","3.481589","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7641","3.483444","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7642","3.483798","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7643","3.483805","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7644","3.485178","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7645","3.486425","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7646","3.486435","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7647","3.487358","172.30.1.205","172.30.1.104","TCP","74","41556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906713 TSecr=0 WS=128" +"7648","3.487653","172.30.1.104","172.30.1.205","TCP","66","135 > 41556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7649","3.487664","172.30.1.205","172.30.1.104","TCP","54","41556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7650","3.488014","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7651","3.488293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7652","3.488302","172.30.1.205","172.30.1.104","TCP","54","41556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7653","3.490535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7654","3.490905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7655","3.490912","172.30.1.205","172.30.1.104","TCP","54","41556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7656","3.492814","172.30.1.205","172.30.1.104","TCP","54","41556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7657","3.492924","172.30.1.205","172.30.1.104","TCP","74","34194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906719 TSecr=0 WS=128" +"7658","3.493065","172.30.1.104","172.30.1.205","TCP","54","135 > 41556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7659","3.493089","172.30.1.104","172.30.1.205","TCP","54","135 > 41556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7660","3.493095","172.30.1.205","172.30.1.104","TCP","54","41556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7661","3.493182","172.30.1.104","172.30.1.205","TCP","66","49671 > 34194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7662","3.493191","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7663","3.493562","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7664","3.493842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7665","3.493851","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7666","3.495729","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7667","3.496088","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7668","3.496095","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7669","3.497457","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7670","3.499957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7671","3.499967","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7672","3.500904","172.30.1.205","172.30.1.104","TCP","74","41560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906727 TSecr=0 WS=128" +"7673","3.501191","172.30.1.104","172.30.1.205","TCP","66","135 > 41560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7674","3.501202","172.30.1.205","172.30.1.104","TCP","54","41560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7675","3.501549","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7676","3.501844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7677","3.501853","172.30.1.205","172.30.1.104","TCP","54","41560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7678","3.504023","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7679","3.504396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7680","3.504402","172.30.1.205","172.30.1.104","TCP","54","41560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7681","3.506220","172.30.1.205","172.30.1.104","TCP","54","41560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7682","3.506331","172.30.1.205","172.30.1.104","TCP","74","34198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906732 TSecr=0 WS=128" +"7683","3.506472","172.30.1.104","172.30.1.205","TCP","54","135 > 41560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7684","3.506513","172.30.1.104","172.30.1.205","TCP","54","135 > 41560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7685","3.506518","172.30.1.205","172.30.1.104","TCP","54","41560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7686","3.506603","172.30.1.104","172.30.1.205","TCP","66","49671 > 34198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7687","3.506612","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7688","3.506956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7689","3.507270","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7690","3.507279","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7691","3.509170","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7692","3.509547","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7693","3.509554","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7694","3.510889","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7695","3.512115","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7696","3.512125","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7697","3.513080","172.30.1.205","172.30.1.104","TCP","74","41564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906739 TSecr=0 WS=128" +"7698","3.513380","172.30.1.104","172.30.1.205","TCP","66","135 > 41564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7699","3.513391","172.30.1.205","172.30.1.104","TCP","54","41564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7700","3.513740","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7701","3.514020","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7702","3.514029","172.30.1.205","172.30.1.104","TCP","54","41564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7703","3.516199","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7704","3.516609","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7705","3.516619","172.30.1.205","172.30.1.104","TCP","54","41564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7706","3.517563","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7707","3.517615","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7708","3.517655","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7709","3.517691","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7710","3.517719","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7711","3.517753","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7712","3.517780","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7713","3.517807","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7714","3.517834","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7715","3.517853","172.30.1.104","172.30.1.205","TCP","54","49671 > 34158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7716","3.517883","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7717","3.517913","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7718","3.517929","172.30.1.104","172.30.1.205","TCP","54","49671 > 34162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7719","3.517954","172.30.1.104","172.30.1.205","TCP","54","49671 > 34166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7720","3.517982","172.30.1.104","172.30.1.205","TCP","54","49671 > 34158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7721","3.517989","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7722","3.518008","172.30.1.104","172.30.1.205","TCP","54","49671 > 34162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7723","3.518012","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7724","3.518037","172.30.1.104","172.30.1.205","TCP","54","49671 > 34170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7725","3.518047","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7726","3.518065","172.30.1.104","172.30.1.205","TCP","54","49671 > 34174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7727","3.518198","172.30.1.104","172.30.1.205","TCP","54","49671 > 34178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7728","3.518222","172.30.1.104","172.30.1.205","TCP","54","49671 > 34178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7729","3.518228","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7730","3.518250","172.30.1.104","172.30.1.205","TCP","54","49671 > 34174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7731","3.518253","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7732","3.518278","172.30.1.104","172.30.1.205","TCP","54","49671 > 34166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7733","3.518281","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7734","3.518305","172.30.1.104","172.30.1.205","TCP","54","49671 > 34170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7735","3.518307","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7736","3.518332","172.30.1.104","172.30.1.205","TCP","54","49671 > 34182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7737","3.518358","172.30.1.104","172.30.1.205","TCP","54","49671 > 34182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7738","3.518363","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7739","3.518384","172.30.1.104","172.30.1.205","TCP","54","49671 > 34186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7740","3.518412","172.30.1.104","172.30.1.205","TCP","54","49671 > 34186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7741","3.518417","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7742","3.518704","172.30.1.104","172.30.1.205","TCP","54","49671 > 34190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7743","3.518727","172.30.1.104","172.30.1.205","TCP","54","49671 > 34190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7744","3.518733","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7745","3.518756","172.30.1.104","172.30.1.205","TCP","54","49671 > 34194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7746","3.518783","172.30.1.104","172.30.1.205","TCP","54","49671 > 34198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7747","3.518809","172.30.1.104","172.30.1.205","TCP","54","49671 > 34194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7748","3.518813","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7749","3.518837","172.30.1.104","172.30.1.205","TCP","54","49671 > 34154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7750","3.518910","172.30.1.104","172.30.1.205","TCP","54","49671 > 34198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7751","3.518914","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7752","3.518936","172.30.1.104","172.30.1.205","TCP","54","49671 > 34154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"7753","3.518939","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"7754","3.519596","172.30.1.205","172.30.1.104","TCP","54","41564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7755","3.519716","172.30.1.205","172.30.1.104","TCP","74","34202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906746 TSecr=0 WS=128" +"7756","3.519836","172.30.1.104","172.30.1.205","TCP","54","135 > 41564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7757","3.519860","172.30.1.104","172.30.1.205","TCP","54","135 > 41564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7758","3.519865","172.30.1.205","172.30.1.104","TCP","54","41564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7759","3.520016","172.30.1.104","172.30.1.205","TCP","66","49671 > 34202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7760","3.520024","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7761","3.520388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7762","3.520669","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7763","3.520679","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7764","3.522586","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7765","3.522950","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7766","3.522956","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7767","3.524314","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7768","3.525552","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7769","3.525562","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7770","3.526512","172.30.1.205","172.30.1.104","TCP","74","41568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906752 TSecr=0 WS=128" +"7771","3.526809","172.30.1.104","172.30.1.205","TCP","66","135 > 41568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7772","3.526820","172.30.1.205","172.30.1.104","TCP","54","41568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7773","3.527168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7774","3.527498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7775","3.527507","172.30.1.205","172.30.1.104","TCP","54","41568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7776","3.529784","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7777","3.530179","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7778","3.530186","172.30.1.205","172.30.1.104","TCP","54","41568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7779","3.531984","172.30.1.205","172.30.1.104","TCP","54","41568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7780","3.532095","172.30.1.205","172.30.1.104","TCP","74","34206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906758 TSecr=0 WS=128" +"7781","3.532245","172.30.1.104","172.30.1.205","TCP","54","135 > 41568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7782","3.532268","172.30.1.104","172.30.1.205","TCP","54","135 > 41568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7783","3.532273","172.30.1.205","172.30.1.104","TCP","54","41568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7784","3.532365","172.30.1.104","172.30.1.205","TCP","66","49671 > 34206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7785","3.532382","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7786","3.532807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7787","3.533070","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7788","3.533080","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7789","3.534972","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7790","3.535316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7791","3.535322","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7792","3.536657","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7793","3.537882","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7794","3.537892","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7795","3.538827","172.30.1.205","172.30.1.104","TCP","74","41572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906765 TSecr=0 WS=128" +"7796","3.539109","172.30.1.104","172.30.1.205","TCP","66","135 > 41572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7797","3.539119","172.30.1.205","172.30.1.104","TCP","54","41572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7798","3.539471","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7799","3.539751","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7800","3.539761","172.30.1.205","172.30.1.104","TCP","54","41572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7801","3.541958","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7802","3.542326","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7803","3.542333","172.30.1.205","172.30.1.104","TCP","54","41572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7804","3.544112","172.30.1.205","172.30.1.104","TCP","54","41572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7805","3.544221","172.30.1.205","172.30.1.104","TCP","74","34210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906770 TSecr=0 WS=128" +"7806","3.544367","172.30.1.104","172.30.1.205","TCP","54","135 > 41572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7807","3.544402","172.30.1.104","172.30.1.205","TCP","54","135 > 41572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7808","3.544408","172.30.1.205","172.30.1.104","TCP","54","41572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7809","3.544483","172.30.1.104","172.30.1.205","TCP","66","49671 > 34210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7810","3.544491","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7811","3.544863","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7812","3.545132","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7813","3.545140","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7814","3.546980","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7815","3.547372","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7816","3.547377","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7817","3.548724","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7818","3.550477","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7819","3.550486","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7820","3.551422","172.30.1.205","172.30.1.104","TCP","74","41576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906777 TSecr=0 WS=128" +"7821","3.551751","172.30.1.104","172.30.1.205","TCP","66","135 > 41576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7822","3.551767","172.30.1.205","172.30.1.104","TCP","54","41576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7823","3.552110","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7824","3.552393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7825","3.552401","172.30.1.205","172.30.1.104","TCP","54","41576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7826","3.554594","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7827","3.554972","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7828","3.554978","172.30.1.205","172.30.1.104","TCP","54","41576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7829","3.556803","172.30.1.205","172.30.1.104","TCP","54","41576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7830","3.556922","172.30.1.205","172.30.1.104","TCP","74","34214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906783 TSecr=0 WS=128" +"7831","3.557104","172.30.1.104","172.30.1.205","TCP","54","135 > 41576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7832","3.557113","172.30.1.104","172.30.1.205","TCP","54","135 > 41576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7833","3.557118","172.30.1.205","172.30.1.104","TCP","54","41576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7834","3.557221","172.30.1.104","172.30.1.205","TCP","66","49671 > 34214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7835","3.557229","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7836","3.557569","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7837","3.557850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7838","3.557859","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7839","3.559732","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7840","3.560092","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7841","3.560098","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7842","3.561460","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7843","3.562644","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7844","3.562653","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7845","3.563574","172.30.1.205","172.30.1.104","TCP","74","41580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906789 TSecr=0 WS=128" +"7846","3.563830","172.30.1.104","172.30.1.205","TCP","66","135 > 41580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7847","3.563841","172.30.1.205","172.30.1.104","TCP","54","41580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7848","3.564185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7849","3.564459","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7850","3.564468","172.30.1.205","172.30.1.104","TCP","54","41580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7851","3.566653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7852","3.567004","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7853","3.567011","172.30.1.205","172.30.1.104","TCP","54","41580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7854","3.568819","172.30.1.205","172.30.1.104","TCP","54","41580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7855","3.568934","172.30.1.205","172.30.1.104","TCP","74","34218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906795 TSecr=0 WS=128" +"7856","3.569092","172.30.1.104","172.30.1.205","TCP","54","135 > 41580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7857","3.569131","172.30.1.104","172.30.1.205","TCP","54","135 > 41580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7858","3.569137","172.30.1.205","172.30.1.104","TCP","54","41580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7859","3.569209","172.30.1.104","172.30.1.205","TCP","66","49671 > 34218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7860","3.569217","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7861","3.569556","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7862","3.569834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7863","3.569843","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7864","3.571699","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7865","3.572047","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7866","3.572053","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7867","3.573421","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7868","3.574710","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7869","3.574719","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7870","3.575643","172.30.1.205","172.30.1.104","TCP","74","41584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906802 TSecr=0 WS=128" +"7871","3.575926","172.30.1.104","172.30.1.205","TCP","66","135 > 41584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7872","3.575937","172.30.1.205","172.30.1.104","TCP","54","41584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7873","3.576282","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7874","3.576560","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7875","3.576568","172.30.1.205","172.30.1.104","TCP","54","41584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7876","3.578743","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7877","3.579120","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7878","3.579127","172.30.1.205","172.30.1.104","TCP","54","41584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7879","3.580942","172.30.1.205","172.30.1.104","TCP","54","41584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7880","3.581049","172.30.1.205","172.30.1.104","TCP","74","34222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906807 TSecr=0 WS=128" +"7881","3.581225","172.30.1.104","172.30.1.205","TCP","54","135 > 41584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7882","3.581247","172.30.1.104","172.30.1.205","TCP","54","135 > 41584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7883","3.581252","172.30.1.205","172.30.1.104","TCP","54","41584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7884","3.581335","172.30.1.104","172.30.1.205","TCP","66","49671 > 34222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7885","3.581343","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7886","3.581684","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7887","3.582433","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7888","3.582440","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7889","3.584282","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7890","3.584714","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7891","3.584720","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7892","3.586070","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7893","3.587266","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7894","3.587275","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7895","3.588187","172.30.1.205","172.30.1.104","TCP","74","41588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906814 TSecr=0 WS=128" +"7896","3.588526","172.30.1.104","172.30.1.205","TCP","66","135 > 41588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7897","3.588536","172.30.1.205","172.30.1.104","TCP","54","41588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7898","3.588907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7899","3.589189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7900","3.589198","172.30.1.205","172.30.1.104","TCP","54","41588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7901","3.591378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7902","3.591777","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7903","3.591784","172.30.1.205","172.30.1.104","TCP","54","41588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7904","3.593688","172.30.1.205","172.30.1.104","TCP","54","41588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7905","3.593797","172.30.1.205","172.30.1.104","TCP","74","34226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906820 TSecr=0 WS=128" +"7906","3.593965","172.30.1.104","172.30.1.205","TCP","54","135 > 41588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7907","3.593988","172.30.1.104","172.30.1.205","TCP","54","135 > 41588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7908","3.593993","172.30.1.205","172.30.1.104","TCP","54","41588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7909","3.594107","172.30.1.104","172.30.1.205","TCP","66","49671 > 34226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7910","3.594115","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7911","3.594457","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7912","3.594776","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7913","3.594785","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7914","3.596656","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7915","3.597023","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7916","3.597030","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7917","3.598385","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7918","3.599593","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7919","3.599602","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7920","3.600520","172.30.1.205","172.30.1.104","TCP","74","41592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906826 TSecr=0 WS=128" +"7921","3.600833","172.30.1.104","172.30.1.205","TCP","66","135 > 41592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7922","3.600843","172.30.1.205","172.30.1.104","TCP","54","41592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7923","3.601200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7924","3.601489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7925","3.601498","172.30.1.205","172.30.1.104","TCP","54","41592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7926","3.603672","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7927","3.604043","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7928","3.604049","172.30.1.205","172.30.1.104","TCP","54","41592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7929","3.605867","172.30.1.205","172.30.1.104","TCP","54","41592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7930","3.605979","172.30.1.205","172.30.1.104","TCP","74","34230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906832 TSecr=0 WS=128" +"7931","3.606135","172.30.1.104","172.30.1.205","TCP","54","135 > 41592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7932","3.606169","172.30.1.104","172.30.1.205","TCP","54","135 > 41592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7933","3.606176","172.30.1.205","172.30.1.104","TCP","54","41592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7934","3.606226","172.30.1.104","172.30.1.205","TCP","66","49671 > 34230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7935","3.606237","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7936","3.606618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7937","3.607334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7938","3.607346","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7939","3.609295","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7940","3.609644","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7941","3.609651","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7942","3.611012","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7943","3.612167","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7944","3.612177","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7945","3.613165","172.30.1.205","172.30.1.104","TCP","74","41596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906839 TSecr=0 WS=128" +"7946","3.613456","172.30.1.104","172.30.1.205","TCP","66","135 > 41596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7947","3.613467","172.30.1.205","172.30.1.104","TCP","54","41596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7948","3.613815","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7949","3.614087","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7950","3.614096","172.30.1.205","172.30.1.104","TCP","54","41596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7951","3.616258","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7952","3.616656","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7953","3.616663","172.30.1.205","172.30.1.104","TCP","54","41596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7954","3.618481","172.30.1.205","172.30.1.104","TCP","54","41596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7955","3.618595","172.30.1.205","172.30.1.104","TCP","74","34234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906845 TSecr=0 WS=128" +"7956","3.618773","172.30.1.104","172.30.1.205","TCP","54","135 > 41596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7957","3.618806","172.30.1.104","172.30.1.205","TCP","54","135 > 41596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7958","3.618812","172.30.1.205","172.30.1.104","TCP","54","41596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7959","3.618906","172.30.1.104","172.30.1.205","TCP","66","49671 > 34234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7960","3.618914","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7961","3.619266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7962","3.619554","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7963","3.619563","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7964","3.621468","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7965","3.621819","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7966","3.621831","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7967","3.623265","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7968","3.624443","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7969","3.624455","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7970","3.625455","172.30.1.205","172.30.1.104","TCP","74","41600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906851 TSecr=0 WS=128" +"7971","3.625755","172.30.1.104","172.30.1.205","TCP","66","135 > 41600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7972","3.625766","172.30.1.205","172.30.1.104","TCP","54","41600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7973","3.626122","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7974","3.626399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7975","3.626408","172.30.1.205","172.30.1.104","TCP","54","41600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7976","3.628584","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"7977","3.628956","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"7978","3.628963","172.30.1.205","172.30.1.104","TCP","54","41600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7979","3.630770","172.30.1.205","172.30.1.104","TCP","54","41600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"7980","3.630883","172.30.1.205","172.30.1.104","TCP","74","34238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906857 TSecr=0 WS=128" +"7981","3.631031","172.30.1.104","172.30.1.205","TCP","54","135 > 41600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7982","3.631086","172.30.1.104","172.30.1.205","TCP","54","135 > 41600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"7983","3.631092","172.30.1.205","172.30.1.104","TCP","54","41600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"7984","3.631161","172.30.1.104","172.30.1.205","TCP","66","49671 > 34238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7985","3.631169","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7986","3.631513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"7987","3.633100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"7988","3.633110","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"7989","3.634980","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"7990","3.635373","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"7991","3.635383","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"7992","3.636854","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"7993","3.638085","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"7994","3.638097","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"7995","3.639060","172.30.1.205","172.30.1.104","TCP","74","41604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906865 TSecr=0 WS=128" +"7996","3.639350","172.30.1.104","172.30.1.205","TCP","66","135 > 41604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"7997","3.639362","172.30.1.205","172.30.1.104","TCP","54","41604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"7998","3.639714","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"7999","3.639993","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8000","3.640002","172.30.1.205","172.30.1.104","TCP","54","41604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8001","3.642232","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8002","3.642699","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8003","3.642706","172.30.1.205","172.30.1.104","TCP","54","41604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8004","3.644506","172.30.1.205","172.30.1.104","TCP","54","41604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8005","3.644621","172.30.1.205","172.30.1.104","TCP","74","34242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906871 TSecr=0 WS=128" +"8006","3.644826","172.30.1.104","172.30.1.205","TCP","54","135 > 41604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8007","3.644836","172.30.1.104","172.30.1.205","TCP","54","135 > 41604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8008","3.644843","172.30.1.205","172.30.1.104","TCP","54","41604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8009","3.644918","172.30.1.104","172.30.1.205","TCP","66","49671 > 34242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8010","3.644927","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8011","3.645284","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8012","3.645611","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8013","3.645620","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8014","3.647509","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8015","3.647879","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8016","3.647885","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8017","3.649260","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8018","3.650490","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8019","3.650499","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8020","3.651429","172.30.1.205","172.30.1.104","TCP","74","41608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906877 TSecr=0 WS=128" +"8021","3.651736","172.30.1.104","172.30.1.205","TCP","66","135 > 41608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8022","3.651747","172.30.1.205","172.30.1.104","TCP","54","41608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8023","3.652098","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8024","3.652377","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8025","3.652386","172.30.1.205","172.30.1.104","TCP","54","41608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8026","3.654592","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8027","3.654957","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8028","3.654964","172.30.1.205","172.30.1.104","TCP","54","41608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8029","3.656768","172.30.1.205","172.30.1.104","TCP","54","41608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8030","3.656890","172.30.1.205","172.30.1.104","TCP","74","34246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906883 TSecr=0 WS=128" +"8031","3.657080","172.30.1.104","172.30.1.205","TCP","54","135 > 41608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8032","3.657111","172.30.1.104","172.30.1.205","TCP","54","135 > 41608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8033","3.657117","172.30.1.205","172.30.1.104","TCP","54","41608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8034","3.657187","172.30.1.104","172.30.1.205","TCP","66","49671 > 34246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8035","3.657196","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8036","3.657540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8037","3.657805","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8038","3.657811","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8039","3.659661","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8040","3.660073","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8041","3.660080","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8042","3.661448","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8043","3.662672","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8044","3.662686","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8045","3.663697","172.30.1.205","172.30.1.104","TCP","74","41612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906890 TSecr=0 WS=128" +"8046","3.664008","172.30.1.104","172.30.1.205","TCP","66","135 > 41612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8047","3.664020","172.30.1.205","172.30.1.104","TCP","54","41612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8048","3.664375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8049","3.664643","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8050","3.664653","172.30.1.205","172.30.1.104","TCP","54","41612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8051","3.666867","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8052","3.667234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8053","3.667241","172.30.1.205","172.30.1.104","TCP","54","41612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8054","3.668063","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8055","3.668110","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8056","3.668148","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8057","3.668183","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8058","3.668215","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8059","3.668249","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8060","3.668271","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8061","3.668297","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8062","3.668323","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8063","3.668344","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8064","3.668365","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8065","3.668442","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8066","3.668625","172.30.1.104","172.30.1.205","TCP","54","49671 > 34206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8067","3.668635","172.30.1.104","172.30.1.205","TCP","54","49671 > 34210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8068","3.668637","172.30.1.104","172.30.1.205","TCP","54","49671 > 34210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8069","3.668644","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8070","3.668651","172.30.1.104","172.30.1.205","TCP","54","49671 > 34214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8071","3.668655","172.30.1.104","172.30.1.205","TCP","54","49671 > 34218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8072","3.668669","172.30.1.104","172.30.1.205","TCP","54","49671 > 34206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8073","3.668672","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8074","3.668673","172.30.1.104","172.30.1.205","TCP","54","49671 > 34218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8075","3.668675","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8076","3.668676","172.30.1.104","172.30.1.205","TCP","54","49671 > 34214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8077","3.668678","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8078","3.668680","172.30.1.104","172.30.1.205","TCP","54","49671 > 34222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8079","3.668683","172.30.1.104","172.30.1.205","TCP","54","49671 > 34226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8080","3.668788","172.30.1.104","172.30.1.205","TCP","54","49671 > 34222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8081","3.668794","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8082","3.668814","172.30.1.104","172.30.1.205","TCP","54","49671 > 34230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8083","3.668829","172.30.1.104","172.30.1.205","TCP","54","49671 > 34226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8084","3.668832","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8085","3.668849","172.30.1.104","172.30.1.205","TCP","54","49671 > 34230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8086","3.668852","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8087","3.668870","172.30.1.104","172.30.1.205","TCP","54","49671 > 34234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8088","3.668890","172.30.1.104","172.30.1.205","TCP","54","49671 > 34238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8089","3.668909","172.30.1.104","172.30.1.205","TCP","54","49671 > 34242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8090","3.668931","172.30.1.104","172.30.1.205","TCP","54","49671 > 34246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8091","3.668951","172.30.1.104","172.30.1.205","TCP","54","49671 > 34246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8092","3.668954","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8093","3.669062","172.30.1.104","172.30.1.205","TCP","54","49671 > 34202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8094","3.669081","172.30.1.104","172.30.1.205","TCP","54","49671 > 34242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8095","3.669086","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8096","3.669103","172.30.1.104","172.30.1.205","TCP","54","49671 > 34234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8097","3.669106","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8098","3.669125","172.30.1.104","172.30.1.205","TCP","54","49671 > 34202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8099","3.669127","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8100","3.669145","172.30.1.104","172.30.1.205","TCP","54","49671 > 34238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8101","3.669147","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8102","3.670066","172.30.1.205","172.30.1.104","TCP","54","41612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8103","3.670176","172.30.1.205","172.30.1.104","TCP","74","34250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906896 TSecr=0 WS=128" +"8104","3.670334","172.30.1.104","172.30.1.205","TCP","54","135 > 41612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8105","3.670358","172.30.1.104","172.30.1.205","TCP","54","135 > 41612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8106","3.670363","172.30.1.205","172.30.1.104","TCP","54","41612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8107","3.670440","172.30.1.104","172.30.1.205","TCP","66","49671 > 34250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8108","3.670448","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8109","3.670802","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8110","3.671116","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8111","3.671125","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8112","3.673038","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8113","3.673730","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8114","3.673737","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8115","3.675073","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8116","3.676309","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8117","3.676322","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8118","3.677353","172.30.1.205","172.30.1.104","TCP","74","41616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906903 TSecr=0 WS=128" +"8119","3.677656","172.30.1.104","172.30.1.205","TCP","66","135 > 41616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8120","3.677667","172.30.1.205","172.30.1.104","TCP","54","41616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8121","3.678031","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8122","3.678332","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8123","3.678345","172.30.1.205","172.30.1.104","TCP","54","41616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8124","3.680588","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8125","3.681002","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8126","3.681009","172.30.1.205","172.30.1.104","TCP","54","41616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8127","3.682816","172.30.1.205","172.30.1.104","TCP","54","41616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8128","3.682936","172.30.1.205","172.30.1.104","TCP","74","34254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906909 TSecr=0 WS=128" +"8129","3.683156","172.30.1.104","172.30.1.205","TCP","54","135 > 41616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8130","3.683191","172.30.1.104","172.30.1.205","TCP","54","135 > 41616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8131","3.683197","172.30.1.205","172.30.1.104","TCP","54","41616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8132","3.683233","172.30.1.104","172.30.1.205","TCP","66","49671 > 34254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8133","3.683241","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8134","3.683583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8135","3.683904","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8136","3.683913","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8137","3.685807","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8138","3.686185","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8139","3.686192","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8140","3.687561","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8141","3.688740","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8142","3.688750","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8143","3.689700","172.30.1.205","172.30.1.104","TCP","74","41620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906916 TSecr=0 WS=128" +"8144","3.689990","172.30.1.104","172.30.1.205","TCP","66","135 > 41620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8145","3.690001","172.30.1.205","172.30.1.104","TCP","54","41620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8146","3.690349","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8147","3.690639","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8148","3.690648","172.30.1.205","172.30.1.104","TCP","54","41620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8149","3.692848","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8150","3.693242","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8151","3.693251","172.30.1.205","172.30.1.104","TCP","54","41620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8152","3.695119","172.30.1.205","172.30.1.104","TCP","54","41620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8153","3.695239","172.30.1.205","172.30.1.104","TCP","74","34258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906921 TSecr=0 WS=128" +"8154","3.695383","172.30.1.104","172.30.1.205","TCP","54","135 > 41620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8155","3.695406","172.30.1.104","172.30.1.205","TCP","54","135 > 41620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8156","3.695412","172.30.1.205","172.30.1.104","TCP","54","41620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8157","3.695534","172.30.1.104","172.30.1.205","TCP","66","49671 > 34258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8158","3.695542","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8159","3.695886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8160","3.696195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8161","3.696206","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8162","3.698124","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8163","3.698524","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8164","3.698530","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8165","3.699869","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8166","3.701071","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8167","3.701081","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8168","3.702045","172.30.1.205","172.30.1.104","TCP","74","41624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906928 TSecr=0 WS=128" +"8169","3.702371","172.30.1.104","172.30.1.205","TCP","66","135 > 41624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8170","3.702390","172.30.1.205","172.30.1.104","TCP","54","41624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8171","3.702733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8172","3.703025","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8173","3.703033","172.30.1.205","172.30.1.104","TCP","54","41624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8174","3.705247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8175","3.705640","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8176","3.705647","172.30.1.205","172.30.1.104","TCP","54","41624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8177","3.707444","172.30.1.205","172.30.1.104","TCP","54","41624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8178","3.707553","172.30.1.205","172.30.1.104","TCP","74","34262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906933 TSecr=0 WS=128" +"8179","3.707758","172.30.1.104","172.30.1.205","TCP","54","135 > 41624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8180","3.707782","172.30.1.104","172.30.1.205","TCP","54","135 > 41624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8181","3.707788","172.30.1.205","172.30.1.104","TCP","54","41624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8182","3.707874","172.30.1.104","172.30.1.205","TCP","66","49671 > 34262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8183","3.707882","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8184","3.708221","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8185","3.708562","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8186","3.708569","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8187","3.710433","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8188","3.711675","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8189","3.711682","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8190","3.713041","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8191","3.714315","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8192","3.714324","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8193","3.715255","172.30.1.205","172.30.1.104","TCP","74","41628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906941 TSecr=0 WS=128" +"8194","3.715604","172.30.1.104","172.30.1.205","TCP","66","135 > 41628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8195","3.715614","172.30.1.205","172.30.1.104","TCP","54","41628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8196","3.715957","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8197","3.716272","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8198","3.716281","172.30.1.205","172.30.1.104","TCP","54","41628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8199","3.718492","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8200","3.718874","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8201","3.718881","172.30.1.205","172.30.1.104","TCP","54","41628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8202","3.720677","172.30.1.205","172.30.1.104","TCP","54","41628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8203","3.720807","172.30.1.205","172.30.1.104","TCP","74","34266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906947 TSecr=0 WS=128" +"8204","3.720966","172.30.1.104","172.30.1.205","TCP","54","135 > 41628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8205","3.720989","172.30.1.104","172.30.1.205","TCP","54","135 > 41628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8206","3.720995","172.30.1.205","172.30.1.104","TCP","54","41628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8207","3.721081","172.30.1.104","172.30.1.205","TCP","66","49671 > 34266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8208","3.721090","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8209","3.721429","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8210","3.721724","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8211","3.721733","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8212","3.723591","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8213","3.723994","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8214","3.724000","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8215","3.725371","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8216","3.726560","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8217","3.726569","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8218","3.727505","172.30.1.205","172.30.1.104","TCP","74","41632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906953 TSecr=0 WS=128" +"8219","3.727799","172.30.1.104","172.30.1.205","TCP","66","135 > 41632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8220","3.727809","172.30.1.205","172.30.1.104","TCP","54","41632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8221","3.728162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8222","3.728472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8223","3.728481","172.30.1.205","172.30.1.104","TCP","54","41632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8224","3.730680","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8225","3.731069","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8226","3.731075","172.30.1.205","172.30.1.104","TCP","54","41632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8227","3.732894","172.30.1.205","172.30.1.104","TCP","54","41632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8228","3.733001","172.30.1.205","172.30.1.104","TCP","74","34270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906959 TSecr=0 WS=128" +"8229","3.733155","172.30.1.104","172.30.1.205","TCP","54","135 > 41632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8230","3.733190","172.30.1.104","172.30.1.205","TCP","54","135 > 41632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8231","3.733204","172.30.1.205","172.30.1.104","TCP","54","41632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8232","3.733287","172.30.1.104","172.30.1.205","TCP","66","49671 > 34270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8233","3.733295","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8234","3.733636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8235","3.733926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8236","3.733935","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8237","3.735794","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8238","3.736153","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8239","3.736159","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8240","3.737525","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8241","3.740960","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8242","3.740970","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8243","3.741909","172.30.1.205","172.30.1.104","TCP","74","41636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906968 TSecr=0 WS=128" +"8244","3.742203","172.30.1.104","172.30.1.205","TCP","66","135 > 41636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8245","3.742214","172.30.1.205","172.30.1.104","TCP","54","41636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8246","3.742559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8247","3.742847","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8248","3.742856","172.30.1.205","172.30.1.104","TCP","54","41636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8249","3.745078","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8250","3.745453","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8251","3.745460","172.30.1.205","172.30.1.104","TCP","54","41636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8252","3.747266","172.30.1.205","172.30.1.104","TCP","54","41636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8253","3.747375","172.30.1.205","172.30.1.104","TCP","74","34274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906973 TSecr=0 WS=128" +"8254","3.747565","172.30.1.104","172.30.1.205","TCP","54","135 > 41636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8255","3.747602","172.30.1.104","172.30.1.205","TCP","54","135 > 41636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8256","3.747608","172.30.1.205","172.30.1.104","TCP","54","41636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8257","3.747688","172.30.1.104","172.30.1.205","TCP","66","49671 > 34274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8258","3.747697","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8259","3.748049","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8260","3.748372","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8261","3.748381","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8262","3.750297","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8263","3.750714","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8264","3.750721","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8265","3.752070","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8266","3.753378","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8267","3.753387","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8268","3.754340","172.30.1.205","172.30.1.104","TCP","74","41640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906980 TSecr=0 WS=128" +"8269","3.754700","172.30.1.104","172.30.1.205","TCP","66","135 > 41640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8270","3.754711","172.30.1.205","172.30.1.104","TCP","54","41640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8271","3.755057","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8272","3.755391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8273","3.755399","172.30.1.205","172.30.1.104","TCP","54","41640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8274","3.757610","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8275","3.758001","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8276","3.758007","172.30.1.205","172.30.1.104","TCP","54","41640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8277","3.759812","172.30.1.205","172.30.1.104","TCP","54","41640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8278","3.759923","172.30.1.205","172.30.1.104","TCP","74","34278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906986 TSecr=0 WS=128" +"8279","3.760072","172.30.1.104","172.30.1.205","TCP","54","135 > 41640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8280","3.760093","172.30.1.104","172.30.1.205","TCP","54","135 > 41640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8281","3.760100","172.30.1.205","172.30.1.104","TCP","54","41640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8282","3.760324","172.30.1.104","172.30.1.205","TCP","66","49671 > 34278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8283","3.760332","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8284","3.760678","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8285","3.760961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8286","3.760970","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8287","3.762846","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8288","3.763247","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8289","3.763253","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8290","3.764610","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8291","3.765862","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8292","3.765872","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8293","3.766842","172.30.1.205","172.30.1.104","TCP","74","41644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906993 TSecr=0 WS=128" +"8294","3.767162","172.30.1.104","172.30.1.205","TCP","66","135 > 41644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8295","3.767173","172.30.1.205","172.30.1.104","TCP","54","41644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8296","3.767519","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8297","3.767821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8298","3.767835","172.30.1.205","172.30.1.104","TCP","54","41644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8299","3.770118","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8300","3.770561","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8301","3.770568","172.30.1.205","172.30.1.104","TCP","54","41644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8302","3.772381","172.30.1.205","172.30.1.104","TCP","54","41644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8303","3.772499","172.30.1.205","172.30.1.104","TCP","74","34282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906998 TSecr=0 WS=128" +"8304","3.772661","172.30.1.104","172.30.1.205","TCP","54","135 > 41644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8305","3.772674","172.30.1.104","172.30.1.205","TCP","54","135 > 41644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8306","3.772680","172.30.1.205","172.30.1.104","TCP","54","41644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8307","3.772797","172.30.1.104","172.30.1.205","TCP","66","49671 > 34282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8308","3.772807","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8309","3.773168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8310","3.773467","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8311","3.773475","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8312","3.775347","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8313","3.775710","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8314","3.775717","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8315","3.777104","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8316","3.782463","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8317","3.782474","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8318","3.783458","172.30.1.205","172.30.1.104","TCP","74","41648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907009 TSecr=0 WS=128" +"8319","3.783775","172.30.1.104","172.30.1.205","TCP","66","135 > 41648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8320","3.783787","172.30.1.205","172.30.1.104","TCP","54","41648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8321","3.784145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8322","3.784443","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8323","3.784455","172.30.1.205","172.30.1.104","TCP","54","41648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8324","3.786670","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8325","3.787054","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8326","3.787062","172.30.1.205","172.30.1.104","TCP","54","41648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8327","3.788921","172.30.1.205","172.30.1.104","TCP","54","41648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8328","3.789032","172.30.1.205","172.30.1.104","TCP","74","34286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907015 TSecr=0 WS=128" +"8329","3.789202","172.30.1.104","172.30.1.205","TCP","54","135 > 41648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8330","3.789239","172.30.1.104","172.30.1.205","TCP","54","135 > 41648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8331","3.789246","172.30.1.205","172.30.1.104","TCP","54","41648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8332","3.789336","172.30.1.104","172.30.1.205","TCP","66","49671 > 34286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8333","3.789345","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8334","3.789689","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8335","3.789970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8336","3.789979","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8337","3.791845","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8338","3.792827","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8339","3.792836","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8340","3.794252","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8341","3.795605","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8342","3.795616","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8343","3.796571","172.30.1.205","172.30.1.104","TCP","74","41652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907022 TSecr=0 WS=128" +"8344","3.796920","172.30.1.104","172.30.1.205","TCP","66","135 > 41652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8345","3.796932","172.30.1.205","172.30.1.104","TCP","54","41652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8346","3.797291","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8347","3.797714","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8348","3.797724","172.30.1.205","172.30.1.104","TCP","54","41652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8349","3.799921","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8350","3.800300","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8351","3.800307","172.30.1.205","172.30.1.104","TCP","54","41652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8352","3.802131","172.30.1.205","172.30.1.104","TCP","54","41652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8353","3.802242","172.30.1.205","172.30.1.104","TCP","74","34290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907028 TSecr=0 WS=128" +"8354","3.802448","172.30.1.104","172.30.1.205","TCP","54","135 > 41652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8355","3.802455","172.30.1.104","172.30.1.205","TCP","54","135 > 41652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8356","3.802460","172.30.1.205","172.30.1.104","TCP","54","41652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8357","3.802523","172.30.1.104","172.30.1.205","TCP","66","49671 > 34290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8358","3.802531","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8359","3.802877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8360","3.803167","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8361","3.803176","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8362","3.805063","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8363","3.805444","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8364","3.805451","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8365","3.806836","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8366","3.808124","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8367","3.808136","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8368","3.809131","172.30.1.205","172.30.1.104","TCP","74","41656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907035 TSecr=0 WS=128" +"8369","3.809414","172.30.1.104","172.30.1.205","TCP","66","135 > 41656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8370","3.809425","172.30.1.205","172.30.1.104","TCP","54","41656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8371","3.809769","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8372","3.810307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8373","3.810316","172.30.1.205","172.30.1.104","TCP","54","41656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8374","3.812558","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8375","3.812948","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8376","3.812955","172.30.1.205","172.30.1.104","TCP","54","41656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8377","3.814784","172.30.1.205","172.30.1.104","TCP","54","41656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8378","3.814895","172.30.1.205","172.30.1.104","TCP","74","34294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907041 TSecr=0 WS=128" +"8379","3.815037","172.30.1.104","172.30.1.205","TCP","54","135 > 41656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8380","3.815216","172.30.1.104","172.30.1.205","TCP","66","49671 > 34294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8381","3.815226","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8382","3.815299","172.30.1.104","172.30.1.205","TCP","54","135 > 41656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8383","3.815305","172.30.1.205","172.30.1.104","TCP","54","41656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8384","3.815597","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8385","3.815872","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8386","3.815881","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8387","3.817808","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8388","3.818167","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8389","3.818174","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8390","3.819552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8391","3.821109","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8392","3.821119","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8393","3.822056","172.30.1.205","172.30.1.104","TCP","74","41660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907048 TSecr=0 WS=128" +"8394","3.822362","172.30.1.104","172.30.1.205","TCP","66","135 > 41660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8395","3.822373","172.30.1.205","172.30.1.104","TCP","54","41660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8396","3.822726","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8397","3.823041","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8398","3.823050","172.30.1.205","172.30.1.104","TCP","54","41660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8399","3.825252","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8400","3.825651","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8401","3.825658","172.30.1.205","172.30.1.104","TCP","54","41660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8402","3.826521","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8403","3.826569","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8404","3.826601","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8405","3.826629","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8406","3.826656","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8407","3.826678","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8408","3.826705","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8409","3.826732","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8410","3.826758","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8411","3.826784","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8412","3.826810","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8413","3.826877","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8414","3.827214","172.30.1.104","172.30.1.205","TCP","54","49671 > 34254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8415","3.827223","172.30.1.104","172.30.1.205","TCP","54","49671 > 34258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8416","3.827695","172.30.1.104","172.30.1.205","TCP","54","49671 > 34254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8417","3.827702","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8418","3.827710","172.30.1.104","172.30.1.205","TCP","54","49671 > 34262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8419","3.827716","172.30.1.104","172.30.1.205","TCP","54","49671 > 34266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8420","3.827722","172.30.1.104","172.30.1.205","TCP","54","49671 > 34258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8421","3.827725","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8422","3.827727","172.30.1.104","172.30.1.205","TCP","54","49671 > 34270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8423","3.827729","172.30.1.104","172.30.1.205","TCP","54","49671 > 34262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8424","3.827731","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8425","3.827732","172.30.1.104","172.30.1.205","TCP","54","49671 > 34274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8426","3.827735","172.30.1.104","172.30.1.205","TCP","54","49671 > 34278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8427","3.827737","172.30.1.104","172.30.1.205","TCP","54","49671 > 34282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8428","3.827739","172.30.1.104","172.30.1.205","TCP","54","49671 > 34278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8429","3.827741","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8430","3.827743","172.30.1.104","172.30.1.205","TCP","54","49671 > 34286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8431","3.827746","172.30.1.104","172.30.1.205","TCP","54","49671 > 34274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8432","3.827747","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8433","3.827749","172.30.1.104","172.30.1.205","TCP","54","49671 > 34290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8434","3.827754","172.30.1.104","172.30.1.205","TCP","54","49671 > 34286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8435","3.827757","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8436","3.827758","172.30.1.104","172.30.1.205","TCP","54","49671 > 34282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8437","3.827760","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8438","3.827762","172.30.1.104","172.30.1.205","TCP","54","49671 > 34294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8439","3.827764","172.30.1.104","172.30.1.205","TCP","54","49671 > 34294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8440","3.827766","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8441","3.827767","172.30.1.104","172.30.1.205","TCP","54","49671 > 34290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8442","3.827769","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8443","3.827773","172.30.1.104","172.30.1.205","TCP","54","49671 > 34266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8444","3.827775","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8445","3.827776","172.30.1.104","172.30.1.205","TCP","54","49671 > 34270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8446","3.827778","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8447","3.827779","172.30.1.104","172.30.1.205","TCP","54","49671 > 34250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8448","3.827782","172.30.1.104","172.30.1.205","TCP","54","49671 > 34250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8449","3.827784","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8450","3.828278","172.30.1.205","172.30.1.104","TCP","54","41660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8451","3.828386","172.30.1.205","172.30.1.104","TCP","74","34298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907054 TSecr=0 WS=128" +"8452","3.828522","172.30.1.104","172.30.1.205","TCP","54","135 > 41660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8453","3.828576","172.30.1.104","172.30.1.205","TCP","54","135 > 41660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8454","3.828581","172.30.1.205","172.30.1.104","TCP","54","41660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8455","3.828660","172.30.1.104","172.30.1.205","TCP","66","49671 > 34298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8456","3.828668","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8457","3.829052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8458","3.829350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8459","3.829359","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8460","3.831324","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8461","3.831694","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8462","3.831700","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8463","3.833093","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8464","3.834325","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8465","3.834335","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8466","3.835260","172.30.1.205","172.30.1.104","TCP","74","41664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907061 TSecr=0 WS=128" +"8467","3.835561","172.30.1.104","172.30.1.205","TCP","66","135 > 41664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8468","3.835572","172.30.1.205","172.30.1.104","TCP","54","41664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8469","3.835917","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8470","3.836276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8471","3.836285","172.30.1.205","172.30.1.104","TCP","54","41664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8472","3.838488","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8473","3.838870","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8474","3.838877","172.30.1.205","172.30.1.104","TCP","54","41664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8475","3.840675","172.30.1.205","172.30.1.104","TCP","54","41664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8476","3.840806","172.30.1.205","172.30.1.104","TCP","74","34302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907067 TSecr=0 WS=128" +"8477","3.841024","172.30.1.104","172.30.1.205","TCP","54","135 > 41664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8478","3.841032","172.30.1.104","172.30.1.205","TCP","54","135 > 41664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8479","3.841037","172.30.1.205","172.30.1.104","TCP","54","41664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8480","3.841072","172.30.1.104","172.30.1.205","TCP","66","49671 > 34302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8481","3.841080","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8482","3.841423","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8483","3.841700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8484","3.841710","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8485","3.843557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8486","3.843916","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8487","3.843921","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8488","3.845297","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8489","3.846526","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8490","3.846537","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8491","3.847481","172.30.1.205","172.30.1.104","TCP","74","41668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907073 TSecr=0 WS=128" +"8492","3.847766","172.30.1.104","172.30.1.205","TCP","66","135 > 41668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8493","3.847777","172.30.1.205","172.30.1.104","TCP","54","41668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8494","3.848125","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8495","3.848408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8496","3.848417","172.30.1.205","172.30.1.104","TCP","54","41668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8497","3.850621","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8498","3.850973","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8499","3.850980","172.30.1.205","172.30.1.104","TCP","54","41668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8500","3.852805","172.30.1.205","172.30.1.104","TCP","54","41668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8501","3.852915","172.30.1.205","172.30.1.104","TCP","74","34306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907079 TSecr=0 WS=128" +"8502","3.853060","172.30.1.104","172.30.1.205","TCP","54","135 > 41668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8503","3.853121","172.30.1.104","172.30.1.205","TCP","54","135 > 41668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8504","3.853126","172.30.1.205","172.30.1.104","TCP","54","41668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8505","3.853209","172.30.1.104","172.30.1.205","TCP","66","49671 > 34306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8506","3.853218","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8507","3.853560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8508","3.853839","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8509","3.853848","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8510","3.855716","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8511","3.856076","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8512","3.856083","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8513","3.857458","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8514","3.858752","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8515","3.858761","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8516","3.859693","172.30.1.205","172.30.1.104","TCP","74","41672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907086 TSecr=0 WS=128" +"8517","3.860014","172.30.1.104","172.30.1.205","TCP","66","135 > 41672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8518","3.860025","172.30.1.205","172.30.1.104","TCP","54","41672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8519","3.860367","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8520","3.860658","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8521","3.860667","172.30.1.205","172.30.1.104","TCP","54","41672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8522","3.862852","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8523","3.863247","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8524","3.863254","172.30.1.205","172.30.1.104","TCP","54","41672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8525","3.865079","172.30.1.205","172.30.1.104","TCP","54","41672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8526","3.865189","172.30.1.205","172.30.1.104","TCP","74","34310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907091 TSecr=0 WS=128" +"8527","3.865364","172.30.1.104","172.30.1.205","TCP","54","135 > 41672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8528","3.865372","172.30.1.104","172.30.1.205","TCP","54","135 > 41672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8529","3.865378","172.30.1.205","172.30.1.104","TCP","54","41672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8530","3.865473","172.30.1.104","172.30.1.205","TCP","66","49671 > 34310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8531","3.865481","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8532","3.865827","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8533","3.866121","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8534","3.866130","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8535","3.867991","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8536","3.868358","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8537","3.868364","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8538","3.869735","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8539","3.871000","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8540","3.871010","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8541","3.871954","172.30.1.205","172.30.1.104","TCP","74","41676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907098 TSecr=0 WS=128" +"8542","3.872281","172.30.1.104","172.30.1.205","TCP","66","135 > 41676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8543","3.872292","172.30.1.205","172.30.1.104","TCP","54","41676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8544","3.872641","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8545","3.872934","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8546","3.872944","172.30.1.205","172.30.1.104","TCP","54","41676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8547","3.875120","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8548","3.875486","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8549","3.875493","172.30.1.205","172.30.1.104","TCP","54","41676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8550","3.877311","172.30.1.205","172.30.1.104","TCP","54","41676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8551","3.877422","172.30.1.205","172.30.1.104","TCP","74","34314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907103 TSecr=0 WS=128" +"8552","3.877588","172.30.1.104","172.30.1.205","TCP","54","135 > 41676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8553","3.877597","172.30.1.104","172.30.1.205","TCP","54","135 > 41676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8554","3.877603","172.30.1.205","172.30.1.104","TCP","54","41676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8555","3.877685","172.30.1.104","172.30.1.205","TCP","66","49671 > 34314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8556","3.877694","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8557","3.878071","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8558","3.878364","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8559","3.878373","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8560","3.880216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8561","3.880576","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8562","3.880583","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8563","3.881947","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8564","3.883202","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8565","3.883211","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8566","3.884135","172.30.1.205","172.30.1.104","TCP","74","41680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907110 TSecr=0 WS=128" +"8567","3.884421","172.30.1.104","172.30.1.205","TCP","66","135 > 41680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8568","3.884432","172.30.1.205","172.30.1.104","TCP","54","41680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8569","3.884794","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8570","3.885278","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8571","3.885291","172.30.1.205","172.30.1.104","TCP","54","41680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8572","3.887574","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8573","3.887952","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8574","3.887959","172.30.1.205","172.30.1.104","TCP","54","41680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8575","3.889811","172.30.1.205","172.30.1.104","TCP","54","41680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8576","3.889937","172.30.1.205","172.30.1.104","TCP","74","34318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907116 TSecr=0 WS=128" +"8577","3.890103","172.30.1.104","172.30.1.205","TCP","54","135 > 41680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8578","3.890113","172.30.1.104","172.30.1.205","TCP","54","135 > 41680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8579","3.890119","172.30.1.205","172.30.1.104","TCP","54","41680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8580","3.890190","172.30.1.104","172.30.1.205","TCP","66","49671 > 34318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8581","3.890199","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8582","3.890545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8583","3.890833","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8584","3.890842","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8585","3.892725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8586","3.893103","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8587","3.893110","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8588","3.894473","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8589","3.895705","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8590","3.895715","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8591","3.896675","172.30.1.205","172.30.1.104","TCP","74","41684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907123 TSecr=0 WS=128" +"8592","3.896954","172.30.1.104","172.30.1.205","TCP","66","135 > 41684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8593","3.896964","172.30.1.205","172.30.1.104","TCP","54","41684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8594","3.897318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8595","3.897610","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8596","3.897619","172.30.1.205","172.30.1.104","TCP","54","41684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8597","3.899815","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8598","3.900238","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8599","3.900245","172.30.1.205","172.30.1.104","TCP","54","41684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8600","3.902068","172.30.1.205","172.30.1.104","TCP","54","41684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8601","3.902178","172.30.1.205","172.30.1.104","TCP","74","34322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907128 TSecr=0 WS=128" +"8602","3.902370","172.30.1.104","172.30.1.205","TCP","54","135 > 41684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8603","3.902379","172.30.1.104","172.30.1.205","TCP","54","135 > 41684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8604","3.902385","172.30.1.205","172.30.1.104","TCP","54","41684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8605","3.902419","172.30.1.104","172.30.1.205","TCP","66","49671 > 34322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8606","3.902428","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8607","3.902767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8608","3.903031","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8609","3.903039","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8610","3.904948","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8611","3.905316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8612","3.905323","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8613","3.906682","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8614","3.907919","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8615","3.907937","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8616","3.908966","172.30.1.205","172.30.1.104","TCP","74","41688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907135 TSecr=0 WS=128" +"8617","3.909241","172.30.1.104","172.30.1.205","TCP","66","135 > 41688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8618","3.909251","172.30.1.205","172.30.1.104","TCP","54","41688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8619","3.909602","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8620","3.909888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8621","3.909897","172.30.1.205","172.30.1.104","TCP","54","41688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8622","3.912120","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8623","3.912514","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8624","3.912529","172.30.1.205","172.30.1.104","TCP","54","41688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8625","3.914599","172.30.1.205","172.30.1.104","TCP","54","41688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8626","3.914709","172.30.1.205","172.30.1.104","TCP","74","34326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907141 TSecr=0 WS=128" +"8627","3.914859","172.30.1.104","172.30.1.205","TCP","54","135 > 41688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8628","3.914896","172.30.1.104","172.30.1.205","TCP","54","135 > 41688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8629","3.914901","172.30.1.205","172.30.1.104","TCP","54","41688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8630","3.914989","172.30.1.104","172.30.1.205","TCP","66","49671 > 34326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8631","3.914997","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8632","3.915346","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8633","3.915626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8634","3.915632","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8635","3.917517","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8636","3.917931","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8637","3.917937","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8638","3.919278","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8639","3.920514","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8640","3.920525","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8641","3.921488","172.30.1.205","172.30.1.104","TCP","74","41692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907147 TSecr=0 WS=128" +"8642","3.921841","172.30.1.104","172.30.1.205","TCP","66","135 > 41692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8643","3.921851","172.30.1.205","172.30.1.104","TCP","54","41692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8644","3.922196","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8645","3.922475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8646","3.922484","172.30.1.205","172.30.1.104","TCP","54","41692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8647","3.924632","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8648","3.925021","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8649","3.925028","172.30.1.205","172.30.1.104","TCP","54","41692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8650","3.926890","172.30.1.205","172.30.1.104","TCP","54","41692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8651","3.927000","172.30.1.205","172.30.1.104","TCP","74","34330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907153 TSecr=0 WS=128" +"8652","3.927160","172.30.1.104","172.30.1.205","TCP","54","135 > 41692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8653","3.927200","172.30.1.104","172.30.1.205","TCP","54","135 > 41692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8654","3.927205","172.30.1.205","172.30.1.104","TCP","54","41692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8655","3.927285","172.30.1.104","172.30.1.205","TCP","66","49671 > 34330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8656","3.927293","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8657","3.927635","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8658","3.927926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8659","3.927934","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8660","3.929801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8661","3.930170","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8662","3.930176","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8663","3.931513","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8664","3.932723","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8665","3.932732","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8666","3.933670","172.30.1.205","172.30.1.104","TCP","74","41696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907160 TSecr=0 WS=128" +"8667","3.933961","172.30.1.104","172.30.1.205","TCP","66","135 > 41696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8668","3.933972","172.30.1.205","172.30.1.104","TCP","54","41696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8669","3.934318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8670","3.934596","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8671","3.934605","172.30.1.205","172.30.1.104","TCP","54","41696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8672","3.936787","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8673","3.937180","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8674","3.937187","172.30.1.205","172.30.1.104","TCP","54","41696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8675","3.938970","172.30.1.205","172.30.1.104","TCP","54","41696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8676","3.939081","172.30.1.205","172.30.1.104","TCP","74","34334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907165 TSecr=0 WS=128" +"8677","3.939238","172.30.1.104","172.30.1.205","TCP","54","135 > 41696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8678","3.939261","172.30.1.104","172.30.1.205","TCP","54","135 > 41696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8679","3.939267","172.30.1.205","172.30.1.104","TCP","54","41696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8680","3.939352","172.30.1.104","172.30.1.205","TCP","66","49671 > 34334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8681","3.939360","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8682","3.939702","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8683","3.939985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8684","3.939993","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8685","3.941886","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8686","3.942272","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8687","3.942284","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8688","3.943861","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8689","3.945098","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8690","3.945107","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8691","3.946041","172.30.1.205","172.30.1.104","TCP","74","41700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907172 TSecr=0 WS=128" +"8692","3.946332","172.30.1.104","172.30.1.205","TCP","66","135 > 41700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8693","3.946342","172.30.1.205","172.30.1.104","TCP","54","41700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8694","3.946691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8695","3.946996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8696","3.947005","172.30.1.205","172.30.1.104","TCP","54","41700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8697","3.949201","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8698","3.949605","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8699","3.949612","172.30.1.205","172.30.1.104","TCP","54","41700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8700","3.951420","172.30.1.205","172.30.1.104","TCP","54","41700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8701","3.951533","172.30.1.205","172.30.1.104","TCP","74","34338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907177 TSecr=0 WS=128" +"8702","3.951697","172.30.1.104","172.30.1.205","TCP","54","135 > 41700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8703","3.951705","172.30.1.104","172.30.1.205","TCP","54","135 > 41700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8704","3.951711","172.30.1.205","172.30.1.104","TCP","54","41700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8705","3.951821","172.30.1.104","172.30.1.205","TCP","66","49671 > 34338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8706","3.951830","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8707","3.952174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8708","3.952490","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8709","3.952498","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8710","3.954391","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8711","3.954774","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8712","3.954780","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8713","3.956127","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8714","3.957401","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8715","3.957410","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8716","3.958339","172.30.1.205","172.30.1.104","TCP","74","41704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907184 TSecr=0 WS=128" +"8717","3.958636","172.30.1.104","172.30.1.205","TCP","66","135 > 41704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8718","3.958647","172.30.1.205","172.30.1.104","TCP","54","41704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8719","3.958992","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8720","3.959269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8721","3.959277","172.30.1.205","172.30.1.104","TCP","54","41704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8722","3.961472","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8723","3.961893","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8724","3.961899","172.30.1.205","172.30.1.104","TCP","54","41704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8725","3.963708","172.30.1.205","172.30.1.104","TCP","54","41704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8726","3.963816","172.30.1.205","172.30.1.104","TCP","74","34342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907190 TSecr=0 WS=128" +"8727","3.963973","172.30.1.104","172.30.1.205","TCP","54","135 > 41704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8728","3.963981","172.30.1.104","172.30.1.205","TCP","54","135 > 41704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8729","3.963986","172.30.1.205","172.30.1.104","TCP","54","41704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8730","3.964086","172.30.1.104","172.30.1.205","TCP","66","49671 > 34342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8731","3.964095","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8732","3.964460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8733","3.964794","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8734","3.964803","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8735","3.966686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8736","3.967024","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8737","3.967030","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8738","3.968348","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8739","3.969599","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8740","3.969615","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8741","3.970553","172.30.1.205","172.30.1.104","TCP","74","41708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907196 TSecr=0 WS=128" +"8742","3.970839","172.30.1.104","172.30.1.205","TCP","66","135 > 41708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8743","3.970850","172.30.1.205","172.30.1.104","TCP","54","41708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8744","3.971197","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8745","3.971470","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8746","3.971487","172.30.1.205","172.30.1.104","TCP","54","41708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8747","3.973929","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8748","3.974330","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8749","3.974349","172.30.1.205","172.30.1.104","TCP","54","41708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8750","3.975194","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8751","3.975247","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8752","3.975284","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8753","3.975317","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8754","3.975349","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8755","3.975380","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8756","3.975407","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8757","3.975433","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8758","3.975459","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8759","3.975487","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8760","3.975508","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8761","3.975583","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8762","3.975666","172.30.1.104","172.30.1.205","TCP","54","49671 > 34302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8763","3.975675","172.30.1.104","172.30.1.205","TCP","54","49671 > 34306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8764","3.975678","172.30.1.104","172.30.1.205","TCP","54","49671 > 34302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8765","3.975684","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8766","3.975690","172.30.1.104","172.30.1.205","TCP","54","49671 > 34306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8767","3.975693","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8768","3.975831","172.30.1.104","172.30.1.205","TCP","54","49671 > 34310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8769","3.975838","172.30.1.104","172.30.1.205","TCP","54","49671 > 34314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8770","3.976025","172.30.1.104","172.30.1.205","TCP","54","49671 > 34318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8771","3.976031","172.30.1.104","172.30.1.205","TCP","54","49671 > 34322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8772","3.976034","172.30.1.104","172.30.1.205","TCP","54","49671 > 34326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8773","3.976036","172.30.1.104","172.30.1.205","TCP","54","49671 > 34330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8774","3.976039","172.30.1.104","172.30.1.205","TCP","54","49671 > 34334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8775","3.976042","172.30.1.104","172.30.1.205","TCP","54","49671 > 34338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8776","3.976044","172.30.1.104","172.30.1.205","TCP","54","49671 > 34342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8777","3.976213","172.30.1.104","172.30.1.205","TCP","54","49671 > 34310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8778","3.976219","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8779","3.976226","172.30.1.104","172.30.1.205","TCP","54","49671 > 34314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8780","3.976228","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8781","3.976229","172.30.1.104","172.30.1.205","TCP","54","49671 > 34342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8782","3.976231","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8783","3.976236","172.30.1.104","172.30.1.205","TCP","54","49671 > 34338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8784","3.976238","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8785","3.976239","172.30.1.104","172.30.1.205","TCP","54","49671 > 34334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8786","3.976241","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8787","3.976242","172.30.1.104","172.30.1.205","TCP","54","49671 > 34330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8788","3.976244","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8789","3.976245","172.30.1.104","172.30.1.205","TCP","54","49671 > 34326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8790","3.976247","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8791","3.976248","172.30.1.104","172.30.1.205","TCP","54","49671 > 34322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8792","3.976249","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8793","3.976250","172.30.1.104","172.30.1.205","TCP","54","49671 > 34318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8794","3.976252","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8795","3.976334","172.30.1.104","172.30.1.205","TCP","54","49671 > 34298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8796","3.976340","172.30.1.104","172.30.1.205","TCP","54","49671 > 34298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"8797","3.976343","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"8798","3.977144","172.30.1.205","172.30.1.104","TCP","54","41708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8799","3.977261","172.30.1.205","172.30.1.104","TCP","74","34346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907203 TSecr=0 WS=128" +"8800","3.977396","172.30.1.104","172.30.1.205","TCP","54","135 > 41708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8801","3.977404","172.30.1.104","172.30.1.205","TCP","54","135 > 41708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8802","3.977409","172.30.1.205","172.30.1.104","TCP","54","41708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8803","3.977544","172.30.1.104","172.30.1.205","TCP","66","49671 > 34346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8804","3.977552","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8805","3.977908","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8806","3.978193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8807","3.978206","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8808","3.980146","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8809","3.980510","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8810","3.980517","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8811","3.981914","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8812","3.983229","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8813","3.983252","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8814","3.984200","172.30.1.205","172.30.1.104","TCP","74","41712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907210 TSecr=0 WS=128" +"8815","3.984487","172.30.1.104","172.30.1.205","TCP","66","135 > 41712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8816","3.984499","172.30.1.205","172.30.1.104","TCP","54","41712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8817","3.984890","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8818","3.985183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8819","3.985192","172.30.1.205","172.30.1.104","TCP","54","41712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8820","3.987367","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8821","3.987749","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8822","3.987757","172.30.1.205","172.30.1.104","TCP","54","41712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8823","3.989624","172.30.1.205","172.30.1.104","TCP","54","41712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8824","3.989750","172.30.1.205","172.30.1.104","TCP","74","34350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907216 TSecr=0 WS=128" +"8825","3.989907","172.30.1.104","172.30.1.205","TCP","54","135 > 41712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8826","3.989955","172.30.1.104","172.30.1.205","TCP","54","135 > 41712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8827","3.989961","172.30.1.205","172.30.1.104","TCP","54","41712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8828","3.990043","172.30.1.104","172.30.1.205","TCP","66","49671 > 34350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8829","3.990051","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8830","3.990416","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8831","3.990705","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8832","3.990713","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8833","3.992560","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8834","3.992947","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8835","3.992954","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8836","3.994298","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8837","3.995579","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8838","3.995588","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8839","3.996507","172.30.1.205","172.30.1.104","TCP","74","41716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907222 TSecr=0 WS=128" +"8840","3.996811","172.30.1.104","172.30.1.205","TCP","66","135 > 41716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8841","3.996822","172.30.1.205","172.30.1.104","TCP","54","41716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8842","3.997174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8843","3.997481","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8844","3.997496","172.30.1.205","172.30.1.104","TCP","54","41716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8845","3.999768","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8846","4.000149","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8847","4.000156","172.30.1.205","172.30.1.104","TCP","54","41716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8848","4.001997","172.30.1.205","172.30.1.104","TCP","54","41716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8849","4.002117","172.30.1.205","172.30.1.104","TCP","74","34354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907228 TSecr=0 WS=128" +"8850","4.002278","172.30.1.104","172.30.1.205","TCP","54","135 > 41716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8851","4.002295","172.30.1.104","172.30.1.205","TCP","54","135 > 41716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8852","4.002300","172.30.1.205","172.30.1.104","TCP","54","41716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8853","4.002420","172.30.1.104","172.30.1.205","TCP","66","49671 > 34354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8854","4.002432","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8855","4.002796","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8856","4.003072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8857","4.003081","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8858","4.004962","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8859","4.005328","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8860","4.005335","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8861","4.006681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8862","4.008008","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8863","4.008030","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8864","4.009168","172.30.1.205","172.30.1.104","TCP","74","41720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907235 TSecr=0 WS=128" +"8865","4.009498","172.30.1.104","172.30.1.205","TCP","66","135 > 41720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8866","4.009509","172.30.1.205","172.30.1.104","TCP","54","41720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8867","4.009864","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8868","4.010189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8869","4.010198","172.30.1.205","172.30.1.104","TCP","54","41720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8870","4.012431","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8871","4.012838","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8872","4.012846","172.30.1.205","172.30.1.104","TCP","54","41720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8873","4.014677","172.30.1.205","172.30.1.104","TCP","54","41720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8874","4.014821","172.30.1.205","172.30.1.104","TCP","74","34358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907241 TSecr=0 WS=128" +"8875","4.014956","172.30.1.104","172.30.1.205","TCP","54","135 > 41720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8876","4.015006","172.30.1.104","172.30.1.205","TCP","54","135 > 41720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8877","4.015018","172.30.1.205","172.30.1.104","TCP","54","41720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8878","4.015106","172.30.1.104","172.30.1.205","TCP","66","49671 > 34358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8879","4.015119","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8880","4.015517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8881","4.015804","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8882","4.015815","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8883","4.017754","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8884","4.018171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8885","4.018178","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8886","4.019555","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8887","4.020943","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8888","4.020952","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8889","4.021938","172.30.1.205","172.30.1.104","TCP","74","41724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907248 TSecr=0 WS=128" +"8890","4.022262","172.30.1.104","172.30.1.205","TCP","66","135 > 41724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8891","4.022272","172.30.1.205","172.30.1.104","TCP","54","41724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8892","4.022620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8893","4.022966","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8894","4.022976","172.30.1.205","172.30.1.104","TCP","54","41724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8895","4.025194","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8896","4.025570","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8897","4.025577","172.30.1.205","172.30.1.104","TCP","54","41724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8898","4.027391","172.30.1.205","172.30.1.104","TCP","54","41724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8899","4.027503","172.30.1.205","172.30.1.104","TCP","74","34362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907253 TSecr=0 WS=128" +"8900","4.027662","172.30.1.104","172.30.1.205","TCP","54","135 > 41724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8901","4.027704","172.30.1.104","172.30.1.205","TCP","54","135 > 41724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8902","4.027710","172.30.1.205","172.30.1.104","TCP","54","41724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8903","4.027798","172.30.1.104","172.30.1.205","TCP","66","49671 > 34362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8904","4.027807","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8905","4.028150","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8906","4.028421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8907","4.028430","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8908","4.030338","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8909","4.030682","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8910","4.030688","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8911","4.032033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8912","4.033390","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8913","4.033399","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8914","4.034344","172.30.1.205","172.30.1.104","TCP","74","41728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907260 TSecr=0 WS=128" +"8915","4.034638","172.30.1.104","172.30.1.205","TCP","66","135 > 41728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8916","4.034649","172.30.1.205","172.30.1.104","TCP","54","41728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8917","4.034997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8918","4.035277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8919","4.035286","172.30.1.205","172.30.1.104","TCP","54","41728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8920","4.037555","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8921","4.037959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8922","4.037965","172.30.1.205","172.30.1.104","TCP","54","41728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8923","4.039819","172.30.1.205","172.30.1.104","TCP","54","41728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8924","4.039931","172.30.1.205","172.30.1.104","TCP","74","34366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907266 TSecr=0 WS=128" +"8925","4.040125","172.30.1.104","172.30.1.205","TCP","54","135 > 41728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8926","4.040153","172.30.1.104","172.30.1.205","TCP","54","135 > 41728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8927","4.040159","172.30.1.205","172.30.1.104","TCP","54","41728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8928","4.040240","172.30.1.104","172.30.1.205","TCP","66","49671 > 34366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8929","4.040249","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8930","4.040621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8931","4.040920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8932","4.040930","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8933","4.042856","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8934","4.045864","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8935","4.045871","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8936","4.047242","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8937","4.048623","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8938","4.048632","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8939","4.049600","172.30.1.205","172.30.1.104","TCP","74","41732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907276 TSecr=0 WS=128" +"8940","4.049899","172.30.1.104","172.30.1.205","TCP","66","135 > 41732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8941","4.049910","172.30.1.205","172.30.1.104","TCP","54","41732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8942","4.050266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8943","4.050575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8944","4.050585","172.30.1.205","172.30.1.104","TCP","54","41732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8945","4.052817","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8946","4.053242","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8947","4.053249","172.30.1.205","172.30.1.104","TCP","54","41732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8948","4.055061","172.30.1.205","172.30.1.104","TCP","54","41732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8949","4.055180","172.30.1.205","172.30.1.104","TCP","74","34370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907281 TSecr=0 WS=128" +"8950","4.055381","172.30.1.104","172.30.1.205","TCP","54","135 > 41732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8951","4.055407","172.30.1.104","172.30.1.205","TCP","54","135 > 41732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8952","4.055413","172.30.1.205","172.30.1.104","TCP","54","41732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8953","4.055452","172.30.1.104","172.30.1.205","TCP","66","49671 > 34370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8954","4.055460","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8955","4.055806","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8956","4.056130","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8957","4.056144","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8958","4.058163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8959","4.058563","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8960","4.058572","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8961","4.060007","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8962","4.061304","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8963","4.061315","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8964","4.062294","172.30.1.205","172.30.1.104","TCP","74","41736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907288 TSecr=0 WS=128" +"8965","4.062590","172.30.1.104","172.30.1.205","TCP","66","135 > 41736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8966","4.062601","172.30.1.205","172.30.1.104","TCP","54","41736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8967","4.062963","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8968","4.063251","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8969","4.063261","172.30.1.205","172.30.1.104","TCP","54","41736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8970","4.065501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8971","4.065862","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8972","4.065869","172.30.1.205","172.30.1.104","TCP","54","41736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8973","4.067684","172.30.1.205","172.30.1.104","TCP","54","41736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8974","4.067797","172.30.1.205","172.30.1.104","TCP","74","34374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907294 TSecr=0 WS=128" +"8975","4.067963","172.30.1.104","172.30.1.205","TCP","54","135 > 41736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8976","4.067998","172.30.1.104","172.30.1.205","TCP","54","135 > 41736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"8977","4.068004","172.30.1.205","172.30.1.104","TCP","54","41736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"8978","4.068089","172.30.1.104","172.30.1.205","TCP","66","49671 > 34374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8979","4.068097","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8980","4.068462","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"8981","4.068734","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8982","4.068745","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8983","4.070647","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"8984","4.070994","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"8985","4.071000","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"8986","4.072358","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"8987","4.073578","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"8988","4.073588","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"8989","4.074552","172.30.1.205","172.30.1.104","TCP","74","41740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907300 TSecr=0 WS=128" +"8990","4.074862","172.30.1.104","172.30.1.205","TCP","66","135 > 41740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"8991","4.074872","172.30.1.205","172.30.1.104","TCP","54","41740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"8992","4.075226","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"8993","4.075512","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"8994","4.075521","172.30.1.205","172.30.1.104","TCP","54","41740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"8995","4.077721","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"8996","4.078132","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"8997","4.078139","172.30.1.205","172.30.1.104","TCP","54","41740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8998","4.079952","172.30.1.205","172.30.1.104","TCP","54","41740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"8999","4.080069","172.30.1.205","172.30.1.104","TCP","74","34378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907306 TSecr=0 WS=128" +"9000","4.080221","172.30.1.104","172.30.1.205","TCP","54","135 > 41740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9001","4.080231","172.30.1.104","172.30.1.205","TCP","54","135 > 41740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9002","4.080237","172.30.1.205","172.30.1.104","TCP","54","41740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9003","4.080339","172.30.1.104","172.30.1.205","TCP","66","49671 > 34378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9004","4.080348","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9005","4.080696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9006","4.080979","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9007","4.080988","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9008","4.082869","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9009","4.083236","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9010","4.083243","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9011","4.084580","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9012","4.085834","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9013","4.085844","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9014","4.086788","172.30.1.205","172.30.1.104","TCP","74","41744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907313 TSecr=0 WS=128" +"9015","4.087081","172.30.1.104","172.30.1.205","TCP","66","135 > 41744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9016","4.087092","172.30.1.205","172.30.1.104","TCP","54","41744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9017","4.087438","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9018","4.087708","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9019","4.087717","172.30.1.205","172.30.1.104","TCP","54","41744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9020","4.089926","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9021","4.090307","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9022","4.090314","172.30.1.205","172.30.1.104","TCP","54","41744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9023","4.092114","172.30.1.205","172.30.1.104","TCP","54","41744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9024","4.092232","172.30.1.205","172.30.1.104","TCP","74","34382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907318 TSecr=0 WS=128" +"9025","4.092385","172.30.1.104","172.30.1.205","TCP","54","135 > 41744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9026","4.092394","172.30.1.104","172.30.1.205","TCP","54","135 > 41744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9027","4.092400","172.30.1.205","172.30.1.104","TCP","54","41744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9028","4.092513","172.30.1.104","172.30.1.205","TCP","66","49671 > 34382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9029","4.092522","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9030","4.092893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9031","4.093196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9032","4.093206","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9033","4.095078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9034","4.095422","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9035","4.095428","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9036","4.096788","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9037","4.098158","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9038","4.098167","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9039","4.099098","172.30.1.205","172.30.1.104","TCP","74","41748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907325 TSecr=0 WS=128" +"9040","4.099401","172.30.1.104","172.30.1.205","TCP","66","135 > 41748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9041","4.099412","172.30.1.205","172.30.1.104","TCP","54","41748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9042","4.099760","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9043","4.100032","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9044","4.100041","172.30.1.205","172.30.1.104","TCP","54","41748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9045","4.102263","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9046","4.102627","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9047","4.102633","172.30.1.205","172.30.1.104","TCP","54","41748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9048","4.104422","172.30.1.205","172.30.1.104","TCP","54","41748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9049","4.104537","172.30.1.205","172.30.1.104","TCP","74","34386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907330 TSecr=0 WS=128" +"9050","4.104734","172.30.1.104","172.30.1.205","TCP","54","135 > 41748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9051","4.104749","172.30.1.104","172.30.1.205","TCP","54","135 > 41748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9052","4.104757","172.30.1.205","172.30.1.104","TCP","54","41748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9053","4.104841","172.30.1.104","172.30.1.205","TCP","66","49671 > 34386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9054","4.104854","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9055","4.105574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9056","4.105876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9057","4.105886","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9058","4.107781","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9059","4.108142","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9060","4.108149","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9061","4.109534","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9062","4.110821","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9063","4.110830","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9064","4.111786","172.30.1.205","172.30.1.104","TCP","74","41752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907338 TSecr=0 WS=128" +"9065","4.112076","172.30.1.104","172.30.1.205","TCP","66","135 > 41752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9066","4.112090","172.30.1.205","172.30.1.104","TCP","54","41752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9067","4.112456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9068","4.112736","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9069","4.112745","172.30.1.205","172.30.1.104","TCP","54","41752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9070","4.114947","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9071","4.115323","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9072","4.115330","172.30.1.205","172.30.1.104","TCP","54","41752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9073","4.117156","172.30.1.205","172.30.1.104","TCP","54","41752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9074","4.117270","172.30.1.205","172.30.1.104","TCP","74","34390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907343 TSecr=0 WS=128" +"9075","4.117434","172.30.1.104","172.30.1.205","TCP","54","135 > 41752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9076","4.117448","172.30.1.104","172.30.1.205","TCP","54","135 > 41752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9077","4.117454","172.30.1.205","172.30.1.104","TCP","54","41752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9078","4.117569","172.30.1.104","172.30.1.205","TCP","66","49671 > 34390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9079","4.117578","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9080","4.117928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9081","4.118259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9082","4.118268","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9083","4.120135","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9084","4.120505","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9085","4.120512","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9086","4.121887","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9087","4.123189","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9088","4.123198","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9089","4.124168","172.30.1.205","172.30.1.104","TCP","74","41756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907350 TSecr=0 WS=128" +"9090","4.124458","172.30.1.104","172.30.1.205","TCP","66","135 > 41756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9091","4.124469","172.30.1.205","172.30.1.104","TCP","54","41756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9092","4.124845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9093","4.125141","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9094","4.125150","172.30.1.205","172.30.1.104","TCP","54","41756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9095","4.127339","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9096","4.127718","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9097","4.127724","172.30.1.205","172.30.1.104","TCP","54","41756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9098","4.128566","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9099","4.128621","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9100","4.128659","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9101","4.128689","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9102","4.128721","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9103","4.128752","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9104","4.128809","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9105","4.128846","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9106","4.128873","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9107","4.128896","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9108","4.128921","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9109","4.128996","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9110","4.129156","172.30.1.104","172.30.1.205","TCP","54","49671 > 34350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9111","4.129166","172.30.1.104","172.30.1.205","TCP","54","49671 > 34350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9112","4.129173","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9113","4.129180","172.30.1.104","172.30.1.205","TCP","54","49671 > 34354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9114","4.129184","172.30.1.104","172.30.1.205","TCP","54","49671 > 34358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9115","4.129187","172.30.1.104","172.30.1.205","TCP","54","49671 > 34362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9116","4.129193","172.30.1.104","172.30.1.205","TCP","54","49671 > 34362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9117","4.129195","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9118","4.129197","172.30.1.104","172.30.1.205","TCP","54","49671 > 34354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9119","4.129198","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9120","4.129200","172.30.1.104","172.30.1.205","TCP","54","49671 > 34358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9121","4.129201","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9122","4.129202","172.30.1.104","172.30.1.205","TCP","54","49671 > 34366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9123","4.129210","172.30.1.104","172.30.1.205","TCP","54","49671 > 34370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9124","4.129528","172.30.1.104","172.30.1.205","TCP","54","49671 > 34366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9125","4.129534","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9126","4.129541","172.30.1.104","172.30.1.205","TCP","54","49671 > 34374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9127","4.129547","172.30.1.104","172.30.1.205","TCP","54","49671 > 34370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9128","4.129553","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9129","4.129554","172.30.1.104","172.30.1.205","TCP","54","49671 > 34374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9130","4.129556","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9131","4.129557","172.30.1.104","172.30.1.205","TCP","54","49671 > 34378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9132","4.129560","172.30.1.104","172.30.1.205","TCP","54","49671 > 34382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9133","4.129562","172.30.1.104","172.30.1.205","TCP","54","49671 > 34386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9134","4.129565","172.30.1.104","172.30.1.205","TCP","54","49671 > 34390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9135","4.129567","172.30.1.104","172.30.1.205","TCP","54","49671 > 34378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9136","4.129569","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9137","4.129570","172.30.1.104","172.30.1.205","TCP","54","49671 > 34390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9138","4.129572","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9139","4.129574","172.30.1.104","172.30.1.205","TCP","54","49671 > 34382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9140","4.129576","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9141","4.129577","172.30.1.104","172.30.1.205","TCP","54","49671 > 34386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9142","4.129579","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9143","4.129677","172.30.1.104","172.30.1.205","TCP","54","49671 > 34346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9144","4.129694","172.30.1.104","172.30.1.205","TCP","54","49671 > 34346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9145","4.129699","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9146","4.130456","172.30.1.205","172.30.1.104","TCP","54","41756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9147","4.130575","172.30.1.205","172.30.1.104","TCP","74","34394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907356 TSecr=0 WS=128" +"9148","4.130697","172.30.1.104","172.30.1.205","TCP","54","135 > 41756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9149","4.130711","172.30.1.104","172.30.1.205","TCP","54","135 > 41756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9150","4.130717","172.30.1.205","172.30.1.104","TCP","54","41756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9151","4.130823","172.30.1.104","172.30.1.205","TCP","66","49671 > 34394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9152","4.130831","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9153","4.131192","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9154","4.131473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9155","4.131482","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9156","4.133401","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9157","4.133754","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9158","4.133761","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9159","4.135120","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9160","4.136427","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9161","4.136437","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9162","4.137433","172.30.1.205","172.30.1.104","TCP","74","41760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907363 TSecr=0 WS=128" +"9163","4.137825","172.30.1.104","172.30.1.205","TCP","66","135 > 41760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9164","4.137836","172.30.1.205","172.30.1.104","TCP","54","41760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9165","4.138190","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9166","4.138473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9167","4.138482","172.30.1.205","172.30.1.104","TCP","54","41760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9168","4.140799","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9169","4.141190","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9170","4.141196","172.30.1.205","172.30.1.104","TCP","54","41760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9171","4.143059","172.30.1.205","172.30.1.104","TCP","54","41760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9172","4.143174","172.30.1.205","172.30.1.104","TCP","74","34398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907369 TSecr=0 WS=128" +"9173","4.143403","172.30.1.104","172.30.1.205","TCP","54","135 > 41760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9174","4.143461","172.30.1.104","172.30.1.205","TCP","66","49671 > 34398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9175","4.143470","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9176","4.143501","172.30.1.104","172.30.1.205","TCP","54","135 > 41760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9177","4.143507","172.30.1.205","172.30.1.104","TCP","54","41760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9178","4.143864","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9179","4.144157","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9180","4.144166","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9181","4.146055","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9182","4.146401","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9183","4.146408","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9184","4.147746","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9185","4.149079","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9186","4.149089","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9187","4.150024","172.30.1.205","172.30.1.104","TCP","74","41764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907376 TSecr=0 WS=128" +"9188","4.150366","172.30.1.104","172.30.1.205","TCP","66","135 > 41764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9189","4.150376","172.30.1.205","172.30.1.104","TCP","54","41764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9190","4.150723","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9191","4.151002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9192","4.151011","172.30.1.205","172.30.1.104","TCP","54","41764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9193","4.153214","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9194","4.153611","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9195","4.153618","172.30.1.205","172.30.1.104","TCP","54","41764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9196","4.155416","172.30.1.205","172.30.1.104","TCP","54","41764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9197","4.155525","172.30.1.205","172.30.1.104","TCP","74","34402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907381 TSecr=0 WS=128" +"9198","4.155697","172.30.1.104","172.30.1.205","TCP","54","135 > 41764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9199","4.155703","172.30.1.104","172.30.1.205","TCP","54","135 > 41764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9200","4.155708","172.30.1.205","172.30.1.104","TCP","54","41764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9201","4.155811","172.30.1.104","172.30.1.205","TCP","66","49671 > 34402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9202","4.155825","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9203","4.156165","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9204","4.156447","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9205","4.156456","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9206","4.158329","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9207","4.158703","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9208","4.158710","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9209","4.160054","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9210","4.161340","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9211","4.161349","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9212","4.162291","172.30.1.205","172.30.1.104","TCP","74","41768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907388 TSecr=0 WS=128" +"9213","4.162579","172.30.1.104","172.30.1.205","TCP","66","135 > 41768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9214","4.162590","172.30.1.205","172.30.1.104","TCP","54","41768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9215","4.162935","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9216","4.163224","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9217","4.163232","172.30.1.205","172.30.1.104","TCP","54","41768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9218","4.165452","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9219","4.165817","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9220","4.165824","172.30.1.205","172.30.1.104","TCP","54","41768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9221","4.167665","172.30.1.205","172.30.1.104","TCP","54","41768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9222","4.167774","172.30.1.205","172.30.1.104","TCP","74","34406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907394 TSecr=0 WS=128" +"9223","4.167948","172.30.1.104","172.30.1.205","TCP","54","135 > 41768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9224","4.167957","172.30.1.104","172.30.1.205","TCP","54","135 > 41768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9225","4.167962","172.30.1.205","172.30.1.104","TCP","54","41768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9226","4.168046","172.30.1.104","172.30.1.205","TCP","66","49671 > 34406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9227","4.168054","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9228","4.168423","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9229","4.168703","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9230","4.168712","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9231","4.170591","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9232","4.170958","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9233","4.170964","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9234","4.172364","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9235","4.173643","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9236","4.173652","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9237","4.174617","172.30.1.205","172.30.1.104","TCP","74","41772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907401 TSecr=0 WS=128" +"9238","4.174898","172.30.1.104","172.30.1.205","TCP","66","135 > 41772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9239","4.174908","172.30.1.205","172.30.1.104","TCP","54","41772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9240","4.175259","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9241","4.175540","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9242","4.175549","172.30.1.205","172.30.1.104","TCP","54","41772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9243","4.177743","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9244","4.178099","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9245","4.178106","172.30.1.205","172.30.1.104","TCP","54","41772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9246","4.179899","172.30.1.205","172.30.1.104","TCP","54","41772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9247","4.180009","172.30.1.205","172.30.1.104","TCP","74","34410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907406 TSecr=0 WS=128" +"9248","4.180192","172.30.1.104","172.30.1.205","TCP","54","135 > 41772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9249","4.180202","172.30.1.104","172.30.1.205","TCP","54","135 > 41772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9250","4.180208","172.30.1.205","172.30.1.104","TCP","54","41772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9251","4.180293","172.30.1.104","172.30.1.205","TCP","66","49671 > 34410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9252","4.180302","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9253","4.180677","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9254","4.180973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9255","4.180982","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9256","4.182846","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9257","4.183210","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9258","4.183220","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9259","4.184670","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9260","4.185924","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9261","4.185943","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9262","4.186968","172.30.1.205","172.30.1.104","TCP","74","41776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907413 TSecr=0 WS=128" +"9263","4.187277","172.30.1.104","172.30.1.205","TCP","66","135 > 41776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9264","4.187293","172.30.1.205","172.30.1.104","TCP","54","41776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9265","4.187642","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9266","4.187953","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9267","4.187962","172.30.1.205","172.30.1.104","TCP","54","41776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9268","4.190181","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9269","4.190567","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9270","4.190574","172.30.1.205","172.30.1.104","TCP","54","41776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9271","4.192383","172.30.1.205","172.30.1.104","TCP","54","41776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9272","4.192498","172.30.1.205","172.30.1.104","TCP","74","34414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907418 TSecr=0 WS=128" +"9273","4.192650","172.30.1.104","172.30.1.205","TCP","54","135 > 41776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9274","4.192681","172.30.1.104","172.30.1.205","TCP","54","135 > 41776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9275","4.192687","172.30.1.205","172.30.1.104","TCP","54","41776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9276","4.192769","172.30.1.104","172.30.1.205","TCP","66","49671 > 34414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9277","4.192788","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9278","4.193145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9279","4.193426","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9280","4.193435","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9281","4.195311","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9282","4.195691","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9283","4.195697","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9284","4.197082","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9285","4.198322","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9286","4.198332","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9287","4.199262","172.30.1.205","172.30.1.104","TCP","74","41780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907425 TSecr=0 WS=128" +"9288","4.199570","172.30.1.104","172.30.1.205","TCP","66","135 > 41780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9289","4.199580","172.30.1.205","172.30.1.104","TCP","54","41780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9290","4.199928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9291","4.200273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9292","4.200283","172.30.1.205","172.30.1.104","TCP","54","41780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9293","4.202510","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9294","4.202887","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9295","4.202894","172.30.1.205","172.30.1.104","TCP","54","41780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9296","4.204702","172.30.1.205","172.30.1.104","TCP","54","41780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9297","4.204836","172.30.1.205","172.30.1.104","TCP","74","34418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907431 TSecr=0 WS=128" +"9298","4.204969","172.30.1.104","172.30.1.205","TCP","54","135 > 41780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9299","4.205003","172.30.1.104","172.30.1.205","TCP","54","135 > 41780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9300","4.205009","172.30.1.205","172.30.1.104","TCP","54","41780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9301","4.205124","172.30.1.104","172.30.1.205","TCP","66","49671 > 34418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9302","4.205133","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9303","4.205480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9304","4.205775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9305","4.205781","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9306","4.207659","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9307","4.208048","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9308","4.208054","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9309","4.209439","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9310","4.210765","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9311","4.210787","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9312","4.211724","172.30.1.205","172.30.1.104","TCP","74","41784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907438 TSecr=0 WS=128" +"9313","4.212005","172.30.1.104","172.30.1.205","TCP","66","135 > 41784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9314","4.212016","172.30.1.205","172.30.1.104","TCP","54","41784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9315","4.212366","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9316","4.212667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9317","4.212676","172.30.1.205","172.30.1.104","TCP","54","41784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9318","4.214905","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9319","4.215310","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9320","4.215317","172.30.1.205","172.30.1.104","TCP","54","41784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9321","4.217167","172.30.1.205","172.30.1.104","TCP","54","41784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9322","4.217278","172.30.1.205","172.30.1.104","TCP","74","34422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907443 TSecr=0 WS=128" +"9323","4.217443","172.30.1.104","172.30.1.205","TCP","54","135 > 41784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9324","4.217460","172.30.1.104","172.30.1.205","TCP","54","135 > 41784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9325","4.217466","172.30.1.205","172.30.1.104","TCP","54","41784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9326","4.217558","172.30.1.104","172.30.1.205","TCP","66","49671 > 34422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9327","4.217567","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9328","4.217916","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9329","4.218221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9330","4.218230","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9331","4.220078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9332","4.220554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9333","4.220560","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9334","4.221941","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9335","4.223268","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9336","4.223283","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9337","4.224211","172.30.1.205","172.30.1.104","TCP","74","41788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907450 TSecr=0 WS=128" +"9338","4.224506","172.30.1.104","172.30.1.205","TCP","66","135 > 41788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9339","4.224517","172.30.1.205","172.30.1.104","TCP","54","41788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9340","4.224891","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9341","4.225173","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9342","4.225182","172.30.1.205","172.30.1.104","TCP","54","41788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9343","4.227341","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9344","4.227748","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9345","4.227755","172.30.1.205","172.30.1.104","TCP","54","41788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9346","4.229582","172.30.1.205","172.30.1.104","TCP","54","41788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9347","4.229692","172.30.1.205","172.30.1.104","TCP","74","34426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907456 TSecr=0 WS=128" +"9348","4.229853","172.30.1.104","172.30.1.205","TCP","54","135 > 41788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9349","4.229892","172.30.1.104","172.30.1.205","TCP","54","135 > 41788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9350","4.229898","172.30.1.205","172.30.1.104","TCP","54","41788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9351","4.229983","172.30.1.104","172.30.1.205","TCP","66","49671 > 34426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9352","4.229991","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9353","4.230332","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9354","4.230613","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9355","4.230623","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9356","4.232464","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9357","4.233188","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9358","4.233196","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9359","4.234553","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9360","4.235914","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9361","4.235924","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9362","4.236878","172.30.1.205","172.30.1.104","TCP","74","41792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907463 TSecr=0 WS=128" +"9363","4.237180","172.30.1.104","172.30.1.205","TCP","66","135 > 41792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9364","4.237190","172.30.1.205","172.30.1.104","TCP","54","41792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9365","4.237538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9366","4.237834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9367","4.237843","172.30.1.205","172.30.1.104","TCP","54","41792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9368","4.240004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9369","4.240384","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9370","4.240391","172.30.1.205","172.30.1.104","TCP","54","41792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9371","4.242208","172.30.1.205","172.30.1.104","TCP","54","41792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9372","4.242319","172.30.1.205","172.30.1.104","TCP","74","34430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907468 TSecr=0 WS=128" +"9373","4.242467","172.30.1.104","172.30.1.205","TCP","54","135 > 41792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9374","4.242510","172.30.1.104","172.30.1.205","TCP","54","135 > 41792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9375","4.242515","172.30.1.205","172.30.1.104","TCP","54","41792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9376","4.242599","172.30.1.104","172.30.1.205","TCP","66","49671 > 34430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9377","4.242608","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9378","4.242950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9379","4.243252","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9380","4.243262","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9381","4.245156","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9382","4.246009","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9383","4.246016","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9384","4.247347","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9385","4.248657","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9386","4.248667","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9387","4.249614","172.30.1.205","172.30.1.104","TCP","74","41796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907476 TSecr=0 WS=128" +"9388","4.249899","172.30.1.104","172.30.1.205","TCP","66","135 > 41796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9389","4.249910","172.30.1.205","172.30.1.104","TCP","54","41796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9390","4.250259","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9391","4.250527","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9392","4.250537","172.30.1.205","172.30.1.104","TCP","54","41796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9393","4.252728","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9394","4.253083","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9395","4.253090","172.30.1.205","172.30.1.104","TCP","54","41796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9396","4.254890","172.30.1.205","172.30.1.104","TCP","54","41796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9397","4.255001","172.30.1.205","172.30.1.104","TCP","74","34434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907481 TSecr=0 WS=128" +"9398","4.255203","172.30.1.104","172.30.1.205","TCP","54","135 > 41796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9399","4.255224","172.30.1.104","172.30.1.205","TCP","54","135 > 41796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9400","4.255230","172.30.1.205","172.30.1.104","TCP","54","41796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9401","4.255301","172.30.1.104","172.30.1.205","TCP","66","49671 > 34434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9402","4.255309","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9403","4.255655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9404","4.255938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9405","4.255947","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9406","4.257909","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9407","4.258270","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9408","4.258276","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9409","4.259608","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9410","4.260851","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9411","4.260861","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9412","4.261795","172.30.1.205","172.30.1.104","TCP","74","41800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907488 TSecr=0 WS=128" +"9413","4.262082","172.30.1.104","172.30.1.205","TCP","66","135 > 41800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9414","4.262093","172.30.1.205","172.30.1.104","TCP","54","41800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9415","4.262439","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9416","4.262726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9417","4.262738","172.30.1.205","172.30.1.104","TCP","54","41800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9418","4.264960","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9419","4.265398","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9420","4.265404","172.30.1.205","172.30.1.104","TCP","54","41800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9421","4.267201","172.30.1.205","172.30.1.104","TCP","54","41800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9422","4.267319","172.30.1.205","172.30.1.104","TCP","74","34438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907493 TSecr=0 WS=128" +"9423","4.267473","172.30.1.104","172.30.1.205","TCP","54","135 > 41800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9424","4.267492","172.30.1.104","172.30.1.205","TCP","54","135 > 41800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9425","4.267497","172.30.1.205","172.30.1.104","TCP","54","41800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9426","4.267591","172.30.1.104","172.30.1.205","TCP","66","49671 > 34438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9427","4.267599","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9428","4.267951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9429","4.268209","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9430","4.268218","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9431","4.270112","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9432","4.270462","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9433","4.270468","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9434","4.271800","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9435","4.274086","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9436","4.274096","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9437","4.275033","172.30.1.205","172.30.1.104","TCP","74","41804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907501 TSecr=0 WS=128" +"9438","4.275366","172.30.1.104","172.30.1.205","TCP","66","135 > 41804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9439","4.275377","172.30.1.205","172.30.1.104","TCP","54","41804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9440","4.275723","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9441","4.276013","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9442","4.276022","172.30.1.205","172.30.1.104","TCP","54","41804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9443","4.278210","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9444","4.278601","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9445","4.278607","172.30.1.205","172.30.1.104","TCP","54","41804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9446","4.279456","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9447","4.279504","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9448","4.279541","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9449","4.279575","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9450","4.279607","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9451","4.279639","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9452","4.279667","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9453","4.279694","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9454","4.279721","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9455","4.279742","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9456","4.279763","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9457","4.279770","172.30.1.104","172.30.1.205","TCP","54","49671 > 34398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9458","4.279788","172.30.1.104","172.30.1.205","TCP","54","49671 > 34402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9459","4.279870","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9460","4.279909","172.30.1.104","172.30.1.205","TCP","54","49671 > 34398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9461","4.279916","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9462","4.279928","172.30.1.104","172.30.1.205","TCP","54","49671 > 34406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9463","4.279961","172.30.1.104","172.30.1.205","TCP","54","49671 > 34402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9464","4.279966","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9465","4.279980","172.30.1.104","172.30.1.205","TCP","54","49671 > 34406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9466","4.279983","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9467","4.279998","172.30.1.104","172.30.1.205","TCP","54","49671 > 34410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9468","4.280017","172.30.1.104","172.30.1.205","TCP","54","49671 > 34414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9469","4.280118","172.30.1.104","172.30.1.205","TCP","54","49671 > 34418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9470","4.280138","172.30.1.104","172.30.1.205","TCP","54","49671 > 34410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9471","4.280143","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9472","4.280156","172.30.1.104","172.30.1.205","TCP","54","49671 > 34414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9473","4.280159","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9474","4.280178","172.30.1.104","172.30.1.205","TCP","54","49671 > 34418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9475","4.280182","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9476","4.280197","172.30.1.104","172.30.1.205","TCP","54","49671 > 34422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9477","4.280215","172.30.1.104","172.30.1.205","TCP","54","49671 > 34426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9478","4.280234","172.30.1.104","172.30.1.205","TCP","54","49671 > 34430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9479","4.280253","172.30.1.104","172.30.1.205","TCP","54","49671 > 34422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9480","4.280257","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9481","4.280273","172.30.1.104","172.30.1.205","TCP","54","49671 > 34434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9482","4.280432","172.30.1.104","172.30.1.205","TCP","54","49671 > 34438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9483","4.280451","172.30.1.104","172.30.1.205","TCP","54","49671 > 34438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9484","4.280456","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9485","4.280471","172.30.1.104","172.30.1.205","TCP","54","49671 > 34434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9486","4.280474","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9487","4.280494","172.30.1.104","172.30.1.205","TCP","54","49671 > 34426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9488","4.280496","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9489","4.280514","172.30.1.104","172.30.1.205","TCP","54","49671 > 34430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9490","4.280517","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9491","4.280535","172.30.1.104","172.30.1.205","TCP","54","49671 > 34394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9492","4.280643","172.30.1.104","172.30.1.205","TCP","54","49671 > 34394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9493","4.280647","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9494","4.281445","172.30.1.205","172.30.1.104","TCP","54","41804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9495","4.281554","172.30.1.205","172.30.1.104","TCP","74","34442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907507 TSecr=0 WS=128" +"9496","4.281699","172.30.1.104","172.30.1.205","TCP","54","135 > 41804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9497","4.281713","172.30.1.104","172.30.1.205","TCP","54","135 > 41804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9498","4.281718","172.30.1.205","172.30.1.104","TCP","54","41804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9499","4.281815","172.30.1.104","172.30.1.205","TCP","66","49671 > 34442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9500","4.281823","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9501","4.282172","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9502","4.282449","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9503","4.282458","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9504","4.284389","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9505","4.284765","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9506","4.284771","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9507","4.286151","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9508","4.287426","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9509","4.287435","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9510","4.288381","172.30.1.205","172.30.1.104","TCP","74","41808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907514 TSecr=0 WS=128" +"9511","4.288665","172.30.1.104","172.30.1.205","TCP","66","135 > 41808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9512","4.288676","172.30.1.205","172.30.1.104","TCP","54","41808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9513","4.289062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9514","4.289353","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9515","4.289362","172.30.1.205","172.30.1.104","TCP","54","41808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9516","4.291530","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9517","4.291899","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9518","4.291906","172.30.1.205","172.30.1.104","TCP","54","41808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9519","4.293740","172.30.1.205","172.30.1.104","TCP","54","41808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9520","4.293857","172.30.1.205","172.30.1.104","TCP","74","34446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907520 TSecr=0 WS=128" +"9521","4.293995","172.30.1.104","172.30.1.205","TCP","54","135 > 41808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9522","4.294037","172.30.1.104","172.30.1.205","TCP","54","135 > 41808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9523","4.294042","172.30.1.205","172.30.1.104","TCP","54","41808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9524","4.294117","172.30.1.104","172.30.1.205","TCP","66","49671 > 34446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9525","4.294126","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9526","4.294468","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9527","4.295279","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9528","4.295286","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9529","4.297163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9530","4.298794","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9531","4.298801","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9532","4.300156","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9533","4.301456","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9534","4.301465","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9535","4.302398","172.30.1.205","172.30.1.104","TCP","74","41812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907528 TSecr=0 WS=128" +"9536","4.302677","172.30.1.104","172.30.1.205","TCP","66","135 > 41812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9537","4.302688","172.30.1.205","172.30.1.104","TCP","54","41812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9538","4.303035","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9539","4.303342","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9540","4.303351","172.30.1.205","172.30.1.104","TCP","54","41812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9541","4.305542","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9542","4.305933","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9543","4.305940","172.30.1.205","172.30.1.104","TCP","54","41812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9544","4.307738","172.30.1.205","172.30.1.104","TCP","54","41812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9545","4.307848","172.30.1.205","172.30.1.104","TCP","74","34450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907534 TSecr=0 WS=128" +"9546","4.307999","172.30.1.104","172.30.1.205","TCP","54","135 > 41812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9547","4.308035","172.30.1.104","172.30.1.205","TCP","54","135 > 41812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9548","4.308040","172.30.1.205","172.30.1.104","TCP","54","41812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9549","4.308121","172.30.1.104","172.30.1.205","TCP","66","49671 > 34450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9550","4.308130","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9551","4.308478","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9552","4.308784","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9553","4.308792","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9554","4.310671","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9555","4.311041","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9556","4.311047","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9557","4.312406","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9558","4.313712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9559","4.313722","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9560","4.314659","172.30.1.205","172.30.1.104","TCP","74","41816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907541 TSecr=0 WS=128" +"9561","4.314995","172.30.1.104","172.30.1.205","TCP","66","135 > 41816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9562","4.315005","172.30.1.205","172.30.1.104","TCP","54","41816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9563","4.315348","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9564","4.315650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9565","4.315671","172.30.1.205","172.30.1.104","TCP","54","41816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9566","4.318107","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9567","4.318498","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9568","4.318504","172.30.1.205","172.30.1.104","TCP","54","41816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9569","4.320328","172.30.1.205","172.30.1.104","TCP","54","41816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9570","4.320441","172.30.1.205","172.30.1.104","TCP","74","34454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907546 TSecr=0 WS=128" +"9571","4.320597","172.30.1.104","172.30.1.205","TCP","54","135 > 41816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9572","4.320608","172.30.1.104","172.30.1.205","TCP","54","135 > 41816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9573","4.320613","172.30.1.205","172.30.1.104","TCP","54","41816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9574","4.320728","172.30.1.104","172.30.1.205","TCP","66","49671 > 34454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9575","4.320737","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9576","4.321100","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9577","4.321379","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9578","4.321387","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9579","4.323251","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9580","4.323616","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9581","4.323623","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9582","4.324990","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9583","4.326263","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9584","4.326275","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9585","4.327216","172.30.1.205","172.30.1.104","TCP","74","41820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907553 TSecr=0 WS=128" +"9586","4.327533","172.30.1.104","172.30.1.205","TCP","66","135 > 41820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9587","4.327543","172.30.1.205","172.30.1.104","TCP","54","41820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9588","4.327890","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9589","4.328161","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9590","4.328171","172.30.1.205","172.30.1.104","TCP","54","41820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9591","4.330386","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9592","4.330776","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9593","4.330783","172.30.1.205","172.30.1.104","TCP","54","41820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9594","4.332630","172.30.1.205","172.30.1.104","TCP","54","41820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9595","4.332740","172.30.1.205","172.30.1.104","TCP","74","34458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907559 TSecr=0 WS=128" +"9596","4.332902","172.30.1.104","172.30.1.205","TCP","54","135 > 41820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9597","4.332940","172.30.1.104","172.30.1.205","TCP","54","135 > 41820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9598","4.332958","172.30.1.205","172.30.1.104","TCP","54","41820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9599","4.333023","172.30.1.104","172.30.1.205","TCP","66","49671 > 34458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9600","4.333032","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9601","4.333383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9602","4.333671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9603","4.333677","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9604","4.335525","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9605","4.335897","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9606","4.335903","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9607","4.337276","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9608","4.338553","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9609","4.338563","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9610","4.339491","172.30.1.205","172.30.1.104","TCP","74","41824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907565 TSecr=0 WS=128" +"9611","4.339816","172.30.1.104","172.30.1.205","TCP","66","135 > 41824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9612","4.339827","172.30.1.205","172.30.1.104","TCP","54","41824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9613","4.340172","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9614","4.340456","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9615","4.340465","172.30.1.205","172.30.1.104","TCP","54","41824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9616","4.342653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9617","4.343031","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9618","4.343038","172.30.1.205","172.30.1.104","TCP","54","41824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9619","4.344861","172.30.1.205","172.30.1.104","TCP","54","41824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9620","4.344971","172.30.1.205","172.30.1.104","TCP","74","34462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907571 TSecr=0 WS=128" +"9621","4.345121","172.30.1.104","172.30.1.205","TCP","54","135 > 41824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9622","4.345156","172.30.1.104","172.30.1.205","TCP","54","135 > 41824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9623","4.345162","172.30.1.205","172.30.1.104","TCP","54","41824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9624","4.345260","172.30.1.104","172.30.1.205","TCP","66","49671 > 34462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9625","4.345268","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9626","4.345617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9627","4.345893","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9628","4.345902","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9629","4.347747","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9630","4.348125","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9631","4.348132","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9632","4.349512","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9633","4.350851","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9634","4.350860","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9635","4.351790","172.30.1.205","172.30.1.104","TCP","74","41828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907578 TSecr=0 WS=128" +"9636","4.352077","172.30.1.104","172.30.1.205","TCP","66","135 > 41828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9637","4.352087","172.30.1.205","172.30.1.104","TCP","54","41828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9638","4.352440","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9639","4.352732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9640","4.352741","172.30.1.205","172.30.1.104","TCP","54","41828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9641","4.354953","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9642","4.355486","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9643","4.355492","172.30.1.205","172.30.1.104","TCP","54","41828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9644","4.357330","172.30.1.205","172.30.1.104","TCP","54","41828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9645","4.357440","172.30.1.205","172.30.1.104","TCP","74","34466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907583 TSecr=0 WS=128" +"9646","4.357583","172.30.1.104","172.30.1.205","TCP","54","135 > 41828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9647","4.357599","172.30.1.104","172.30.1.205","TCP","54","135 > 41828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9648","4.357605","172.30.1.205","172.30.1.104","TCP","54","41828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9649","4.357704","172.30.1.104","172.30.1.205","TCP","66","49671 > 34466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9650","4.357713","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9651","4.358058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9652","4.358348","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9653","4.358357","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9654","4.360242","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9655","4.360648","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9656","4.360655","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9657","4.362051","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9658","4.363326","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9659","4.363336","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9660","4.364272","172.30.1.205","172.30.1.104","TCP","74","41832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907590 TSecr=0 WS=128" +"9661","4.364567","172.30.1.104","172.30.1.205","TCP","66","135 > 41832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9662","4.364578","172.30.1.205","172.30.1.104","TCP","54","41832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9663","4.364958","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9664","4.365261","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9665","4.365270","172.30.1.205","172.30.1.104","TCP","54","41832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9666","4.367454","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9667","4.367855","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9668","4.367867","172.30.1.205","172.30.1.104","TCP","54","41832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9669","4.369868","172.30.1.205","172.30.1.104","TCP","54","41832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9670","4.369979","172.30.1.205","172.30.1.104","TCP","74","34470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907596 TSecr=0 WS=128" +"9671","4.370153","172.30.1.104","172.30.1.205","TCP","54","135 > 41832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9672","4.370240","172.30.1.104","172.30.1.205","TCP","54","135 > 41832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9673","4.370246","172.30.1.205","172.30.1.104","TCP","54","41832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9674","4.370298","172.30.1.104","172.30.1.205","TCP","66","49671 > 34470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9675","4.370306","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9676","4.370662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9677","4.371097","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9678","4.371105","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9679","4.372976","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9680","4.373322","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9681","4.373329","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9682","4.374678","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9683","4.375969","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9684","4.375978","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9685","4.376935","172.30.1.205","172.30.1.104","TCP","74","41836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907603 TSecr=0 WS=128" +"9686","4.377264","172.30.1.104","172.30.1.205","TCP","66","135 > 41836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9687","4.377275","172.30.1.205","172.30.1.104","TCP","54","41836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9688","4.377623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9689","4.377896","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9690","4.377905","172.30.1.205","172.30.1.104","TCP","54","41836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9691","4.380058","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9692","4.380403","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9693","4.380410","172.30.1.205","172.30.1.104","TCP","54","41836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9694","4.382223","172.30.1.205","172.30.1.104","TCP","54","41836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9695","4.382334","172.30.1.205","172.30.1.104","TCP","74","34474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907608 TSecr=0 WS=128" +"9696","4.382474","172.30.1.104","172.30.1.205","TCP","54","135 > 41836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9697","4.382484","172.30.1.104","172.30.1.205","TCP","54","135 > 41836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9698","4.382489","172.30.1.205","172.30.1.104","TCP","54","41836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9699","4.382588","172.30.1.104","172.30.1.205","TCP","66","49671 > 34474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9700","4.382596","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9701","4.382937","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9702","4.383205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9703","4.383214","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9704","4.385144","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9705","4.385482","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9706","4.385488","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9707","4.386814","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9708","4.388178","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9709","4.388189","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9710","4.389165","172.30.1.205","172.30.1.104","TCP","74","41840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907615 TSecr=0 WS=128" +"9711","4.389457","172.30.1.104","172.30.1.205","TCP","66","135 > 41840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9712","4.389467","172.30.1.205","172.30.1.104","TCP","54","41840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9713","4.389818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9714","4.390126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9715","4.390135","172.30.1.205","172.30.1.104","TCP","54","41840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9716","4.392374","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9717","4.392759","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9718","4.392766","172.30.1.205","172.30.1.104","TCP","54","41840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9719","4.394573","172.30.1.205","172.30.1.104","TCP","54","41840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9720","4.394685","172.30.1.205","172.30.1.104","TCP","74","34478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907621 TSecr=0 WS=128" +"9721","4.394848","172.30.1.104","172.30.1.205","TCP","54","135 > 41840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9722","4.394857","172.30.1.104","172.30.1.205","TCP","54","135 > 41840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9723","4.394863","172.30.1.205","172.30.1.104","TCP","54","41840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9724","4.394951","172.30.1.104","172.30.1.205","TCP","66","49671 > 34478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9725","4.394959","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9726","4.395306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9727","4.395590","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9728","4.395599","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9729","4.397484","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9730","4.397860","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9731","4.397866","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9732","4.399199","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9733","4.400468","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9734","4.400477","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9735","4.401423","172.30.1.205","172.30.1.104","TCP","74","41844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907627 TSecr=0 WS=128" +"9736","4.401742","172.30.1.104","172.30.1.205","TCP","66","135 > 41844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9737","4.401757","172.30.1.205","172.30.1.104","TCP","54","41844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9738","4.402106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9739","4.402450","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9740","4.402459","172.30.1.205","172.30.1.104","TCP","54","41844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9741","4.404633","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9742","4.405036","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9743","4.405043","172.30.1.205","172.30.1.104","TCP","54","41844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9744","4.406855","172.30.1.205","172.30.1.104","TCP","54","41844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9745","4.406975","172.30.1.205","172.30.1.104","TCP","74","34482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907633 TSecr=0 WS=128" +"9746","4.407127","172.30.1.104","172.30.1.205","TCP","54","135 > 41844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9747","4.407173","172.30.1.104","172.30.1.205","TCP","54","135 > 41844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9748","4.407178","172.30.1.205","172.30.1.104","TCP","54","41844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9749","4.407332","172.30.1.104","172.30.1.205","TCP","66","49671 > 34482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9750","4.407340","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9751","4.407686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9752","4.408463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9753","4.408470","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9754","4.410354","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9755","4.410802","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9756","4.410809","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9757","4.412137","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9758","4.413432","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9759","4.413441","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9760","4.414402","172.30.1.205","172.30.1.104","TCP","74","41848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907640 TSecr=0 WS=128" +"9761","4.414710","172.30.1.104","172.30.1.205","TCP","66","135 > 41848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9762","4.414721","172.30.1.205","172.30.1.104","TCP","54","41848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9763","4.415072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9764","4.415369","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9765","4.415378","172.30.1.205","172.30.1.104","TCP","54","41848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9766","4.417582","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9767","4.418019","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9768","4.418026","172.30.1.205","172.30.1.104","TCP","54","41848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9769","4.419831","172.30.1.205","172.30.1.104","TCP","54","41848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9770","4.419938","172.30.1.205","172.30.1.104","TCP","74","34486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907646 TSecr=0 WS=128" +"9771","4.420152","172.30.1.104","172.30.1.205","TCP","54","135 > 41848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9772","4.420160","172.30.1.104","172.30.1.205","TCP","54","135 > 41848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9773","4.420165","172.30.1.205","172.30.1.104","TCP","54","41848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9774","4.420235","172.30.1.104","172.30.1.205","TCP","66","49671 > 34486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9775","4.420243","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9776","4.420588","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9777","4.423013","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9778","4.423023","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9779","4.424921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9780","4.425266","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9781","4.425272","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9782","4.426664","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9783","4.429699","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9784","4.429709","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9785","4.430653","172.30.1.205","172.30.1.104","TCP","74","41852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907657 TSecr=0 WS=128" +"9786","4.430940","172.30.1.104","172.30.1.205","TCP","66","135 > 41852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9787","4.430951","172.30.1.205","172.30.1.104","TCP","54","41852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9788","4.431304","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9789","4.431593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9790","4.431602","172.30.1.205","172.30.1.104","TCP","54","41852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9791","4.433802","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9792","4.434194","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9793","4.434201","172.30.1.205","172.30.1.104","TCP","54","41852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9794","4.435036","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9795","4.435083","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9796","4.435120","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9797","4.435153","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9798","4.435187","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9799","4.435214","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9800","4.435246","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9801","4.435273","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9802","4.435295","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9803","4.435316","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9804","4.435333","172.30.1.104","172.30.1.205","TCP","54","49671 > 34446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9805","4.435352","172.30.1.104","172.30.1.205","TCP","54","49671 > 34450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9806","4.435372","172.30.1.104","172.30.1.205","TCP","54","49671 > 34446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9807","4.435377","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9808","4.435407","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9809","4.435465","172.30.1.104","172.30.1.205","TCP","54","49671 > 34454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9810","4.435479","172.30.1.104","172.30.1.205","TCP","54","49671 > 34458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9811","4.435498","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9812","4.435500","172.30.1.104","172.30.1.205","TCP","54","49671 > 34458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9813","4.435504","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9814","4.435518","172.30.1.104","172.30.1.205","TCP","54","49671 > 34450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9815","4.435521","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9816","4.435545","172.30.1.104","172.30.1.205","TCP","54","49671 > 34454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9817","4.435551","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9818","4.435674","172.30.1.104","172.30.1.205","TCP","54","49671 > 34462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9819","4.435693","172.30.1.104","172.30.1.205","TCP","54","49671 > 34466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9820","4.435712","172.30.1.104","172.30.1.205","TCP","54","49671 > 34470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9821","4.435732","172.30.1.104","172.30.1.205","TCP","54","49671 > 34470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9822","4.435737","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9823","4.435752","172.30.1.104","172.30.1.205","TCP","54","49671 > 34466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9824","4.435754","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9825","4.435771","172.30.1.104","172.30.1.205","TCP","54","49671 > 34462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9826","4.435773","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9827","4.435869","172.30.1.104","172.30.1.205","TCP","54","49671 > 34474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9828","4.435886","172.30.1.104","172.30.1.205","TCP","54","49671 > 34478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9829","4.435905","172.30.1.104","172.30.1.205","TCP","54","49671 > 34482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9830","4.435923","172.30.1.104","172.30.1.205","TCP","54","49671 > 34482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9831","4.435928","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9832","4.435942","172.30.1.104","172.30.1.205","TCP","54","49671 > 34474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9833","4.435945","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9834","4.435960","172.30.1.104","172.30.1.205","TCP","54","49671 > 34478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9835","4.435963","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9836","4.435986","172.30.1.104","172.30.1.205","TCP","54","49671 > 34486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9837","4.436003","172.30.1.104","172.30.1.205","TCP","54","49671 > 34442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9838","4.436137","172.30.1.104","172.30.1.205","TCP","54","49671 > 34486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9839","4.436142","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9840","4.436149","172.30.1.104","172.30.1.205","TCP","54","49671 > 34442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"9841","4.436150","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"9842","4.437036","172.30.1.205","172.30.1.104","TCP","54","41852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9843","4.437148","172.30.1.205","172.30.1.104","TCP","74","34490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907663 TSecr=0 WS=128" +"9844","4.437309","172.30.1.104","172.30.1.205","TCP","54","135 > 41852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9845","4.437319","172.30.1.104","172.30.1.205","TCP","54","135 > 41852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9846","4.437324","172.30.1.205","172.30.1.104","TCP","54","41852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9847","4.437430","172.30.1.104","172.30.1.205","TCP","66","49671 > 34490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9848","4.437439","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9849","4.437800","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9850","4.438073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9851","4.438081","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9852","4.439948","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9853","4.440301","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9854","4.440307","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9855","4.441706","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9856","4.443040","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9857","4.443049","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9858","4.443972","172.30.1.205","172.30.1.104","TCP","74","41856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907670 TSecr=0 WS=128" +"9859","4.444269","172.30.1.104","172.30.1.205","TCP","66","135 > 41856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9860","4.444280","172.30.1.205","172.30.1.104","TCP","54","41856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9861","4.444633","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9862","4.444932","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9863","4.444941","172.30.1.205","172.30.1.104","TCP","54","41856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9864","4.447120","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9865","4.447512","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9866","4.447518","172.30.1.205","172.30.1.104","TCP","54","41856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9867","4.449347","172.30.1.205","172.30.1.104","TCP","54","41856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9868","4.449461","172.30.1.205","172.30.1.104","TCP","74","34494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907675 TSecr=0 WS=128" +"9869","4.449641","172.30.1.104","172.30.1.205","TCP","54","135 > 41856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9870","4.449652","172.30.1.104","172.30.1.205","TCP","54","135 > 41856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9871","4.449657","172.30.1.205","172.30.1.104","TCP","54","41856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9872","4.449728","172.30.1.104","172.30.1.205","TCP","66","49671 > 34494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9873","4.449737","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9874","4.450090","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9875","4.450428","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9876","4.450443","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9877","4.452297","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9878","4.452655","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9879","4.452661","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9880","4.454031","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9881","4.455381","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9882","4.455390","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9883","4.456308","172.30.1.205","172.30.1.104","TCP","74","41860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907682 TSecr=0 WS=128" +"9884","4.456652","172.30.1.104","172.30.1.205","TCP","66","135 > 41860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9885","4.456663","172.30.1.205","172.30.1.104","TCP","54","41860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9886","4.457049","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9887","4.457343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9888","4.457352","172.30.1.205","172.30.1.104","TCP","54","41860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9889","4.459515","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9890","4.459904","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9891","4.459910","172.30.1.205","172.30.1.104","TCP","54","41860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9892","4.461734","172.30.1.205","172.30.1.104","TCP","54","41860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9893","4.461857","172.30.1.205","172.30.1.104","TCP","74","34498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907688 TSecr=0 WS=128" +"9894","4.462011","172.30.1.104","172.30.1.205","TCP","54","135 > 41860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9895","4.462032","172.30.1.104","172.30.1.205","TCP","54","135 > 41860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9896","4.462037","172.30.1.205","172.30.1.104","TCP","54","41860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9897","4.462159","172.30.1.104","172.30.1.205","TCP","66","49671 > 34498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9898","4.462168","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9899","4.462512","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9900","4.462788","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9901","4.462797","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9902","4.464639","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9903","4.465019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9904","4.465026","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9905","4.466380","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9906","4.467680","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9907","4.467689","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9908","4.468624","172.30.1.205","172.30.1.104","TCP","74","41864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907695 TSecr=0 WS=128" +"9909","4.468930","172.30.1.104","172.30.1.205","TCP","66","135 > 41864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9910","4.468941","172.30.1.205","172.30.1.104","TCP","54","41864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9911","4.469293","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9912","4.469590","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9913","4.469599","172.30.1.205","172.30.1.104","TCP","54","41864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9914","4.471764","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9915","4.472164","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9916","4.472171","172.30.1.205","172.30.1.104","TCP","54","41864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9917","4.474003","172.30.1.205","172.30.1.104","TCP","54","41864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9918","4.474115","172.30.1.205","172.30.1.104","TCP","74","34502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907700 TSecr=0 WS=128" +"9919","4.474258","172.30.1.104","172.30.1.205","TCP","54","135 > 41864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9920","4.474281","172.30.1.104","172.30.1.205","TCP","54","135 > 41864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9921","4.474286","172.30.1.205","172.30.1.104","TCP","54","41864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9922","4.474405","172.30.1.104","172.30.1.205","TCP","66","49671 > 34502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9923","4.474413","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9924","4.474752","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9925","4.475038","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9926","4.475047","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9927","4.476927","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9928","4.477327","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9929","4.477333","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9930","4.478697","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9931","4.481379","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9932","4.481388","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9933","4.482323","172.30.1.205","172.30.1.104","TCP","74","41868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907708 TSecr=0 WS=128" +"9934","4.482620","172.30.1.104","172.30.1.205","TCP","66","135 > 41868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9935","4.482630","172.30.1.205","172.30.1.104","TCP","54","41868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9936","4.483036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9937","4.483326","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9938","4.483336","172.30.1.205","172.30.1.104","TCP","54","41868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9939","4.485582","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9940","4.485985","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9941","4.485992","172.30.1.205","172.30.1.104","TCP","54","41868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9942","4.487780","172.30.1.205","172.30.1.104","TCP","54","41868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9943","4.487889","172.30.1.205","172.30.1.104","TCP","74","34506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907714 TSecr=0 WS=128" +"9944","4.488055","172.30.1.104","172.30.1.205","TCP","54","135 > 41868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9945","4.488104","172.30.1.104","172.30.1.205","TCP","54","135 > 41868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9946","4.488109","172.30.1.205","172.30.1.104","TCP","54","41868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9947","4.488187","172.30.1.104","172.30.1.205","TCP","66","49671 > 34506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9948","4.488195","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9949","4.488542","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9950","4.488827","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9951","4.488836","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9952","4.490703","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9953","4.491060","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9954","4.491067","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9955","4.492430","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9956","4.493751","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9957","4.493761","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9958","4.494686","172.30.1.205","172.30.1.104","TCP","74","41872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907721 TSecr=0 WS=128" +"9959","4.494996","172.30.1.104","172.30.1.205","TCP","66","135 > 41872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9960","4.495007","172.30.1.205","172.30.1.104","TCP","54","41872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9961","4.495352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9962","4.495638","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9963","4.495647","172.30.1.205","172.30.1.104","TCP","54","41872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9964","4.497867","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9965","4.498244","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9966","4.498251","172.30.1.205","172.30.1.104","TCP","54","41872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9967","4.500223","172.30.1.205","172.30.1.104","TCP","54","41872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9968","4.500342","172.30.1.205","172.30.1.104","TCP","74","34510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907726 TSecr=0 WS=128" +"9969","4.500559","172.30.1.104","172.30.1.205","TCP","54","135 > 41872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9970","4.500568","172.30.1.104","172.30.1.205","TCP","54","135 > 41872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9971","4.500573","172.30.1.205","172.30.1.104","TCP","54","41872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9972","4.500624","172.30.1.104","172.30.1.205","TCP","66","49671 > 34510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9973","4.500636","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9974","4.501052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"9975","4.501358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9976","4.501367","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9977","4.503373","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"9978","4.503756","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"9979","4.503775","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"9980","4.505186","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"9981","4.506524","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"9982","4.506542","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"9983","4.507523","172.30.1.205","172.30.1.104","TCP","74","41876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907733 TSecr=0 WS=128" +"9984","4.507847","172.30.1.104","172.30.1.205","TCP","66","135 > 41876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9985","4.507858","172.30.1.205","172.30.1.104","TCP","54","41876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9986","4.508231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"9987","4.508561","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"9988","4.508570","172.30.1.205","172.30.1.104","TCP","54","41876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"9989","4.510812","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"9990","4.511209","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"9991","4.511216","172.30.1.205","172.30.1.104","TCP","54","41876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9992","4.513045","172.30.1.205","172.30.1.104","TCP","54","41876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"9993","4.513156","172.30.1.205","172.30.1.104","TCP","74","34514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907739 TSecr=0 WS=128" +"9994","4.513328","172.30.1.104","172.30.1.205","TCP","54","135 > 41876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9995","4.513351","172.30.1.104","172.30.1.205","TCP","54","135 > 41876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"9996","4.513357","172.30.1.205","172.30.1.104","TCP","54","41876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"9997","4.513464","172.30.1.104","172.30.1.205","TCP","66","49671 > 34514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"9998","4.513472","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"9999","4.513825","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10000","4.514111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10001","4.514123","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10002","4.516099","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10003","4.516451","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10004","4.516458","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10005","4.517863","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10006","4.519127","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10007","4.519139","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10008","4.520106","172.30.1.205","172.30.1.104","TCP","74","41880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907746 TSecr=0 WS=128" +"10009","4.520407","172.30.1.104","172.30.1.205","TCP","66","135 > 41880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10010","4.520418","172.30.1.205","172.30.1.104","TCP","54","41880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10011","4.520771","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10012","4.521053","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10013","4.521063","172.30.1.205","172.30.1.104","TCP","54","41880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10014","4.523259","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10015","4.523629","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10016","4.523635","172.30.1.205","172.30.1.104","TCP","54","41880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10017","4.525489","172.30.1.205","172.30.1.104","TCP","54","41880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10018","4.525602","172.30.1.205","172.30.1.104","TCP","74","34518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907752 TSecr=0 WS=128" +"10019","4.525767","172.30.1.104","172.30.1.205","TCP","54","135 > 41880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10020","4.525793","172.30.1.104","172.30.1.205","TCP","54","135 > 41880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10021","4.525799","172.30.1.205","172.30.1.104","TCP","54","41880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10022","4.525873","172.30.1.104","172.30.1.205","TCP","66","49671 > 34518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10023","4.525881","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10024","4.526231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10025","4.526537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10026","4.526551","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10027","4.528619","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10028","4.528973","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10029","4.528980","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10030","4.530356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10031","4.531616","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10032","4.531626","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10033","4.532575","172.30.1.205","172.30.1.104","TCP","74","41884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907758 TSecr=0 WS=128" +"10034","4.532871","172.30.1.104","172.30.1.205","TCP","66","135 > 41884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10035","4.532882","172.30.1.205","172.30.1.104","TCP","54","41884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10036","4.533242","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10037","4.533511","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10038","4.533520","172.30.1.205","172.30.1.104","TCP","54","41884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10039","4.535685","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10040","4.536043","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10041","4.536051","172.30.1.205","172.30.1.104","TCP","54","41884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10042","4.537898","172.30.1.205","172.30.1.104","TCP","54","41884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10043","4.538009","172.30.1.205","172.30.1.104","TCP","74","34522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907764 TSecr=0 WS=128" +"10044","4.538173","172.30.1.104","172.30.1.205","TCP","54","135 > 41884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10045","4.538202","172.30.1.104","172.30.1.205","TCP","54","135 > 41884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10046","4.538208","172.30.1.205","172.30.1.104","TCP","54","41884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10047","4.538292","172.30.1.104","172.30.1.205","TCP","66","49671 > 34522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10048","4.538301","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10049","4.538642","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10050","4.538985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10051","4.538994","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10052","4.540884","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10053","4.541203","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10054","4.541209","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10055","4.542576","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10056","4.543813","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10057","4.543825","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10058","4.544757","172.30.1.205","172.30.1.104","TCP","74","41888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907771 TSecr=0 WS=128" +"10059","4.545040","172.30.1.104","172.30.1.205","TCP","66","135 > 41888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10060","4.545050","172.30.1.205","172.30.1.104","TCP","54","41888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10061","4.545394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10062","4.545695","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10063","4.545709","172.30.1.205","172.30.1.104","TCP","54","41888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10064","4.547973","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10065","4.548301","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10066","4.548308","172.30.1.205","172.30.1.104","TCP","54","41888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10067","4.550147","172.30.1.205","172.30.1.104","TCP","54","41888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10068","4.550270","172.30.1.205","172.30.1.104","TCP","74","34526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907776 TSecr=0 WS=128" +"10069","4.550400","172.30.1.104","172.30.1.205","TCP","54","135 > 41888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10070","4.550410","172.30.1.104","172.30.1.205","TCP","54","135 > 41888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10071","4.550416","172.30.1.205","172.30.1.104","TCP","54","41888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10072","4.550504","172.30.1.104","172.30.1.205","TCP","66","49671 > 34526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10073","4.550513","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10074","4.550860","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10075","4.551125","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10076","4.551134","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10077","4.553033","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10078","4.553410","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10079","4.553417","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10080","4.554759","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10081","4.556010","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10082","4.556021","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10083","4.557028","172.30.1.205","172.30.1.104","TCP","74","41892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907783 TSecr=0 WS=128" +"10084","4.557357","172.30.1.104","172.30.1.205","TCP","66","135 > 41892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10085","4.557368","172.30.1.205","172.30.1.104","TCP","54","41892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10086","4.557724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10087","4.558005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10088","4.558014","172.30.1.205","172.30.1.104","TCP","54","41892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10089","4.560214","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10090","4.560598","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10091","4.560606","172.30.1.205","172.30.1.104","TCP","54","41892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10092","4.562438","172.30.1.205","172.30.1.104","TCP","54","41892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10093","4.562551","172.30.1.205","172.30.1.104","TCP","74","34530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907788 TSecr=0 WS=128" +"10094","4.562715","172.30.1.104","172.30.1.205","TCP","54","135 > 41892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10095","4.562746","172.30.1.104","172.30.1.205","TCP","54","135 > 41892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10096","4.562752","172.30.1.205","172.30.1.104","TCP","54","41892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10097","4.562834","172.30.1.104","172.30.1.205","TCP","66","49671 > 34530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10098","4.562843","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10099","4.563212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10100","4.563476","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10101","4.563485","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10102","4.565373","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10103","4.565717","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10104","4.565724","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10105","4.567057","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10106","4.568376","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10107","4.568386","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10108","4.569336","172.30.1.205","172.30.1.104","TCP","74","41896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907795 TSecr=0 WS=128" +"10109","4.569655","172.30.1.104","172.30.1.205","TCP","66","135 > 41896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10110","4.569666","172.30.1.205","172.30.1.104","TCP","54","41896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10111","4.570012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10112","4.570289","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10113","4.570298","172.30.1.205","172.30.1.104","TCP","54","41896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10114","4.572463","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10115","4.572826","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10116","4.572842","172.30.1.205","172.30.1.104","TCP","54","41896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10117","4.574645","172.30.1.205","172.30.1.104","TCP","54","41896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10118","4.574756","172.30.1.205","172.30.1.104","TCP","74","34534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907801 TSecr=0 WS=128" +"10119","4.574920","172.30.1.104","172.30.1.205","TCP","54","135 > 41896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10120","4.574940","172.30.1.104","172.30.1.205","TCP","54","135 > 41896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10121","4.574946","172.30.1.205","172.30.1.104","TCP","54","41896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10122","4.575028","172.30.1.104","172.30.1.205","TCP","66","49671 > 34534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10123","4.575036","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10124","4.575379","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10125","4.575675","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10126","4.575685","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10127","4.577558","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10128","4.577924","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10129","4.577931","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10130","4.579269","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10131","4.580668","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10132","4.580680","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10133","4.581643","172.30.1.205","172.30.1.104","TCP","74","41900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907808 TSecr=0 WS=128" +"10134","4.581953","172.30.1.104","172.30.1.205","TCP","66","135 > 41900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10135","4.581965","172.30.1.205","172.30.1.104","TCP","54","41900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10136","4.582309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10137","4.582587","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10138","4.582596","172.30.1.205","172.30.1.104","TCP","54","41900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10139","4.584763","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10140","4.585151","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10141","4.585158","172.30.1.205","172.30.1.104","TCP","54","41900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10142","4.585994","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10143","4.586043","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10144","4.586080","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10145","4.586117","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10146","4.586152","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10147","4.586185","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10148","4.586217","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10149","4.586244","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10150","4.586270","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10151","4.586291","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10152","4.586298","172.30.1.104","172.30.1.205","TCP","54","49671 > 34494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10153","4.586316","172.30.1.104","172.30.1.205","TCP","54","49671 > 34498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10154","4.586347","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10155","4.586399","172.30.1.104","172.30.1.205","TCP","54","49671 > 34502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10156","4.586417","172.30.1.104","172.30.1.205","TCP","54","49671 > 34506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10157","4.586436","172.30.1.104","172.30.1.205","TCP","54","49671 > 34498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10158","4.586442","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10159","4.586457","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10160","4.586462","172.30.1.104","172.30.1.205","TCP","54","49671 > 34494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10161","4.586465","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10162","4.586486","172.30.1.104","172.30.1.205","TCP","54","49671 > 34506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10163","4.586489","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10164","4.586508","172.30.1.104","172.30.1.205","TCP","54","49671 > 34510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10165","4.586656","172.30.1.104","172.30.1.205","TCP","54","49671 > 34514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10166","4.586675","172.30.1.104","172.30.1.205","TCP","54","49671 > 34518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10167","4.586695","172.30.1.104","172.30.1.205","TCP","54","49671 > 34502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10168","4.586700","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10169","4.586714","172.30.1.104","172.30.1.205","TCP","54","49671 > 34518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10170","4.586716","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10171","4.586739","172.30.1.104","172.30.1.205","TCP","54","49671 > 34514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10172","4.586742","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10173","4.586759","172.30.1.104","172.30.1.205","TCP","54","49671 > 34510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10174","4.586761","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10175","4.586780","172.30.1.104","172.30.1.205","TCP","54","49671 > 34522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10176","4.586801","172.30.1.104","172.30.1.205","TCP","54","49671 > 34526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10177","4.587132","172.30.1.104","172.30.1.205","TCP","54","49671 > 34530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10178","4.587148","172.30.1.104","172.30.1.205","TCP","54","49671 > 34522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10179","4.587153","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10180","4.587169","172.30.1.104","172.30.1.205","TCP","54","49671 > 34526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10181","4.587172","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10182","4.587192","172.30.1.104","172.30.1.205","TCP","54","49671 > 34530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10183","4.587195","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10184","4.587211","172.30.1.104","172.30.1.205","TCP","54","49671 > 34534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10185","4.587232","172.30.1.104","172.30.1.205","TCP","54","49671 > 34490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10186","4.587252","172.30.1.104","172.30.1.205","TCP","54","49671 > 34534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10187","4.587255","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10188","4.587340","172.30.1.104","172.30.1.205","TCP","54","49671 > 34490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10189","4.587343","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10190","4.587965","172.30.1.205","172.30.1.104","TCP","54","41900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10191","4.588074","172.30.1.205","172.30.1.104","TCP","74","34538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907814 TSecr=0 WS=128" +"10192","4.588284","172.30.1.104","172.30.1.205","TCP","54","135 > 41900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10193","4.588332","172.30.1.104","172.30.1.205","TCP","66","49671 > 34538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10194","4.588341","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10195","4.588355","172.30.1.104","172.30.1.205","TCP","54","135 > 41900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10196","4.588359","172.30.1.205","172.30.1.104","TCP","54","41900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10197","4.588708","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10198","4.589769","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10199","4.589784","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10200","4.591663","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10201","4.592031","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10202","4.592038","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10203","4.593478","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10204","4.594918","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10205","4.594930","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10206","4.595885","172.30.1.205","172.30.1.104","TCP","74","41904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907822 TSecr=0 WS=128" +"10207","4.596203","172.30.1.104","172.30.1.205","TCP","66","135 > 41904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10208","4.596213","172.30.1.205","172.30.1.104","TCP","54","41904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10209","4.596569","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10210","4.596888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10211","4.596897","172.30.1.205","172.30.1.104","TCP","54","41904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10212","4.599076","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10213","4.599479","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10214","4.599495","172.30.1.205","172.30.1.104","TCP","54","41904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10215","4.601319","172.30.1.205","172.30.1.104","TCP","54","41904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10216","4.601430","172.30.1.205","172.30.1.104","TCP","74","34542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907827 TSecr=0 WS=128" +"10217","4.601587","172.30.1.104","172.30.1.205","TCP","54","135 > 41904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10218","4.601607","172.30.1.104","172.30.1.205","TCP","54","135 > 41904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10219","4.601612","172.30.1.205","172.30.1.104","TCP","54","41904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10220","4.601720","172.30.1.104","172.30.1.205","TCP","66","49671 > 34542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10221","4.601736","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10222","4.602134","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10223","4.602420","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10224","4.602430","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10225","4.604295","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10226","4.604684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10227","4.604690","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10228","4.606054","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10229","4.607509","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10230","4.607518","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10231","4.608458","172.30.1.205","172.30.1.104","TCP","74","41908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907834 TSecr=0 WS=128" +"10232","4.608801","172.30.1.104","172.30.1.205","TCP","66","135 > 41908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10233","4.608812","172.30.1.205","172.30.1.104","TCP","54","41908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10234","4.609166","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10235","4.609459","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10236","4.609468","172.30.1.205","172.30.1.104","TCP","54","41908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10237","4.611679","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10238","4.612077","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10239","4.612084","172.30.1.205","172.30.1.104","TCP","54","41908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10240","4.613906","172.30.1.205","172.30.1.104","TCP","54","41908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10241","4.614016","172.30.1.205","172.30.1.104","TCP","74","34546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907840 TSecr=0 WS=128" +"10242","4.614151","172.30.1.104","172.30.1.205","TCP","54","135 > 41908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10243","4.614180","172.30.1.104","172.30.1.205","TCP","54","135 > 41908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10244","4.614186","172.30.1.205","172.30.1.104","TCP","54","41908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10245","4.614269","172.30.1.104","172.30.1.205","TCP","66","49671 > 34546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10246","4.614277","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10247","4.614616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10248","4.614912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10249","4.614920","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10250","4.616766","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10251","4.617197","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10252","4.617204","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10253","4.618537","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10254","4.620016","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10255","4.620025","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10256","4.620966","172.30.1.205","172.30.1.104","TCP","74","41912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907847 TSecr=0 WS=128" +"10257","4.621285","172.30.1.104","172.30.1.205","TCP","66","135 > 41912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10258","4.621295","172.30.1.205","172.30.1.104","TCP","54","41912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10259","4.621644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10260","4.621928","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10261","4.621936","172.30.1.205","172.30.1.104","TCP","54","41912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10262","4.624095","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10263","4.624516","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10264","4.624524","172.30.1.205","172.30.1.104","TCP","54","41912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10265","4.626339","172.30.1.205","172.30.1.104","TCP","54","41912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10266","4.626450","172.30.1.205","172.30.1.104","TCP","74","34550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907852 TSecr=0 WS=128" +"10267","4.626591","172.30.1.104","172.30.1.205","TCP","54","135 > 41912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10268","4.626636","172.30.1.104","172.30.1.205","TCP","54","135 > 41912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10269","4.626642","172.30.1.205","172.30.1.104","TCP","54","41912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10270","4.626753","172.30.1.104","172.30.1.205","TCP","66","49671 > 34550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10271","4.626769","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10272","4.627186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10273","4.627486","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10274","4.627495","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10275","4.629400","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10276","4.629773","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10277","4.629780","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10278","4.631128","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10279","4.632603","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10280","4.632613","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10281","4.633576","172.30.1.205","172.30.1.104","TCP","74","41916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907860 TSecr=0 WS=128" +"10282","4.633960","172.30.1.104","172.30.1.205","TCP","66","135 > 41916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10283","4.633971","172.30.1.205","172.30.1.104","TCP","54","41916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10284","4.634325","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10285","4.634594","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10286","4.634603","172.30.1.205","172.30.1.104","TCP","54","41916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10287","4.636831","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10288","4.637235","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10289","4.637242","172.30.1.205","172.30.1.104","TCP","54","41916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10290","4.639075","172.30.1.205","172.30.1.104","TCP","54","41916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10291","4.639205","172.30.1.205","172.30.1.104","TCP","74","34554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907865 TSecr=0 WS=128" +"10292","4.639382","172.30.1.104","172.30.1.205","TCP","54","135 > 41916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10293","4.639395","172.30.1.104","172.30.1.205","TCP","54","135 > 41916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10294","4.639404","172.30.1.205","172.30.1.104","TCP","54","41916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10295","4.639489","172.30.1.104","172.30.1.205","TCP","66","49671 > 34554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10296","4.639501","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10297","4.639893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10298","4.640169","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10299","4.640178","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10300","4.642114","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10301","4.642526","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10302","4.642535","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10303","4.644019","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10304","4.645587","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10305","4.645597","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10306","4.646574","172.30.1.205","172.30.1.104","TCP","74","41920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907872 TSecr=0 WS=128" +"10307","4.646894","172.30.1.104","172.30.1.205","TCP","66","135 > 41920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10308","4.646905","172.30.1.205","172.30.1.104","TCP","54","41920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10309","4.647252","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10310","4.647559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10311","4.647568","172.30.1.205","172.30.1.104","TCP","54","41920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10312","4.649785","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10313","4.650176","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10314","4.650183","172.30.1.205","172.30.1.104","TCP","54","41920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10315","4.651992","172.30.1.205","172.30.1.104","TCP","54","41920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10316","4.652115","172.30.1.205","172.30.1.104","TCP","74","34558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907878 TSecr=0 WS=128" +"10317","4.652243","172.30.1.104","172.30.1.205","TCP","54","135 > 41920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10318","4.652293","172.30.1.104","172.30.1.205","TCP","54","135 > 41920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10319","4.652300","172.30.1.205","172.30.1.104","TCP","54","41920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10320","4.652385","172.30.1.104","172.30.1.205","TCP","66","49671 > 34558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10321","4.652393","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10322","4.652734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10323","4.653009","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10324","4.653018","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10325","4.654893","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10326","4.655243","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10327","4.655249","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10328","4.656591","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10329","4.657928","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10330","4.657938","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10331","4.658910","172.30.1.205","172.30.1.104","TCP","74","41924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907885 TSecr=0 WS=128" +"10332","4.659197","172.30.1.104","172.30.1.205","TCP","66","135 > 41924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10333","4.659207","172.30.1.205","172.30.1.104","TCP","54","41924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10334","4.659553","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10335","4.659824","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10336","4.659833","172.30.1.205","172.30.1.104","TCP","54","41924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10337","4.662069","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10338","4.662468","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10339","4.662475","172.30.1.205","172.30.1.104","TCP","54","41924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10340","4.664294","172.30.1.205","172.30.1.104","TCP","54","41924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10341","4.664424","172.30.1.205","172.30.1.104","TCP","74","34562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907890 TSecr=0 WS=128" +"10342","4.664585","172.30.1.104","172.30.1.205","TCP","54","135 > 41924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10343","4.664595","172.30.1.104","172.30.1.205","TCP","54","135 > 41924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10344","4.664602","172.30.1.205","172.30.1.104","TCP","54","41924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10345","4.664694","172.30.1.104","172.30.1.205","TCP","66","49671 > 34562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10346","4.664703","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10347","4.665073","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10348","4.665358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10349","4.665366","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10350","4.667254","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10351","4.667610","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10352","4.667617","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10353","4.669002","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10354","4.670356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10355","4.670367","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10356","4.671366","172.30.1.205","172.30.1.104","TCP","74","41928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907897 TSecr=0 WS=128" +"10357","4.671650","172.30.1.104","172.30.1.205","TCP","66","135 > 41928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10358","4.671661","172.30.1.205","172.30.1.104","TCP","54","41928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10359","4.672012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10360","4.672312","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10361","4.672321","172.30.1.205","172.30.1.104","TCP","54","41928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10362","4.674558","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10363","4.674941","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10364","4.674948","172.30.1.205","172.30.1.104","TCP","54","41928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10365","4.676757","172.30.1.205","172.30.1.104","TCP","54","41928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10366","4.676899","172.30.1.205","172.30.1.104","TCP","74","34566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907903 TSecr=0 WS=128" +"10367","4.677027","172.30.1.104","172.30.1.205","TCP","54","135 > 41928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10368","4.677038","172.30.1.104","172.30.1.205","TCP","54","135 > 41928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10369","4.677045","172.30.1.205","172.30.1.104","TCP","54","41928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10370","4.677210","172.30.1.104","172.30.1.205","TCP","66","49671 > 34566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10371","4.677222","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10372","4.677565","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10373","4.677842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10374","4.677850","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10375","4.679700","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10376","4.680063","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10377","4.680069","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10378","4.681572","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10379","4.682919","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10380","4.682931","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10381","4.683913","172.30.1.205","172.30.1.104","TCP","74","41932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907910 TSecr=0 WS=128" +"10382","4.684205","172.30.1.104","172.30.1.205","TCP","66","135 > 41932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10383","4.684216","172.30.1.205","172.30.1.104","TCP","54","41932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10384","4.684639","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10385","4.684946","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10386","4.684956","172.30.1.205","172.30.1.104","TCP","54","41932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10387","4.687163","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10388","4.687545","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10389","4.687552","172.30.1.205","172.30.1.104","TCP","54","41932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10390","4.689388","172.30.1.205","172.30.1.104","TCP","54","41932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10391","4.689504","172.30.1.205","172.30.1.104","TCP","74","34570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907915 TSecr=0 WS=128" +"10392","4.689646","172.30.1.104","172.30.1.205","TCP","54","135 > 41932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10393","4.689675","172.30.1.104","172.30.1.205","TCP","54","135 > 41932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10394","4.689682","172.30.1.205","172.30.1.104","TCP","54","41932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10395","4.689789","172.30.1.104","172.30.1.205","TCP","66","49671 > 34570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10396","4.689798","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10397","4.690146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10398","4.690441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10399","4.690452","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10400","4.692310","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10401","4.692667","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10402","4.692674","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10403","4.694051","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10404","4.695448","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10405","4.695458","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10406","4.696407","172.30.1.205","172.30.1.104","TCP","74","41936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907922 TSecr=0 WS=128" +"10407","4.696716","172.30.1.104","172.30.1.205","TCP","66","135 > 41936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10408","4.696727","172.30.1.205","172.30.1.104","TCP","54","41936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10409","4.697100","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10410","4.697380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10411","4.697390","172.30.1.205","172.30.1.104","TCP","54","41936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10412","4.699590","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10413","4.699959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10414","4.699966","172.30.1.205","172.30.1.104","TCP","54","41936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10415","4.701826","172.30.1.205","172.30.1.104","TCP","54","41936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10416","4.701943","172.30.1.205","172.30.1.104","TCP","74","34574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907928 TSecr=0 WS=128" +"10417","4.702077","172.30.1.104","172.30.1.205","TCP","54","135 > 41936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10418","4.702101","172.30.1.104","172.30.1.205","TCP","54","135 > 41936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10419","4.702108","172.30.1.205","172.30.1.104","TCP","54","41936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10420","4.702183","172.30.1.104","172.30.1.205","TCP","66","49671 > 34574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10421","4.702192","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10422","4.702538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10423","4.702821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10424","4.702830","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10425","4.704696","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10426","4.705078","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10427","4.705086","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10428","4.706449","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10429","4.707829","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10430","4.707843","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10431","4.708787","172.30.1.205","172.30.1.104","TCP","74","41940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907935 TSecr=0 WS=128" +"10432","4.709132","172.30.1.104","172.30.1.205","TCP","66","135 > 41940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10433","4.709143","172.30.1.205","172.30.1.104","TCP","54","41940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10434","4.709495","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10435","4.709791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10436","4.709815","172.30.1.205","172.30.1.104","TCP","54","41940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10437","4.711988","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10438","4.712362","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10439","4.712369","172.30.1.205","172.30.1.104","TCP","54","41940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10440","4.714187","172.30.1.205","172.30.1.104","TCP","54","41940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10441","4.714299","172.30.1.205","172.30.1.104","TCP","74","34578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907940 TSecr=0 WS=128" +"10442","4.714448","172.30.1.104","172.30.1.205","TCP","54","135 > 41940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10443","4.714471","172.30.1.104","172.30.1.205","TCP","54","135 > 41940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10444","4.714477","172.30.1.205","172.30.1.104","TCP","54","41940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10445","4.714572","172.30.1.104","172.30.1.205","TCP","66","49671 > 34578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10446","4.714580","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10447","4.714932","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10448","4.715241","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10449","4.715250","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10450","4.717189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10451","4.717580","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10452","4.717588","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10453","4.719033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10454","4.720356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10455","4.720366","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10456","4.721343","172.30.1.205","172.30.1.104","TCP","74","41944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907947 TSecr=0 WS=128" +"10457","4.721650","172.30.1.104","172.30.1.205","TCP","66","135 > 41944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10458","4.721661","172.30.1.205","172.30.1.104","TCP","54","41944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10459","4.722032","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10460","4.722325","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10461","4.722335","172.30.1.205","172.30.1.104","TCP","54","41944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10462","4.724496","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10463","4.724884","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10464","4.724891","172.30.1.205","172.30.1.104","TCP","54","41944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10465","4.726695","172.30.1.205","172.30.1.104","TCP","54","41944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10466","4.726806","172.30.1.205","172.30.1.104","TCP","74","34582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907953 TSecr=0 WS=128" +"10467","4.726956","172.30.1.104","172.30.1.205","TCP","54","135 > 41944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10468","4.726966","172.30.1.104","172.30.1.205","TCP","54","135 > 41944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10469","4.726971","172.30.1.205","172.30.1.104","TCP","54","41944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10470","4.727076","172.30.1.104","172.30.1.205","TCP","66","49671 > 34582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10471","4.727092","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10472","4.727486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10473","4.727761","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10474","4.727768","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10475","4.729670","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10476","4.730444","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10477","4.730452","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10478","4.731823","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10479","4.733208","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10480","4.733218","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10481","4.734175","172.30.1.205","172.30.1.104","TCP","74","41948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907960 TSecr=0 WS=128" +"10482","4.734462","172.30.1.104","172.30.1.205","TCP","66","135 > 41948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10483","4.734473","172.30.1.205","172.30.1.104","TCP","54","41948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10484","4.734820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10485","4.735101","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10486","4.735111","172.30.1.205","172.30.1.104","TCP","54","41948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10487","4.737323","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10488","4.737716","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10489","4.737723","172.30.1.205","172.30.1.104","TCP","54","41948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10490","4.738560","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10491","4.738609","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10492","4.738646","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10493","4.738675","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10494","4.738704","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10495","4.738731","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10496","4.738763","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10497","4.738790","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10498","4.738821","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10499","4.738848","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10500","4.738870","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10501","4.738893","172.30.1.104","172.30.1.205","TCP","54","49671 > 34542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10502","4.738917","172.30.1.104","172.30.1.205","TCP","54","49671 > 34546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10503","4.738938","172.30.1.104","172.30.1.205","TCP","54","49671 > 34542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10504","4.738944","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10505","4.738965","172.30.1.104","172.30.1.205","TCP","54","49671 > 34550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10506","4.738987","172.30.1.104","172.30.1.205","TCP","54","49671 > 34554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10507","4.739010","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10508","4.739085","172.30.1.104","172.30.1.205","TCP","54","49671 > 34558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10509","4.739104","172.30.1.104","172.30.1.205","TCP","54","49671 > 34558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10510","4.739110","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10511","4.739124","172.30.1.104","172.30.1.205","TCP","54","49671 > 34554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10512","4.739127","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10513","4.739144","172.30.1.104","172.30.1.205","TCP","54","49671 > 34546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10514","4.739147","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10515","4.739164","172.30.1.104","172.30.1.205","TCP","54","49671 > 34550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10516","4.739167","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10517","4.739184","172.30.1.104","172.30.1.205","TCP","54","49671 > 34562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10518","4.739206","172.30.1.104","172.30.1.205","TCP","54","49671 > 34566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10519","4.739346","172.30.1.104","172.30.1.205","TCP","54","49671 > 34570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10520","4.739365","172.30.1.104","172.30.1.205","TCP","54","49671 > 34562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10521","4.739370","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10522","4.739395","172.30.1.104","172.30.1.205","TCP","54","49671 > 34574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10523","4.739425","172.30.1.104","172.30.1.205","TCP","54","49671 > 34574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10524","4.739429","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10525","4.739444","172.30.1.104","172.30.1.205","TCP","54","49671 > 34566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10526","4.739447","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10527","4.739464","172.30.1.104","172.30.1.205","TCP","54","49671 > 34570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10528","4.739467","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10529","4.739484","172.30.1.104","172.30.1.205","TCP","54","49671 > 34578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10530","4.739628","172.30.1.104","172.30.1.205","TCP","54","49671 > 34582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10531","4.739646","172.30.1.104","172.30.1.205","TCP","54","49671 > 34578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10532","4.739657","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10533","4.739669","172.30.1.104","172.30.1.205","TCP","54","49671 > 34582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10534","4.739672","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10535","4.739697","172.30.1.104","172.30.1.205","TCP","54","49671 > 34538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10536","4.739801","172.30.1.104","172.30.1.205","TCP","54","49671 > 34538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10537","4.739805","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10538","4.740860","172.30.1.205","172.30.1.104","TCP","54","41948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10539","4.740972","172.30.1.205","172.30.1.104","TCP","74","34586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907967 TSecr=0 WS=128" +"10540","4.741128","172.30.1.104","172.30.1.205","TCP","54","135 > 41948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10541","4.741146","172.30.1.104","172.30.1.205","TCP","54","135 > 41948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10542","4.741150","172.30.1.205","172.30.1.104","TCP","54","41948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10543","4.741267","172.30.1.104","172.30.1.205","TCP","66","49671 > 34586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10544","4.741276","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10545","4.741637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10546","4.741922","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10547","4.741931","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10548","4.743812","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10549","4.744181","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10550","4.744187","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10551","4.745582","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10552","4.747099","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10553","4.747108","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10554","4.748033","172.30.1.205","172.30.1.104","TCP","74","41952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907974 TSecr=0 WS=128" +"10555","4.748373","172.30.1.104","172.30.1.205","TCP","66","135 > 41952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10556","4.748384","172.30.1.205","172.30.1.104","TCP","54","41952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10557","4.748732","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10558","4.749049","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10559","4.749060","172.30.1.205","172.30.1.104","TCP","54","41952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10560","4.751254","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10561","4.751705","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10562","4.751711","172.30.1.205","172.30.1.104","TCP","54","41952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10563","4.753534","172.30.1.205","172.30.1.104","TCP","54","41952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10564","4.753648","172.30.1.205","172.30.1.104","TCP","74","34590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907980 TSecr=0 WS=128" +"10565","4.753804","172.30.1.104","172.30.1.205","TCP","54","135 > 41952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10566","4.753845","172.30.1.104","172.30.1.205","TCP","54","135 > 41952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10567","4.753851","172.30.1.205","172.30.1.104","TCP","54","41952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10568","4.753925","172.30.1.104","172.30.1.205","TCP","66","49671 > 34590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10569","4.753933","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10570","4.754277","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10571","4.754565","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10572","4.754574","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10573","4.756547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10574","4.756947","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10575","4.756954","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10576","4.758314","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10577","4.759665","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10578","4.759675","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10579","4.760610","172.30.1.205","172.30.1.104","TCP","74","41956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907987 TSecr=0 WS=128" +"10580","4.760921","172.30.1.104","172.30.1.205","TCP","66","135 > 41956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10581","4.760933","172.30.1.205","172.30.1.104","TCP","54","41956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10582","4.761285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10583","4.761667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10584","4.761676","172.30.1.205","172.30.1.104","TCP","54","41956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10585","4.763845","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10586","4.764254","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10587","4.764261","172.30.1.205","172.30.1.104","TCP","54","41956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10588","4.766084","172.30.1.205","172.30.1.104","TCP","54","41956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10589","4.766195","172.30.1.205","172.30.1.104","TCP","74","34594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907992 TSecr=0 WS=128" +"10590","4.766364","172.30.1.104","172.30.1.205","TCP","54","135 > 41956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10591","4.766400","172.30.1.104","172.30.1.205","TCP","54","135 > 41956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10592","4.766405","172.30.1.205","172.30.1.104","TCP","54","41956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10593","4.766482","172.30.1.104","172.30.1.205","TCP","66","49671 > 34594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10594","4.766490","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10595","4.766850","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10596","4.768242","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10597","4.768253","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10598","4.770156","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10599","4.771768","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10600","4.771774","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10601","4.773156","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10602","4.774527","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10603","4.774537","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10604","4.775475","172.30.1.205","172.30.1.104","TCP","74","41960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908001 TSecr=0 WS=128" +"10605","4.775788","172.30.1.104","172.30.1.205","TCP","66","135 > 41960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10606","4.775799","172.30.1.205","172.30.1.104","TCP","54","41960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10607","4.776144","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10608","4.776453","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10609","4.776462","172.30.1.205","172.30.1.104","TCP","54","41960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10610","4.778660","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10611","4.779046","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10612","4.779052","172.30.1.205","172.30.1.104","TCP","54","41960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10613","4.780864","172.30.1.205","172.30.1.104","TCP","54","41960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10614","4.780972","172.30.1.205","172.30.1.104","TCP","74","34598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908007 TSecr=0 WS=128" +"10615","4.781153","172.30.1.104","172.30.1.205","TCP","54","135 > 41960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10616","4.781181","172.30.1.104","172.30.1.205","TCP","54","135 > 41960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10617","4.781187","172.30.1.205","172.30.1.104","TCP","54","41960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10618","4.781262","172.30.1.104","172.30.1.205","TCP","66","49671 > 34598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10619","4.781270","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10620","4.781618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10621","4.782693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10622","4.782700","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10623","4.784576","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10624","4.784927","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10625","4.784934","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10626","4.786285","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10627","4.787622","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10628","4.787631","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10629","4.788555","172.30.1.205","172.30.1.104","TCP","74","41964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908014 TSecr=0 WS=128" +"10630","4.788844","172.30.1.104","172.30.1.205","TCP","66","135 > 41964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10631","4.788854","172.30.1.205","172.30.1.104","TCP","54","41964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10632","4.789206","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10633","4.789504","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10634","4.789516","172.30.1.205","172.30.1.104","TCP","54","41964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10635","4.791696","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10636","4.792086","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10637","4.792093","172.30.1.205","172.30.1.104","TCP","54","41964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10638","4.793929","172.30.1.205","172.30.1.104","TCP","54","41964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10639","4.794040","172.30.1.205","172.30.1.104","TCP","74","34602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908020 TSecr=0 WS=128" +"10640","4.794201","172.30.1.104","172.30.1.205","TCP","54","135 > 41964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10641","4.794244","172.30.1.104","172.30.1.205","TCP","54","135 > 41964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10642","4.794249","172.30.1.205","172.30.1.104","TCP","54","41964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10643","4.794340","172.30.1.104","172.30.1.205","TCP","66","49671 > 34602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10644","4.794348","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10645","4.794691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10646","4.795012","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10647","4.795021","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10648","4.796916","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10649","4.797282","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10650","4.797289","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10651","4.798634","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10652","4.800033","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10653","4.800042","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10654","4.800998","172.30.1.205","172.30.1.104","TCP","74","41968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908027 TSecr=0 WS=128" +"10655","4.801284","172.30.1.104","172.30.1.205","TCP","66","135 > 41968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10656","4.801294","172.30.1.205","172.30.1.104","TCP","54","41968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10657","4.801647","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10658","4.801959","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10659","4.801973","172.30.1.205","172.30.1.104","TCP","54","41968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10660","4.804226","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10661","4.804598","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10662","4.804604","172.30.1.205","172.30.1.104","TCP","54","41968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10663","4.806429","172.30.1.205","172.30.1.104","TCP","54","41968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10664","4.806543","172.30.1.205","172.30.1.104","TCP","74","34606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908032 TSecr=0 WS=128" +"10665","4.806744","172.30.1.104","172.30.1.205","TCP","54","135 > 41968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10666","4.806789","172.30.1.104","172.30.1.205","TCP","54","135 > 41968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10667","4.806795","172.30.1.205","172.30.1.104","TCP","54","41968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10668","4.806828","172.30.1.104","172.30.1.205","TCP","66","49671 > 34606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10669","4.806836","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10670","4.807180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10671","4.808791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10672","4.808800","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10673","4.810664","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10674","4.811004","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10675","4.811011","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10676","4.812348","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10677","4.813777","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10678","4.813787","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10679","4.814727","172.30.1.205","172.30.1.104","TCP","74","41972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908041 TSecr=0 WS=128" +"10680","4.815023","172.30.1.104","172.30.1.205","TCP","66","135 > 41972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10681","4.815034","172.30.1.205","172.30.1.104","TCP","54","41972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10682","4.815379","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10683","4.815650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10684","4.815659","172.30.1.205","172.30.1.104","TCP","54","41972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10685","4.817885","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10686","4.818284","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10687","4.818290","172.30.1.205","172.30.1.104","TCP","54","41972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10688","4.820090","172.30.1.205","172.30.1.104","TCP","54","41972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10689","4.820201","172.30.1.205","172.30.1.104","TCP","74","34610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908046 TSecr=0 WS=128" +"10690","4.820358","172.30.1.104","172.30.1.205","TCP","54","135 > 41972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10691","4.820395","172.30.1.104","172.30.1.205","TCP","54","135 > 41972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10692","4.820401","172.30.1.205","172.30.1.104","TCP","54","41972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10693","4.820468","172.30.1.104","172.30.1.205","TCP","66","49671 > 34610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10694","4.820476","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10695","4.820861","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10696","4.821155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10697","4.821164","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10698","4.823035","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10699","4.823417","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10700","4.823423","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10701","4.824770","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10702","4.826247","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10703","4.826256","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10704","4.827200","172.30.1.205","172.30.1.104","TCP","74","41976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908053 TSecr=0 WS=128" +"10705","4.827498","172.30.1.104","172.30.1.205","TCP","66","135 > 41976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10706","4.827509","172.30.1.205","172.30.1.104","TCP","54","41976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10707","4.827872","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10708","4.828197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10709","4.828206","172.30.1.205","172.30.1.104","TCP","54","41976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10710","4.830487","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10711","4.830887","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10712","4.830893","172.30.1.205","172.30.1.104","TCP","54","41976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10713","4.832745","172.30.1.205","172.30.1.104","TCP","54","41976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10714","4.832883","172.30.1.205","172.30.1.104","TCP","74","34614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908059 TSecr=0 WS=128" +"10715","4.833040","172.30.1.104","172.30.1.205","TCP","54","135 > 41976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10716","4.833048","172.30.1.104","172.30.1.205","TCP","54","135 > 41976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10717","4.833054","172.30.1.205","172.30.1.104","TCP","54","41976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10718","4.833156","172.30.1.104","172.30.1.205","TCP","66","49671 > 34614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10719","4.833164","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10720","4.833505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10721","4.833760","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10722","4.833769","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10723","4.835668","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10724","4.836033","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10725","4.836039","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10726","4.837413","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10727","4.838881","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10728","4.838890","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10729","4.839835","172.30.1.205","172.30.1.104","TCP","74","41980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908066 TSecr=0 WS=128" +"10730","4.840178","172.30.1.104","172.30.1.205","TCP","66","135 > 41980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10731","4.840188","172.30.1.205","172.30.1.104","TCP","54","41980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10732","4.840532","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10733","4.840817","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10734","4.840827","172.30.1.205","172.30.1.104","TCP","54","41980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10735","4.843014","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10736","4.843469","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10737","4.843476","172.30.1.205","172.30.1.104","TCP","54","41980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10738","4.845287","172.30.1.205","172.30.1.104","TCP","54","41980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10739","4.845407","172.30.1.205","172.30.1.104","TCP","74","34618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908071 TSecr=0 WS=128" +"10740","4.845635","172.30.1.104","172.30.1.205","TCP","54","135 > 41980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10741","4.845680","172.30.1.104","172.30.1.205","TCP","66","49671 > 34618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10742","4.845689","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10743","4.845703","172.30.1.104","172.30.1.205","TCP","54","135 > 41980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10744","4.845707","172.30.1.205","172.30.1.104","TCP","54","41980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10745","4.846080","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10746","4.846419","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10747","4.846435","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10748","4.848497","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10749","4.848909","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10750","4.848916","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10751","4.850250","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10752","4.852542","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10753","4.852551","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10754","4.853496","172.30.1.205","172.30.1.104","TCP","74","41984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908079 TSecr=0 WS=128" +"10755","4.853797","172.30.1.104","172.30.1.205","TCP","66","135 > 41984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10756","4.853808","172.30.1.205","172.30.1.104","TCP","54","41984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10757","4.854151","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10758","4.854447","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10759","4.854456","172.30.1.205","172.30.1.104","TCP","54","41984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10760","4.856613","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10761","4.857009","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10762","4.857017","172.30.1.205","172.30.1.104","TCP","54","41984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10763","4.858836","172.30.1.205","172.30.1.104","TCP","54","41984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10764","4.858950","172.30.1.205","172.30.1.104","TCP","74","34622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908085 TSecr=0 WS=128" +"10765","4.859091","172.30.1.104","172.30.1.205","TCP","54","135 > 41984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10766","4.859122","172.30.1.104","172.30.1.205","TCP","54","135 > 41984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10767","4.859127","172.30.1.205","172.30.1.104","TCP","54","41984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10768","4.859255","172.30.1.104","172.30.1.205","TCP","66","49671 > 34622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10769","4.859262","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10770","4.859603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10771","4.859890","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10772","4.859899","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10773","4.861790","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10774","4.862171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10775","4.862178","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10776","4.863526","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10777","4.864904","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10778","4.864913","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10779","4.865851","172.30.1.205","172.30.1.104","TCP","74","41988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908092 TSecr=0 WS=128" +"10780","4.866143","172.30.1.104","172.30.1.205","TCP","66","135 > 41988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10781","4.866154","172.30.1.205","172.30.1.104","TCP","54","41988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10782","4.866510","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10783","4.866806","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10784","4.866815","172.30.1.205","172.30.1.104","TCP","54","41988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10785","4.869016","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10786","4.869383","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10787","4.869390","172.30.1.205","172.30.1.104","TCP","54","41988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10788","4.871182","172.30.1.205","172.30.1.104","TCP","54","41988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10789","4.871295","172.30.1.205","172.30.1.104","TCP","74","34626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908097 TSecr=0 WS=128" +"10790","4.871471","172.30.1.104","172.30.1.205","TCP","54","135 > 41988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10791","4.871501","172.30.1.104","172.30.1.205","TCP","54","135 > 41988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10792","4.871507","172.30.1.205","172.30.1.104","TCP","54","41988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10793","4.871604","172.30.1.104","172.30.1.205","TCP","66","49671 > 34626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10794","4.871612","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10795","4.871955","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10796","4.872258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10797","4.872267","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10798","4.874155","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10799","4.874539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10800","4.874545","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10801","4.875890","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10802","4.877281","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10803","4.877290","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10804","4.878235","172.30.1.205","172.30.1.104","TCP","74","41992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908104 TSecr=0 WS=128" +"10805","4.878611","172.30.1.104","172.30.1.205","TCP","66","135 > 41992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10806","4.878622","172.30.1.205","172.30.1.104","TCP","54","41992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10807","4.878969","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10808","4.879267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10809","4.879276","172.30.1.205","172.30.1.104","TCP","54","41992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10810","4.881468","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10811","4.881868","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10812","4.881874","172.30.1.205","172.30.1.104","TCP","54","41992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10813","4.883678","172.30.1.205","172.30.1.104","TCP","54","41992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10814","4.883787","172.30.1.205","172.30.1.104","TCP","74","34630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908110 TSecr=0 WS=128" +"10815","4.883994","172.30.1.104","172.30.1.205","TCP","54","135 > 41992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10816","4.884003","172.30.1.104","172.30.1.205","TCP","54","135 > 41992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10817","4.884008","172.30.1.205","172.30.1.104","TCP","54","41992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10818","4.884084","172.30.1.104","172.30.1.205","TCP","66","49671 > 34630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10819","4.884092","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10820","4.884438","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10821","4.884748","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10822","4.884755","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10823","4.886608","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10824","4.886967","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10825","4.886974","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10826","4.888299","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10827","4.889669","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10828","4.889688","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10829","4.890646","172.30.1.205","172.30.1.104","TCP","74","41996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908117 TSecr=0 WS=128" +"10830","4.890934","172.30.1.104","172.30.1.205","TCP","66","135 > 41996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10831","4.890944","172.30.1.205","172.30.1.104","TCP","54","41996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10832","4.891285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10833","4.891575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10834","4.891588","172.30.1.205","172.30.1.104","TCP","54","41996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10835","4.893788","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10836","4.894201","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10837","4.894209","172.30.1.205","172.30.1.104","TCP","54","41996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10838","4.895072","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10839","4.895120","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10840","4.895151","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10841","4.895185","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10842","4.895217","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10843","4.895247","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10844","4.895278","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10845","4.895309","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10846","4.895339","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10847","4.895370","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10848","4.895400","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10849","4.895469","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10850","4.895662","172.30.1.104","172.30.1.205","TCP","54","49671 > 34590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10851","4.895678","172.30.1.104","172.30.1.205","TCP","54","49671 > 34594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10852","4.895709","172.30.1.104","172.30.1.205","TCP","54","49671 > 34590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10853","4.895716","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10854","4.895738","172.30.1.104","172.30.1.205","TCP","54","49671 > 34598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10855","4.895761","172.30.1.104","172.30.1.205","TCP","54","49671 > 34602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10856","4.895805","172.30.1.104","172.30.1.205","TCP","54","49671 > 34602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10857","4.895810","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10858","4.895823","172.30.1.104","172.30.1.205","TCP","54","49671 > 34606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10859","4.895886","172.30.1.104","172.30.1.205","TCP","54","49671 > 34606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10860","4.895891","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10861","4.895907","172.30.1.104","172.30.1.205","TCP","54","49671 > 34610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10862","4.895931","172.30.1.104","172.30.1.205","TCP","54","49671 > 34614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10863","4.895950","172.30.1.104","172.30.1.205","TCP","54","49671 > 34614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10864","4.895954","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10865","4.895970","172.30.1.104","172.30.1.205","TCP","54","49671 > 34618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10866","4.895990","172.30.1.104","172.30.1.205","TCP","54","49671 > 34610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10867","4.895993","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10868","4.896010","172.30.1.104","172.30.1.205","TCP","54","49671 > 34622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10869","4.896096","172.30.1.104","172.30.1.205","TCP","54","49671 > 34622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10870","4.896100","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10871","4.896125","172.30.1.104","172.30.1.205","TCP","54","49671 > 34618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10872","4.896127","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10873","4.896157","172.30.1.104","172.30.1.205","TCP","54","49671 > 34626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10874","4.896499","172.30.1.104","172.30.1.205","TCP","54","49671 > 34630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10875","4.896516","172.30.1.104","172.30.1.205","TCP","54","49671 > 34630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10876","4.896521","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10877","4.896536","172.30.1.104","172.30.1.205","TCP","54","49671 > 34626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10878","4.896539","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10879","4.896558","172.30.1.104","172.30.1.205","TCP","54","49671 > 34594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10880","4.896561","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10881","4.896637","172.30.1.104","172.30.1.205","TCP","54","49671 > 34598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10882","4.896641","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10883","4.896656","172.30.1.104","172.30.1.205","TCP","54","49671 > 34586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10884","4.896676","172.30.1.104","172.30.1.205","TCP","54","49671 > 34586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"10885","4.896679","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"10886","4.897095","172.30.1.205","172.30.1.104","TCP","54","41996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10887","4.897204","172.30.1.205","172.30.1.104","TCP","74","34634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908123 TSecr=0 WS=128" +"10888","4.897350","172.30.1.104","172.30.1.205","TCP","54","135 > 41996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10889","4.897393","172.30.1.104","172.30.1.205","TCP","54","135 > 41996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10890","4.897397","172.30.1.205","172.30.1.104","TCP","54","41996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10891","4.897482","172.30.1.104","172.30.1.205","TCP","66","49671 > 34634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10892","4.897490","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10893","4.897842","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10894","4.898145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10895","4.898153","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10896","4.900021","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10897","4.900386","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10898","4.900393","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10899","4.901756","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10900","4.903262","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10901","4.903273","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10902","4.904225","172.30.1.205","172.30.1.104","TCP","74","42000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908130 TSecr=0 WS=128" +"10903","4.904532","172.30.1.104","172.30.1.205","TCP","66","135 > 42000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10904","4.904542","172.30.1.205","172.30.1.104","TCP","54","42000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10905","4.904925","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10906","4.905253","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10907","4.905262","172.30.1.205","172.30.1.104","TCP","54","42000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10908","4.907421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10909","4.907848","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10910","4.907854","172.30.1.205","172.30.1.104","TCP","54","42000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10911","4.909663","172.30.1.205","172.30.1.104","TCP","54","42000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10912","4.909773","172.30.1.205","172.30.1.104","TCP","74","34638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908136 TSecr=0 WS=128" +"10913","4.909951","172.30.1.104","172.30.1.205","TCP","54","135 > 42000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10914","4.910041","172.30.1.104","172.30.1.205","TCP","54","135 > 42000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10915","4.910046","172.30.1.205","172.30.1.104","TCP","54","42000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10916","4.910082","172.30.1.104","172.30.1.205","TCP","66","49671 > 34638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10917","4.910090","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10918","4.910428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10919","4.910766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10920","4.910774","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10921","4.912607","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10922","4.912980","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10923","4.912987","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10924","4.914329","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10925","4.915729","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10926","4.915738","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10927","4.916653","172.30.1.205","172.30.1.104","TCP","74","42004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908143 TSecr=0 WS=128" +"10928","4.916964","172.30.1.104","172.30.1.205","TCP","66","135 > 42004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10929","4.916976","172.30.1.205","172.30.1.104","TCP","54","42004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10930","4.917330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10931","4.917616","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10932","4.917624","172.30.1.205","172.30.1.104","TCP","54","42004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10933","4.919771","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10934","4.920142","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10935","4.920149","172.30.1.205","172.30.1.104","TCP","54","42004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10936","4.921954","172.30.1.205","172.30.1.104","TCP","54","42004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10937","4.922063","172.30.1.205","172.30.1.104","TCP","74","34642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908148 TSecr=0 WS=128" +"10938","4.922216","172.30.1.104","172.30.1.205","TCP","54","135 > 42004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10939","4.922238","172.30.1.104","172.30.1.205","TCP","54","135 > 42004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10940","4.922243","172.30.1.205","172.30.1.104","TCP","54","42004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10941","4.922315","172.30.1.104","172.30.1.205","TCP","66","49671 > 34642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10942","4.922323","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10943","4.922663","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10944","4.922957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10945","4.922966","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10946","4.924822","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10947","4.926861","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10948","4.926869","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10949","4.928443","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10950","4.929801","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10951","4.929810","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10952","4.930740","172.30.1.205","172.30.1.104","TCP","74","42008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908157 TSecr=0 WS=128" +"10953","4.931043","172.30.1.104","172.30.1.205","TCP","66","135 > 42008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10954","4.931054","172.30.1.205","172.30.1.104","TCP","54","42008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10955","4.931394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10956","4.931689","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10957","4.931697","172.30.1.205","172.30.1.104","TCP","54","42008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10958","4.933889","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10959","4.934294","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10960","4.934301","172.30.1.205","172.30.1.104","TCP","54","42008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10961","4.936115","172.30.1.205","172.30.1.104","TCP","54","42008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10962","4.936223","172.30.1.205","172.30.1.104","TCP","74","34646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908162 TSecr=0 WS=128" +"10963","4.936417","172.30.1.104","172.30.1.205","TCP","54","135 > 42008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10964","4.936427","172.30.1.104","172.30.1.205","TCP","54","135 > 42008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10965","4.936432","172.30.1.205","172.30.1.104","TCP","54","42008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10966","4.936536","172.30.1.104","172.30.1.205","TCP","66","49671 > 34646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10967","4.936543","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10968","4.936932","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10969","4.937249","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10970","4.937256","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10971","4.939143","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10972","4.939617","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10973","4.939623","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10974","4.940979","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"10975","4.943137","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"10976","4.943146","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"10977","4.944075","172.30.1.205","172.30.1.104","TCP","74","42012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908170 TSecr=0 WS=128" +"10978","4.944376","172.30.1.104","172.30.1.205","TCP","66","135 > 42012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10979","4.944398","172.30.1.205","172.30.1.104","TCP","54","42012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10980","4.944740","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"10981","4.945025","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10982","4.945034","172.30.1.205","172.30.1.104","TCP","54","42012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10983","4.947251","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"10984","4.947625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"10985","4.947632","172.30.1.205","172.30.1.104","TCP","54","42012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10986","4.949465","172.30.1.205","172.30.1.104","TCP","54","42012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"10987","4.949570","172.30.1.205","172.30.1.104","TCP","74","34650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908175 TSecr=0 WS=128" +"10988","4.949714","172.30.1.104","172.30.1.205","TCP","54","135 > 42012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10989","4.949749","172.30.1.104","172.30.1.205","TCP","54","135 > 42012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"10990","4.949754","172.30.1.205","172.30.1.104","TCP","54","42012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"10991","4.949848","172.30.1.104","172.30.1.205","TCP","66","49671 > 34650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"10992","4.949856","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"10993","4.950195","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"10994","4.950472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"10995","4.950481","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"10996","4.952332","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"10997","4.952675","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"10998","4.952681","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"10999","4.954032","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11000","4.955417","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11001","4.955426","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11002","4.956341","172.30.1.205","172.30.1.104","TCP","74","42016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908182 TSecr=0 WS=128" +"11003","4.956732","172.30.1.104","172.30.1.205","TCP","66","135 > 42016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11004","4.956742","172.30.1.205","172.30.1.104","TCP","54","42016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11005","4.957106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11006","4.957393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11007","4.957402","172.30.1.205","172.30.1.104","TCP","54","42016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11008","4.959555","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11009","4.959930","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11010","4.959936","172.30.1.205","172.30.1.104","TCP","54","42016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11011","4.961760","172.30.1.205","172.30.1.104","TCP","54","42016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11012","4.961867","172.30.1.205","172.30.1.104","TCP","74","34654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908188 TSecr=0 WS=128" +"11013","4.962082","172.30.1.104","172.30.1.205","TCP","54","135 > 42016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11014","4.962093","172.30.1.104","172.30.1.205","TCP","54","135 > 42016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11015","4.962100","172.30.1.205","172.30.1.104","TCP","54","42016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11016","4.962110","172.30.1.104","172.30.1.205","TCP","66","49671 > 34654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11017","4.962124","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11018","4.962515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11019","4.962788","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11020","4.962797","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11021","4.964685","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11022","4.965071","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11023","4.965077","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11024","4.966434","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11025","4.967825","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11026","4.967852","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11027","4.969020","172.30.1.205","172.30.1.104","TCP","74","42020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908195 TSecr=0 WS=128" +"11028","4.969330","172.30.1.104","172.30.1.205","TCP","66","135 > 42020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11029","4.969341","172.30.1.205","172.30.1.104","TCP","54","42020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11030","4.969693","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11031","4.969962","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11032","4.969971","172.30.1.205","172.30.1.104","TCP","54","42020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11033","4.972160","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11034","4.972513","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11035","4.972520","172.30.1.205","172.30.1.104","TCP","54","42020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11036","4.974353","172.30.1.205","172.30.1.104","TCP","54","42020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11037","4.974462","172.30.1.205","172.30.1.104","TCP","74","34658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908200 TSecr=0 WS=128" +"11038","4.974586","172.30.1.104","172.30.1.205","TCP","54","135 > 42020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11039","4.974617","172.30.1.104","172.30.1.205","TCP","54","135 > 42020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11040","4.974622","172.30.1.205","172.30.1.104","TCP","54","42020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11041","4.974740","172.30.1.104","172.30.1.205","TCP","66","49671 > 34658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11042","4.974747","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11043","4.975119","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11044","4.975391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11045","4.975399","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11046","4.977342","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11047","4.977691","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11048","4.977697","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11049","4.979091","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11050","4.980502","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11051","4.980511","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11052","4.981454","172.30.1.205","172.30.1.104","TCP","74","42024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908207 TSecr=0 WS=128" +"11053","4.981750","172.30.1.104","172.30.1.205","TCP","66","135 > 42024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11054","4.981761","172.30.1.205","172.30.1.104","TCP","54","42024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11055","4.982105","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11056","4.982431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11057","4.982440","172.30.1.205","172.30.1.104","TCP","54","42024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11058","4.984627","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11059","4.985005","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11060","4.985012","172.30.1.205","172.30.1.104","TCP","54","42024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11061","4.986817","172.30.1.205","172.30.1.104","TCP","54","42024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11062","4.986931","172.30.1.205","172.30.1.104","TCP","74","34662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908213 TSecr=0 WS=128" +"11063","4.987085","172.30.1.104","172.30.1.205","TCP","54","135 > 42024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11064","4.987152","172.30.1.104","172.30.1.205","TCP","54","135 > 42024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11065","4.987157","172.30.1.205","172.30.1.104","TCP","54","42024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11066","4.987244","172.30.1.104","172.30.1.205","TCP","66","49671 > 34662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11067","4.987251","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11068","4.987612","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11069","4.987912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11070","4.987920","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11071","4.989793","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11072","4.990147","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11073","4.990153","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11074","4.991492","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11075","4.992867","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11076","4.992876","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11077","4.993809","172.30.1.205","172.30.1.104","TCP","74","42028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908220 TSecr=0 WS=128" +"11078","4.994100","172.30.1.104","172.30.1.205","TCP","66","135 > 42028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11079","4.994110","172.30.1.205","172.30.1.104","TCP","54","42028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11080","4.994456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11081","4.994753","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11082","4.994762","172.30.1.205","172.30.1.104","TCP","54","42028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11083","4.996978","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11084","4.997398","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11085","4.997404","172.30.1.205","172.30.1.104","TCP","54","42028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11086","4.999189","172.30.1.205","172.30.1.104","TCP","54","42028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11087","4.999297","172.30.1.205","172.30.1.104","TCP","74","34666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908225 TSecr=0 WS=128" +"11088","4.999459","172.30.1.104","172.30.1.205","TCP","54","135 > 42028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11089","4.999488","172.30.1.104","172.30.1.205","TCP","54","135 > 42028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11090","4.999493","172.30.1.205","172.30.1.104","TCP","54","42028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11091","4.999566","172.30.1.104","172.30.1.205","TCP","66","49671 > 34666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11092","4.999574","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11093","4.999913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11094","5.000194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11095","5.000203","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11096","5.002084","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11097","5.002452","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11098","5.002458","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11099","5.003776","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11100","5.005148","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11101","5.005157","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11102","5.006086","172.30.1.205","172.30.1.104","TCP","74","42032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908232 TSecr=0 WS=128" +"11103","5.006381","172.30.1.104","172.30.1.205","TCP","66","135 > 42032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11104","5.006391","172.30.1.205","172.30.1.104","TCP","54","42032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11105","5.006731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11106","5.007052","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11107","5.007061","172.30.1.205","172.30.1.104","TCP","54","42032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11108","5.009238","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11109","5.009612","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11110","5.009619","172.30.1.205","172.30.1.104","TCP","54","42032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11111","5.011418","172.30.1.205","172.30.1.104","TCP","54","42032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11112","5.011541","172.30.1.205","172.30.1.104","TCP","74","34670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908237 TSecr=0 WS=128" +"11113","5.011666","172.30.1.104","172.30.1.205","TCP","54","135 > 42032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11114","5.011689","172.30.1.104","172.30.1.205","TCP","54","135 > 42032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11115","5.011695","172.30.1.205","172.30.1.104","TCP","54","42032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11116","5.011825","172.30.1.104","172.30.1.205","TCP","66","49671 > 34670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11117","5.011834","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11118","5.012183","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11119","5.012477","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11120","5.012490","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11121","5.014469","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11122","5.014978","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11123","5.014985","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11124","5.016344","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11125","5.017833","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11126","5.017845","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11127","5.018856","172.30.1.205","172.30.1.104","TCP","74","42036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908245 TSecr=0 WS=128" +"11128","5.019161","172.30.1.104","172.30.1.205","TCP","66","135 > 42036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11129","5.019173","172.30.1.205","172.30.1.104","TCP","54","42036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11130","5.019524","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11131","5.019807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11132","5.019820","172.30.1.205","172.30.1.104","TCP","54","42036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11133","5.022144","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11134","5.022601","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11135","5.022608","172.30.1.205","172.30.1.104","TCP","54","42036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11136","5.024429","172.30.1.205","172.30.1.104","TCP","54","42036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11137","5.024560","172.30.1.205","172.30.1.104","TCP","74","34674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908250 TSecr=0 WS=128" +"11138","5.024690","172.30.1.104","172.30.1.205","TCP","54","135 > 42036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11139","5.024729","172.30.1.104","172.30.1.205","TCP","54","135 > 42036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11140","5.024737","172.30.1.205","172.30.1.104","TCP","54","42036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11141","5.024873","172.30.1.104","172.30.1.205","TCP","66","49671 > 34674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11142","5.024883","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11143","5.025242","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11144","5.025543","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11145","5.025552","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11146","5.027445","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11147","5.027859","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11148","5.027865","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11149","5.029248","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11150","5.030697","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11151","5.030708","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11152","5.031706","172.30.1.205","172.30.1.104","TCP","74","42040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908258 TSecr=0 WS=128" +"11153","5.032013","172.30.1.104","172.30.1.205","TCP","66","135 > 42040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11154","5.032026","172.30.1.205","172.30.1.104","TCP","54","42040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11155","5.032391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11156","5.032681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11157","5.032690","172.30.1.205","172.30.1.104","TCP","54","42040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11158","5.034895","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11159","5.035285","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11160","5.035291","172.30.1.205","172.30.1.104","TCP","54","42040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11161","5.037135","172.30.1.205","172.30.1.104","TCP","54","42040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11162","5.037252","172.30.1.205","172.30.1.104","TCP","74","34678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908263 TSecr=0 WS=128" +"11163","5.037385","172.30.1.104","172.30.1.205","TCP","54","135 > 42040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11164","5.037398","172.30.1.104","172.30.1.205","TCP","54","135 > 42040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11165","5.037405","172.30.1.205","172.30.1.104","TCP","54","42040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11166","5.037510","172.30.1.104","172.30.1.205","TCP","66","49671 > 34678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11167","5.037518","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11168","5.037860","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11169","5.040206","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11170","5.040218","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11171","5.042161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11172","5.042558","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11173","5.042565","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11174","5.043912","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11175","5.045418","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11176","5.045429","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11177","5.046393","172.30.1.205","172.30.1.104","TCP","74","42044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908272 TSecr=0 WS=128" +"11178","5.046731","172.30.1.104","172.30.1.205","TCP","66","135 > 42044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11179","5.046746","172.30.1.205","172.30.1.104","TCP","54","42044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11180","5.047128","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11181","5.047435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11182","5.047444","172.30.1.205","172.30.1.104","TCP","54","42044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11183","5.049652","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11184","5.050102","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11185","5.050111","172.30.1.205","172.30.1.104","TCP","54","42044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11186","5.051010","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11187","5.051059","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11188","5.051096","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11189","5.051129","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11190","5.051162","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11191","5.051190","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11192","5.051223","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11193","5.051246","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11194","5.051258","172.30.1.104","172.30.1.205","TCP","54","49671 > 34634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11195","5.051297","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11196","5.051326","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11197","5.051352","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11198","5.051383","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11199","5.051609","172.30.1.104","172.30.1.205","TCP","54","49671 > 34638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11200","5.051626","172.30.1.104","172.30.1.205","TCP","54","49671 > 34634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11201","5.051634","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11202","5.051645","172.30.1.104","172.30.1.205","TCP","54","49671 > 34642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11203","5.051667","172.30.1.104","172.30.1.205","TCP","54","49671 > 34638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11204","5.051675","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11205","5.051709","172.30.1.104","172.30.1.205","TCP","54","49671 > 34646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11206","5.051729","172.30.1.104","172.30.1.205","TCP","54","49671 > 34642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11207","5.051733","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11208","5.051749","172.30.1.104","172.30.1.205","TCP","54","49671 > 34650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11209","5.051800","172.30.1.104","172.30.1.205","TCP","54","49671 > 34654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11210","5.051817","172.30.1.104","172.30.1.205","TCP","54","49671 > 34654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11211","5.051821","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11212","5.051838","172.30.1.104","172.30.1.205","TCP","54","49671 > 34658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11213","5.051859","172.30.1.104","172.30.1.205","TCP","54","49671 > 34658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11214","5.051863","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11215","5.051878","172.30.1.104","172.30.1.205","TCP","54","49671 > 34662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11216","5.051896","172.30.1.104","172.30.1.205","TCP","54","49671 > 34666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11217","5.051916","172.30.1.104","172.30.1.205","TCP","54","49671 > 34670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11218","5.051937","172.30.1.104","172.30.1.205","TCP","54","49671 > 34666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11219","5.051941","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11220","5.051956","172.30.1.104","172.30.1.205","TCP","54","49671 > 34674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11221","5.051986","172.30.1.104","172.30.1.205","TCP","54","49671 > 34662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11222","5.051989","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11223","5.052029","172.30.1.104","172.30.1.205","TCP","54","49671 > 34678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11224","5.052050","172.30.1.104","172.30.1.205","TCP","54","49671 > 34678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11225","5.052053","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11226","5.052068","172.30.1.104","172.30.1.205","TCP","54","49671 > 34674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11227","5.052071","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11228","5.052087","172.30.1.104","172.30.1.205","TCP","54","49671 > 34670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11229","5.052090","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11230","5.052110","172.30.1.104","172.30.1.205","TCP","54","49671 > 34646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11231","5.052114","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11232","5.052128","172.30.1.104","172.30.1.205","TCP","54","49671 > 34650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11233","5.052131","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11234","5.053004","172.30.1.205","172.30.1.104","TCP","54","42044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11235","5.053124","172.30.1.205","172.30.1.104","TCP","74","34682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908279 TSecr=0 WS=128" +"11236","5.053277","172.30.1.104","172.30.1.205","TCP","54","135 > 42044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11237","5.053291","172.30.1.104","172.30.1.205","TCP","54","135 > 42044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11238","5.053296","172.30.1.205","172.30.1.104","TCP","54","42044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11239","5.053394","172.30.1.104","172.30.1.205","TCP","66","49671 > 34682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11240","5.053402","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11241","5.053759","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11242","5.054040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11243","5.054049","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11244","5.055932","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11245","5.056292","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11246","5.056299","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11247","5.057698","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11248","5.059285","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11249","5.059297","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11250","5.060284","172.30.1.205","172.30.1.104","TCP","74","42048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908286 TSecr=0 WS=128" +"11251","5.060572","172.30.1.104","172.30.1.205","TCP","66","135 > 42048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11252","5.060583","172.30.1.205","172.30.1.104","TCP","54","42048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11253","5.060974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11254","5.061253","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11255","5.061262","172.30.1.205","172.30.1.104","TCP","54","42048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11256","5.063448","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11257","5.063871","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11258","5.063878","172.30.1.205","172.30.1.104","TCP","54","42048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11259","5.065708","172.30.1.205","172.30.1.104","TCP","54","42048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11260","5.065822","172.30.1.205","172.30.1.104","TCP","74","34686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908292 TSecr=0 WS=128" +"11261","5.065984","172.30.1.104","172.30.1.205","TCP","54","135 > 42048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11262","5.066034","172.30.1.104","172.30.1.205","TCP","54","135 > 42048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11263","5.066040","172.30.1.205","172.30.1.104","TCP","54","42048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11264","5.066124","172.30.1.104","172.30.1.205","TCP","66","49671 > 34686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11265","5.066132","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11266","5.066472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11267","5.066759","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11268","5.066768","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11269","5.068635","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11270","5.069019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11271","5.069026","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11272","5.070368","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11273","5.071841","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11274","5.071852","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11275","5.072828","172.30.1.205","172.30.1.104","TCP","74","42052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908299 TSecr=0 WS=128" +"11276","5.073113","172.30.1.104","172.30.1.205","TCP","66","135 > 42052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11277","5.073123","172.30.1.205","172.30.1.104","TCP","54","42052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11278","5.073467","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11279","5.073783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11280","5.073792","172.30.1.205","172.30.1.104","TCP","54","42052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11281","5.075961","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11282","5.076348","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11283","5.076355","172.30.1.205","172.30.1.104","TCP","54","42052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11284","5.078181","172.30.1.205","172.30.1.104","TCP","54","42052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11285","5.078302","172.30.1.205","172.30.1.104","TCP","74","34690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908304 TSecr=0 WS=128" +"11286","5.078552","172.30.1.104","172.30.1.205","TCP","54","135 > 42052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11287","5.078608","172.30.1.104","172.30.1.205","TCP","66","49671 > 34690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11288","5.078617","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11289","5.078649","172.30.1.104","172.30.1.205","TCP","54","135 > 42052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11290","5.078655","172.30.1.205","172.30.1.104","TCP","54","42052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11291","5.078995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11292","5.079345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11293","5.079352","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11294","5.081234","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11295","5.081589","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11296","5.081595","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11297","5.082926","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11298","5.084370","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11299","5.084379","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11300","5.085341","172.30.1.205","172.30.1.104","TCP","74","42056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908311 TSecr=0 WS=128" +"11301","5.085672","172.30.1.104","172.30.1.205","TCP","66","135 > 42056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11302","5.085683","172.30.1.205","172.30.1.104","TCP","54","42056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11303","5.086024","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11304","5.086310","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11305","5.086319","172.30.1.205","172.30.1.104","TCP","54","42056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11306","5.088475","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11307","5.088913","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11308","5.088920","172.30.1.205","172.30.1.104","TCP","54","42056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11309","5.090710","172.30.1.205","172.30.1.104","TCP","54","42056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11310","5.090821","172.30.1.205","172.30.1.104","TCP","74","34694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908317 TSecr=0 WS=128" +"11311","5.090965","172.30.1.104","172.30.1.205","TCP","54","135 > 42056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11312","5.091038","172.30.1.104","172.30.1.205","TCP","54","135 > 42056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11313","5.091045","172.30.1.205","172.30.1.104","TCP","54","42056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11314","5.091117","172.30.1.104","172.30.1.205","TCP","66","49671 > 34694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11315","5.091125","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11316","5.091464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11317","5.091763","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11318","5.091772","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11319","5.093652","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11320","5.094007","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11321","5.094013","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11322","5.095341","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11323","5.096859","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11324","5.096868","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11325","5.097803","172.30.1.205","172.30.1.104","TCP","74","42060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908324 TSecr=0 WS=128" +"11326","5.098101","172.30.1.104","172.30.1.205","TCP","66","135 > 42060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11327","5.098111","172.30.1.205","172.30.1.104","TCP","54","42060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11328","5.098452","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11329","5.098745","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11330","5.098754","172.30.1.205","172.30.1.104","TCP","54","42060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11331","5.100966","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11332","5.101348","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11333","5.101354","172.30.1.205","172.30.1.104","TCP","54","42060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11334","5.103155","172.30.1.205","172.30.1.104","TCP","54","42060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11335","5.103264","172.30.1.205","172.30.1.104","TCP","74","34698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908329 TSecr=0 WS=128" +"11336","5.103416","172.30.1.104","172.30.1.205","TCP","54","135 > 42060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11337","5.103430","172.30.1.104","172.30.1.205","TCP","54","135 > 42060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11338","5.103436","172.30.1.205","172.30.1.104","TCP","54","42060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11339","5.103545","172.30.1.104","172.30.1.205","TCP","66","49671 > 34698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11340","5.103553","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11341","5.103909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11342","5.104190","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11343","5.104199","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11344","5.106074","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11345","5.106428","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11346","5.106434","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11347","5.107763","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11348","5.109161","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11349","5.109170","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11350","5.110103","172.30.1.205","172.30.1.104","TCP","74","42064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908336 TSecr=0 WS=128" +"11351","5.110410","172.30.1.104","172.30.1.205","TCP","66","135 > 42064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11352","5.110421","172.30.1.205","172.30.1.104","TCP","54","42064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11353","5.110764","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11354","5.111045","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11355","5.111054","172.30.1.205","172.30.1.104","TCP","54","42064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11356","5.113238","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11357","5.113617","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11358","5.113623","172.30.1.205","172.30.1.104","TCP","54","42064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11359","5.115411","172.30.1.205","172.30.1.104","TCP","54","42064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11360","5.115522","172.30.1.205","172.30.1.104","TCP","74","34702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908341 TSecr=0 WS=128" +"11361","5.115686","172.30.1.104","172.30.1.205","TCP","54","135 > 42064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11362","5.115729","172.30.1.104","172.30.1.205","TCP","54","135 > 42064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11363","5.115735","172.30.1.205","172.30.1.104","TCP","54","42064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11364","5.115820","172.30.1.104","172.30.1.205","TCP","66","49671 > 34702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11365","5.115828","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11366","5.116173","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11367","5.116484","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11368","5.116493","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11369","5.118383","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11370","5.118789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11371","5.118797","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11372","5.120139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11373","5.121605","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11374","5.121614","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11375","5.122556","172.30.1.205","172.30.1.104","TCP","74","42068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908348 TSecr=0 WS=128" +"11376","5.122869","172.30.1.104","172.30.1.205","TCP","66","135 > 42068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11377","5.122880","172.30.1.205","172.30.1.104","TCP","54","42068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11378","5.123223","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11379","5.123524","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11380","5.123532","172.30.1.205","172.30.1.104","TCP","54","42068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11381","5.125754","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11382","5.126183","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11383","5.126191","172.30.1.205","172.30.1.104","TCP","54","42068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11384","5.127999","172.30.1.205","172.30.1.104","TCP","54","42068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11385","5.128112","172.30.1.205","172.30.1.104","TCP","74","34706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908354 TSecr=0 WS=128" +"11386","5.128256","172.30.1.104","172.30.1.205","TCP","54","135 > 42068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11387","5.128320","172.30.1.104","172.30.1.205","TCP","54","135 > 42068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11388","5.128327","172.30.1.205","172.30.1.104","TCP","54","42068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11389","5.128363","172.30.1.104","172.30.1.205","TCP","66","49671 > 34706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11390","5.128372","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11391","5.128710","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11392","5.130783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11393","5.130790","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11394","5.132662","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11395","5.133030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11396","5.133037","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11397","5.134394","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11398","5.137594","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11399","5.137603","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11400","5.138552","172.30.1.205","172.30.1.104","TCP","74","42072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908364 TSecr=0 WS=128" +"11401","5.138893","172.30.1.104","172.30.1.205","TCP","66","135 > 42072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11402","5.138904","172.30.1.205","172.30.1.104","TCP","54","42072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11403","5.139258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11404","5.139584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11405","5.139593","172.30.1.205","172.30.1.104","TCP","54","42072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11406","5.141796","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11407","5.142182","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11408","5.142189","172.30.1.205","172.30.1.104","TCP","54","42072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11409","5.143989","172.30.1.205","172.30.1.104","TCP","54","42072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11410","5.144102","172.30.1.205","172.30.1.104","TCP","74","34710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908370 TSecr=0 WS=128" +"11411","5.144247","172.30.1.104","172.30.1.205","TCP","54","135 > 42072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11412","5.144263","172.30.1.104","172.30.1.205","TCP","54","135 > 42072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11413","5.144269","172.30.1.205","172.30.1.104","TCP","54","42072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11414","5.144373","172.30.1.104","172.30.1.205","TCP","66","49671 > 34710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11415","5.144382","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11416","5.144721","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11417","5.145026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11418","5.145035","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11419","5.146920","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11420","5.147308","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11421","5.147314","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11422","5.148660","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11423","5.150040","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11424","5.150049","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11425","5.151001","172.30.1.205","172.30.1.104","TCP","74","42076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908377 TSecr=0 WS=128" +"11426","5.151302","172.30.1.104","172.30.1.205","TCP","66","135 > 42076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11427","5.151314","172.30.1.205","172.30.1.104","TCP","54","42076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11428","5.151667","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11429","5.151943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11430","5.151952","172.30.1.205","172.30.1.104","TCP","54","42076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11431","5.154146","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11432","5.154506","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11433","5.154513","172.30.1.205","172.30.1.104","TCP","54","42076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11434","5.156306","172.30.1.205","172.30.1.104","TCP","54","42076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11435","5.156421","172.30.1.205","172.30.1.104","TCP","74","34714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908382 TSecr=0 WS=128" +"11436","5.156571","172.30.1.104","172.30.1.205","TCP","54","135 > 42076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11437","5.156583","172.30.1.104","172.30.1.205","TCP","54","135 > 42076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11438","5.156589","172.30.1.205","172.30.1.104","TCP","54","42076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11439","5.156696","172.30.1.104","172.30.1.205","TCP","66","49671 > 34714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11440","5.156705","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11441","5.157075","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11442","5.157372","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11443","5.157381","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11444","5.159220","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11445","5.159581","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11446","5.159587","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11447","5.160952","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11448","5.162345","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11449","5.162355","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11450","5.163290","172.30.1.205","172.30.1.104","TCP","74","42080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908389 TSecr=0 WS=128" +"11451","5.163594","172.30.1.104","172.30.1.205","TCP","66","135 > 42080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11452","5.163604","172.30.1.205","172.30.1.104","TCP","54","42080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11453","5.163948","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11454","5.164232","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11455","5.164240","172.30.1.205","172.30.1.104","TCP","54","42080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11456","5.166418","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11457","5.166803","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11458","5.166809","172.30.1.205","172.30.1.104","TCP","54","42080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11459","5.168642","172.30.1.205","172.30.1.104","TCP","54","42080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11460","5.168799","172.30.1.205","172.30.1.104","TCP","74","34718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908395 TSecr=0 WS=128" +"11461","5.168884","172.30.1.104","172.30.1.205","TCP","54","135 > 42080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11462","5.168901","172.30.1.104","172.30.1.205","TCP","54","135 > 42080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11463","5.168907","172.30.1.205","172.30.1.104","TCP","54","42080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11464","5.169098","172.30.1.104","172.30.1.205","TCP","66","49671 > 34718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11465","5.169106","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11466","5.169473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11467","5.169757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11468","5.169766","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11469","5.171692","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11470","5.172072","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11471","5.172078","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11472","5.173429","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11473","5.174795","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11474","5.174804","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11475","5.175721","172.30.1.205","172.30.1.104","TCP","74","42084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908402 TSecr=0 WS=128" +"11476","5.176037","172.30.1.104","172.30.1.205","TCP","66","135 > 42084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11477","5.176058","172.30.1.205","172.30.1.104","TCP","54","42084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11478","5.176629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11479","5.176913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11480","5.176922","172.30.1.205","172.30.1.104","TCP","54","42084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11481","5.179099","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11482","5.179500","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11483","5.179514","172.30.1.205","172.30.1.104","TCP","54","42084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11484","5.181335","172.30.1.205","172.30.1.104","TCP","54","42084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11485","5.181442","172.30.1.205","172.30.1.104","TCP","74","34722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908407 TSecr=0 WS=128" +"11486","5.181629","172.30.1.104","172.30.1.205","TCP","54","135 > 42084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11487","5.181637","172.30.1.104","172.30.1.205","TCP","54","135 > 42084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11488","5.181642","172.30.1.205","172.30.1.104","TCP","54","42084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11489","5.181742","172.30.1.104","172.30.1.205","TCP","66","49671 > 34722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11490","5.181750","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11491","5.182093","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11492","5.182393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11493","5.182401","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11494","5.184272","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11495","5.184659","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11496","5.184665","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11497","5.186017","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11498","5.187402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11499","5.187411","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11500","5.188390","172.30.1.205","172.30.1.104","TCP","74","42088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908414 TSecr=0 WS=128" +"11501","5.188677","172.30.1.104","172.30.1.205","TCP","66","135 > 42088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11502","5.188686","172.30.1.205","172.30.1.104","TCP","54","42088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11503","5.189050","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11504","5.189337","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11505","5.189346","172.30.1.205","172.30.1.104","TCP","54","42088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11506","5.191543","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11507","5.191937","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11508","5.191949","172.30.1.205","172.30.1.104","TCP","54","42088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11509","5.193976","172.30.1.205","172.30.1.104","TCP","54","42088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11510","5.194084","172.30.1.205","172.30.1.104","TCP","74","34726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908420 TSecr=0 WS=128" +"11511","5.194261","172.30.1.104","172.30.1.205","TCP","54","135 > 42088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11512","5.194270","172.30.1.104","172.30.1.205","TCP","54","135 > 42088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11513","5.194286","172.30.1.205","172.30.1.104","TCP","54","42088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11514","5.194350","172.30.1.104","172.30.1.205","TCP","66","49671 > 34726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11515","5.194358","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11516","5.194718","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11517","5.195008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11518","5.195016","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11519","5.196909","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11520","5.197267","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11521","5.197273","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11522","5.198620","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11523","5.200108","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11524","5.200117","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11525","5.201087","172.30.1.205","172.30.1.104","TCP","74","42092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908427 TSecr=0 WS=128" +"11526","5.201379","172.30.1.104","172.30.1.205","TCP","66","135 > 42092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11527","5.201389","172.30.1.205","172.30.1.104","TCP","54","42092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11528","5.201767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11529","5.202048","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11530","5.202057","172.30.1.205","172.30.1.104","TCP","54","42092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11531","5.204217","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11532","5.204593","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11533","5.204599","172.30.1.205","172.30.1.104","TCP","54","42092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11534","5.211626","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11535","5.211674","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11536","5.211704","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11537","5.211737","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11538","5.211764","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11539","5.211791","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11540","5.211818","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11541","5.211853","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11542","5.211877","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11543","5.211899","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11544","5.211906","172.30.1.104","172.30.1.205","TCP","54","49671 > 34682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11545","5.211948","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11546","5.211975","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11547","5.212039","172.30.1.104","172.30.1.205","TCP","54","49671 > 34686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11548","5.212063","172.30.1.104","172.30.1.205","TCP","54","49671 > 34682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11549","5.212071","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11550","5.212089","172.30.1.104","172.30.1.205","TCP","54","49671 > 34686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11551","5.212092","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11552","5.212116","172.30.1.104","172.30.1.205","TCP","54","49671 > 34690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11553","5.212146","172.30.1.104","172.30.1.205","TCP","54","49671 > 34694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11554","5.212175","172.30.1.104","172.30.1.205","TCP","54","49671 > 34690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11555","5.212180","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11556","5.212201","172.30.1.104","172.30.1.205","TCP","54","49671 > 34698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11557","5.212229","172.30.1.104","172.30.1.205","TCP","54","49671 > 34702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11558","5.212341","172.30.1.104","172.30.1.205","TCP","54","49671 > 34706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11559","5.212367","172.30.1.104","172.30.1.205","TCP","54","49671 > 34706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11560","5.212372","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11561","5.212395","172.30.1.104","172.30.1.205","TCP","54","49671 > 34702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11562","5.212398","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11563","5.212422","172.30.1.104","172.30.1.205","TCP","54","49671 > 34694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11564","5.212425","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11565","5.212460","172.30.1.104","172.30.1.205","TCP","54","49671 > 34698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11566","5.212464","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11567","5.212492","172.30.1.104","172.30.1.205","TCP","54","49671 > 34710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11568","5.212517","172.30.1.104","172.30.1.205","TCP","54","49671 > 34714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11569","5.212542","172.30.1.104","172.30.1.205","TCP","54","49671 > 34718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11570","5.212568","172.30.1.104","172.30.1.205","TCP","54","49671 > 34722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11571","5.212593","172.30.1.104","172.30.1.205","TCP","54","49671 > 34722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11572","5.212598","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11573","5.212618","172.30.1.104","172.30.1.205","TCP","54","49671 > 34710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11574","5.212622","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11575","5.212644","172.30.1.104","172.30.1.205","TCP","54","49671 > 34714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11576","5.212647","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11577","5.212669","172.30.1.104","172.30.1.205","TCP","54","49671 > 34718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11578","5.212672","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11579","5.212694","172.30.1.104","172.30.1.205","TCP","54","49671 > 34726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11580","5.212719","172.30.1.104","172.30.1.205","TCP","54","49671 > 34726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11581","5.212722","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11582","5.213658","172.30.1.205","172.30.1.104","TCP","54","42092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11583","5.213784","172.30.1.205","172.30.1.104","TCP","74","34730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908440 TSecr=0 WS=128" +"11584","5.213916","172.30.1.104","172.30.1.205","TCP","54","135 > 42092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11585","5.213951","172.30.1.104","172.30.1.205","TCP","54","135 > 42092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11586","5.213955","172.30.1.205","172.30.1.104","TCP","54","42092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11587","5.214081","172.30.1.104","172.30.1.205","TCP","66","49671 > 34730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11588","5.214089","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11589","5.214439","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11590","5.214771","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11591","5.214780","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11592","5.216660","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11593","5.218208","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11594","5.218215","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11595","5.219586","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11596","5.221013","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11597","5.221023","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11598","5.221972","172.30.1.205","172.30.1.104","TCP","74","42096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908448 TSecr=0 WS=128" +"11599","5.222269","172.30.1.104","172.30.1.205","TCP","66","135 > 42096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11600","5.222284","172.30.1.205","172.30.1.104","TCP","54","42096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11601","5.222637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11602","5.222917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11603","5.222926","172.30.1.205","172.30.1.104","TCP","54","42096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11604","5.225170","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11605","5.225563","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11606","5.225570","172.30.1.205","172.30.1.104","TCP","54","42096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11607","5.227384","172.30.1.205","172.30.1.104","TCP","54","42096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11608","5.227493","172.30.1.205","172.30.1.104","TCP","74","34734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908453 TSecr=0 WS=128" +"11609","5.227653","172.30.1.104","172.30.1.205","TCP","54","135 > 42096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11610","5.227682","172.30.1.104","172.30.1.205","TCP","54","135 > 42096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11611","5.227688","172.30.1.205","172.30.1.104","TCP","54","42096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11612","5.227795","172.30.1.104","172.30.1.205","TCP","66","49671 > 34734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11613","5.227807","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11614","5.228183","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11615","5.228458","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11616","5.228466","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11617","5.230398","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11618","5.230741","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11619","5.230747","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11620","5.232138","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11621","5.233519","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11622","5.233529","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11623","5.234450","172.30.1.205","172.30.1.104","TCP","74","42100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908460 TSecr=0 WS=128" +"11624","5.234753","172.30.1.104","172.30.1.205","TCP","66","135 > 42100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11625","5.234763","172.30.1.205","172.30.1.104","TCP","54","42100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11626","5.235129","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11627","5.235422","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11628","5.235430","172.30.1.205","172.30.1.104","TCP","54","42100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11629","5.237631","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11630","5.238021","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11631","5.238027","172.30.1.205","172.30.1.104","TCP","54","42100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11632","5.239959","172.30.1.205","172.30.1.104","TCP","54","42100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11633","5.240068","172.30.1.205","172.30.1.104","TCP","74","34738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908466 TSecr=0 WS=128" +"11634","5.240243","172.30.1.104","172.30.1.205","TCP","54","135 > 42100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11635","5.240267","172.30.1.104","172.30.1.205","TCP","54","135 > 42100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11636","5.240272","172.30.1.205","172.30.1.104","TCP","54","42100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11637","5.240398","172.30.1.104","172.30.1.205","TCP","66","49671 > 34738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11638","5.240406","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11639","5.240754","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11640","5.241052","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11641","5.241060","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11642","5.242976","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11643","5.243353","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11644","5.243359","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11645","5.244701","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11646","5.246176","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11647","5.246185","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11648","5.247151","172.30.1.205","172.30.1.104","TCP","74","42104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908473 TSecr=0 WS=128" +"11649","5.247469","172.30.1.104","172.30.1.205","TCP","66","135 > 42104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11650","5.247483","172.30.1.205","172.30.1.104","TCP","54","42104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11651","5.247828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11652","5.248121","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11653","5.248130","172.30.1.205","172.30.1.104","TCP","54","42104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11654","5.250334","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11655","5.250714","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11656","5.250721","172.30.1.205","172.30.1.104","TCP","54","42104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11657","5.252530","172.30.1.205","172.30.1.104","TCP","54","42104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11658","5.252639","172.30.1.205","172.30.1.104","TCP","74","34742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908479 TSecr=0 WS=128" +"11659","5.252792","172.30.1.104","172.30.1.205","TCP","54","135 > 42104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11660","5.252813","172.30.1.104","172.30.1.205","TCP","54","135 > 42104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11661","5.252819","172.30.1.205","172.30.1.104","TCP","54","42104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11662","5.252901","172.30.1.104","172.30.1.205","TCP","66","49671 > 34742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11663","5.252909","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11664","5.253272","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11665","5.253554","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11666","5.253562","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11667","5.255436","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11668","5.255862","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11669","5.255868","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11670","5.257274","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11671","5.258770","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11672","5.258779","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11673","5.259698","172.30.1.205","172.30.1.104","TCP","74","42108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908486 TSecr=0 WS=128" +"11674","5.260053","172.30.1.104","172.30.1.205","TCP","66","135 > 42108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11675","5.260073","172.30.1.205","172.30.1.104","TCP","54","42108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11676","5.260600","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11677","5.260887","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11678","5.260897","172.30.1.205","172.30.1.104","TCP","54","42108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11679","5.263082","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11680","5.263489","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11681","5.263495","172.30.1.205","172.30.1.104","TCP","54","42108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11682","5.265314","172.30.1.205","172.30.1.104","TCP","54","42108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11683","5.265423","172.30.1.205","172.30.1.104","TCP","74","34746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908491 TSecr=0 WS=128" +"11684","5.265573","172.30.1.104","172.30.1.205","TCP","54","135 > 42108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11685","5.265612","172.30.1.104","172.30.1.205","TCP","54","135 > 42108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11686","5.265617","172.30.1.205","172.30.1.104","TCP","54","42108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11687","5.265689","172.30.1.104","172.30.1.205","TCP","66","49671 > 34746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11688","5.265697","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11689","5.266043","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11690","5.266335","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11691","5.266343","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11692","5.268210","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11693","5.268567","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11694","5.268573","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11695","5.269947","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11696","5.271343","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11697","5.271352","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11698","5.272274","172.30.1.205","172.30.1.104","TCP","74","42112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908498 TSecr=0 WS=128" +"11699","5.272556","172.30.1.104","172.30.1.205","TCP","66","135 > 42112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11700","5.272566","172.30.1.205","172.30.1.104","TCP","54","42112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11701","5.272939","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11702","5.273233","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11703","5.273248","172.30.1.205","172.30.1.104","TCP","54","42112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11704","5.275536","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11705","5.275926","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11706","5.275934","172.30.1.205","172.30.1.104","TCP","54","42112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11707","5.277795","172.30.1.205","172.30.1.104","TCP","54","42112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11708","5.277914","172.30.1.205","172.30.1.104","TCP","74","34750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908504 TSecr=0 WS=128" +"11709","5.278070","172.30.1.104","172.30.1.205","TCP","54","135 > 42112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11710","5.278079","172.30.1.104","172.30.1.205","TCP","54","135 > 42112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11711","5.278084","172.30.1.205","172.30.1.104","TCP","54","42112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11712","5.278201","172.30.1.104","172.30.1.205","TCP","66","49671 > 34750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11713","5.278209","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11714","5.278569","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11715","5.278840","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11716","5.278848","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11717","5.280735","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11718","5.282304","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11719","5.282311","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11720","5.283726","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11721","5.285124","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11722","5.285143","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11723","5.286257","172.30.1.205","172.30.1.104","TCP","74","42116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908512 TSecr=0 WS=128" +"11724","5.286551","172.30.1.104","172.30.1.205","TCP","66","135 > 42116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11725","5.286561","172.30.1.205","172.30.1.104","TCP","54","42116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11726","5.286911","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11727","5.287239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11728","5.287260","172.30.1.205","172.30.1.104","TCP","54","42116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11729","5.289666","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11730","5.290068","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11731","5.290075","172.30.1.205","172.30.1.104","TCP","54","42116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11732","5.291884","172.30.1.205","172.30.1.104","TCP","54","42116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11733","5.291992","172.30.1.205","172.30.1.104","TCP","74","34754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908518 TSecr=0 WS=128" +"11734","5.292140","172.30.1.104","172.30.1.205","TCP","54","135 > 42116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11735","5.292193","172.30.1.104","172.30.1.205","TCP","54","135 > 42116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11736","5.292198","172.30.1.205","172.30.1.104","TCP","54","42116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11737","5.292265","172.30.1.104","172.30.1.205","TCP","66","49671 > 34754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11738","5.292273","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11739","5.292635","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11740","5.292924","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11741","5.292932","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11742","5.294794","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11743","5.295166","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11744","5.295172","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11745","5.296526","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11746","5.298013","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11747","5.298023","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11748","5.298963","172.30.1.205","172.30.1.104","TCP","74","42120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908525 TSecr=0 WS=128" +"11749","5.299278","172.30.1.104","172.30.1.205","TCP","66","135 > 42120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11750","5.299288","172.30.1.205","172.30.1.104","TCP","54","42120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11751","5.299632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11752","5.299948","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11753","5.299957","172.30.1.205","172.30.1.104","TCP","54","42120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11754","5.302167","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11755","5.302569","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11756","5.302581","172.30.1.205","172.30.1.104","TCP","54","42120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11757","5.304537","172.30.1.205","172.30.1.104","TCP","54","42120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11758","5.304647","172.30.1.205","172.30.1.104","TCP","74","34758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908531 TSecr=0 WS=128" +"11759","5.304814","172.30.1.104","172.30.1.205","TCP","54","135 > 42120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11760","5.304828","172.30.1.104","172.30.1.205","TCP","54","135 > 42120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11761","5.304834","172.30.1.205","172.30.1.104","TCP","54","42120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11762","5.304939","172.30.1.104","172.30.1.205","TCP","66","49671 > 34758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11763","5.304947","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11764","5.305296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11765","5.305590","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11766","5.305599","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11767","5.307478","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11768","5.307839","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11769","5.307845","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11770","5.309224","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11771","5.310665","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11772","5.310677","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11773","5.311661","172.30.1.205","172.30.1.104","TCP","74","42124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908538 TSecr=0 WS=128" +"11774","5.311978","172.30.1.104","172.30.1.205","TCP","66","135 > 42124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11775","5.311995","172.30.1.205","172.30.1.104","TCP","54","42124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11776","5.312412","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11777","5.312702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11778","5.312712","172.30.1.205","172.30.1.104","TCP","54","42124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11779","5.314956","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11780","5.315343","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11781","5.315350","172.30.1.205","172.30.1.104","TCP","54","42124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11782","5.317197","172.30.1.205","172.30.1.104","TCP","54","42124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11783","5.317315","172.30.1.205","172.30.1.104","TCP","74","34762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908543 TSecr=0 WS=128" +"11784","5.317483","172.30.1.104","172.30.1.205","TCP","54","135 > 42124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11785","5.317502","172.30.1.104","172.30.1.205","TCP","54","135 > 42124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11786","5.317507","172.30.1.205","172.30.1.104","TCP","54","42124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11787","5.317600","172.30.1.104","172.30.1.205","TCP","66","49671 > 34762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11788","5.317609","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11789","5.317954","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11790","5.318267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11791","5.318276","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11792","5.320152","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11793","5.320545","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11794","5.320551","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11795","5.321951","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11796","5.323426","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11797","5.323436","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11798","5.324382","172.30.1.205","172.30.1.104","TCP","74","42128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908550 TSecr=0 WS=128" +"11799","5.324720","172.30.1.104","172.30.1.205","TCP","66","135 > 42128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11800","5.324730","172.30.1.205","172.30.1.104","TCP","54","42128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11801","5.325103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11802","5.325403","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11803","5.325413","172.30.1.205","172.30.1.104","TCP","54","42128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11804","5.327602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11805","5.328000","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11806","5.328007","172.30.1.205","172.30.1.104","TCP","54","42128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11807","5.329849","172.30.1.205","172.30.1.104","TCP","54","42128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11808","5.329964","172.30.1.205","172.30.1.104","TCP","74","34766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908556 TSecr=0 WS=128" +"11809","5.330136","172.30.1.104","172.30.1.205","TCP","54","135 > 42128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11810","5.330169","172.30.1.104","172.30.1.205","TCP","54","135 > 42128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11811","5.330174","172.30.1.205","172.30.1.104","TCP","54","42128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11812","5.330396","172.30.1.104","172.30.1.205","TCP","66","49671 > 34766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11813","5.330404","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11814","5.330750","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11815","5.331091","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11816","5.331101","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11817","5.333000","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11818","5.333404","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11819","5.333414","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11820","5.334759","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11821","5.336870","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11822","5.336888","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11823","5.337946","172.30.1.205","172.30.1.104","TCP","74","42132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908564 TSecr=0 WS=128" +"11824","5.338272","172.30.1.104","172.30.1.205","TCP","66","135 > 42132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11825","5.338282","172.30.1.205","172.30.1.104","TCP","54","42132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11826","5.338634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11827","5.338959","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11828","5.338968","172.30.1.205","172.30.1.104","TCP","54","42132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11829","5.341178","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11830","5.341600","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11831","5.341607","172.30.1.205","172.30.1.104","TCP","54","42132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11832","5.343407","172.30.1.205","172.30.1.104","TCP","54","42132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11833","5.343522","172.30.1.205","172.30.1.104","TCP","74","34770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908569 TSecr=0 WS=128" +"11834","5.343684","172.30.1.104","172.30.1.205","TCP","54","135 > 42132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11835","5.343706","172.30.1.104","172.30.1.205","TCP","54","135 > 42132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11836","5.343712","172.30.1.205","172.30.1.104","TCP","54","42132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11837","5.343802","172.30.1.104","172.30.1.205","TCP","66","49671 > 34770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11838","5.343811","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11839","5.344162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11840","5.344454","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11841","5.344462","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11842","5.346372","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11843","5.346715","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11844","5.346722","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11845","5.348058","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11846","5.349529","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11847","5.349538","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11848","5.350485","172.30.1.205","172.30.1.104","TCP","74","42136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908576 TSecr=0 WS=128" +"11849","5.350834","172.30.1.104","172.30.1.205","TCP","66","135 > 42136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11850","5.350845","172.30.1.205","172.30.1.104","TCP","54","42136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11851","5.351190","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11852","5.351489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11853","5.351500","172.30.1.205","172.30.1.104","TCP","54","42136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11854","5.353740","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11855","5.354116","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11856","5.354123","172.30.1.205","172.30.1.104","TCP","54","42136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11857","5.355115","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11858","5.355164","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11859","5.355202","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11860","5.355235","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11861","5.355268","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11862","5.355302","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11863","5.355335","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11864","5.355363","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11865","5.355395","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11866","5.355422","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11867","5.355493","172.30.1.104","172.30.1.205","TCP","54","49671 > 34734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11868","5.355512","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11869","5.355549","172.30.1.104","172.30.1.205","TCP","54","49671 > 34738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11870","5.355555","172.30.1.104","172.30.1.205","TCP","54","49671 > 34734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11871","5.355561","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11872","5.355563","172.30.1.104","172.30.1.205","TCP","54","49671 > 34742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11873","5.355570","172.30.1.104","172.30.1.205","TCP","54","49671 > 34746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11874","5.355589","172.30.1.104","172.30.1.205","TCP","54","49671 > 34746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11875","5.355593","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11876","5.355780","172.30.1.104","172.30.1.205","TCP","54","49671 > 34750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11877","5.355796","172.30.1.104","172.30.1.205","TCP","54","49671 > 34750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11878","5.355801","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11879","5.355816","172.30.1.104","172.30.1.205","TCP","54","49671 > 34738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11880","5.355818","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11881","5.355837","172.30.1.104","172.30.1.205","TCP","54","49671 > 34742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11882","5.355839","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11883","5.355857","172.30.1.104","172.30.1.205","TCP","54","49671 > 34754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11884","5.355877","172.30.1.104","172.30.1.205","TCP","54","49671 > 34758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11885","5.356012","172.30.1.104","172.30.1.205","TCP","54","49671 > 34762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11886","5.356018","172.30.1.104","172.30.1.205","TCP","54","49671 > 34754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11887","5.356022","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11888","5.356028","172.30.1.104","172.30.1.205","TCP","54","49671 > 34766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11889","5.356268","172.30.1.104","172.30.1.205","TCP","54","49671 > 34766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11890","5.356273","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11891","5.356279","172.30.1.104","172.30.1.205","TCP","54","49671 > 34770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11892","5.356284","172.30.1.104","172.30.1.205","TCP","54","49671 > 34770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11893","5.356289","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11894","5.356290","172.30.1.104","172.30.1.205","TCP","54","49671 > 34758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11895","5.356291","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11896","5.356293","172.30.1.104","172.30.1.205","TCP","54","49671 > 34762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11897","5.356294","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11898","5.356296","172.30.1.104","172.30.1.205","TCP","54","49671 > 34730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11899","5.356298","172.30.1.104","172.30.1.205","TCP","54","49671 > 34730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"11900","5.356300","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"11901","5.356894","172.30.1.205","172.30.1.104","TCP","54","42136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11902","5.357012","172.30.1.205","172.30.1.104","TCP","74","34774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908583 TSecr=0 WS=128" +"11903","5.357164","172.30.1.104","172.30.1.205","TCP","54","135 > 42136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11904","5.357206","172.30.1.104","172.30.1.205","TCP","54","135 > 42136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11905","5.357210","172.30.1.205","172.30.1.104","TCP","54","42136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11906","5.357314","172.30.1.104","172.30.1.205","TCP","66","49671 > 34774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11907","5.357322","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11908","5.357682","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11909","5.357989","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11910","5.357998","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11911","5.359873","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11912","5.360218","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11913","5.360224","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11914","5.361615","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11915","5.363016","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11916","5.363025","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11917","5.363988","172.30.1.205","172.30.1.104","TCP","74","42140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908590 TSecr=0 WS=128" +"11918","5.364270","172.30.1.104","172.30.1.205","TCP","66","135 > 42140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11919","5.364282","172.30.1.205","172.30.1.104","TCP","54","42140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11920","5.364637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11921","5.364945","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11922","5.364955","172.30.1.205","172.30.1.104","TCP","54","42140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11923","5.367171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11924","5.367557","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11925","5.367564","172.30.1.205","172.30.1.104","TCP","54","42140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11926","5.369390","172.30.1.205","172.30.1.104","TCP","54","42140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11927","5.369505","172.30.1.205","172.30.1.104","TCP","74","34778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908595 TSecr=0 WS=128" +"11928","5.369655","172.30.1.104","172.30.1.205","TCP","54","135 > 42140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11929","5.369665","172.30.1.104","172.30.1.205","TCP","54","135 > 42140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11930","5.369670","172.30.1.205","172.30.1.104","TCP","54","42140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11931","5.369827","172.30.1.104","172.30.1.205","TCP","66","49671 > 34778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11932","5.369835","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11933","5.370179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11934","5.370466","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11935","5.370475","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11936","5.372353","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11937","5.372748","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11938","5.372760","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11939","5.374330","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11940","5.375786","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11941","5.375804","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11942","5.376863","172.30.1.205","172.30.1.104","TCP","74","42144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908603 TSecr=0 WS=128" +"11943","5.377156","172.30.1.104","172.30.1.205","TCP","66","135 > 42144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11944","5.377167","172.30.1.205","172.30.1.104","TCP","54","42144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11945","5.377528","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11946","5.377812","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11947","5.377822","172.30.1.205","172.30.1.104","TCP","54","42144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11948","5.380001","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11949","5.380364","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11950","5.380370","172.30.1.205","172.30.1.104","TCP","54","42144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11951","5.382190","172.30.1.205","172.30.1.104","TCP","54","42144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11952","5.382300","172.30.1.205","172.30.1.104","TCP","74","34782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908608 TSecr=0 WS=128" +"11953","5.382486","172.30.1.104","172.30.1.205","TCP","54","135 > 42144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11954","5.382497","172.30.1.104","172.30.1.205","TCP","54","135 > 42144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11955","5.382502","172.30.1.205","172.30.1.104","TCP","54","42144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11956","5.382572","172.30.1.104","172.30.1.205","TCP","66","49671 > 34782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11957","5.382583","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11958","5.382942","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11959","5.384449","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11960","5.384470","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11961","5.386570","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11962","5.386953","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11963","5.386959","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11964","5.388305","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11965","5.389712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11966","5.389721","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11967","5.390660","172.30.1.205","172.30.1.104","TCP","74","42148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908617 TSecr=0 WS=128" +"11968","5.390964","172.30.1.104","172.30.1.205","TCP","66","135 > 42148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11969","5.390976","172.30.1.205","172.30.1.104","TCP","54","42148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11970","5.391333","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11971","5.391613","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11972","5.391622","172.30.1.205","172.30.1.104","TCP","54","42148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11973","5.393856","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11974","5.394275","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"11975","5.394282","172.30.1.205","172.30.1.104","TCP","54","42148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11976","5.396097","172.30.1.205","172.30.1.104","TCP","54","42148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"11977","5.396212","172.30.1.205","172.30.1.104","TCP","74","34786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908622 TSecr=0 WS=128" +"11978","5.396391","172.30.1.104","172.30.1.205","TCP","54","135 > 42148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11979","5.396401","172.30.1.104","172.30.1.205","TCP","54","135 > 42148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"11980","5.396406","172.30.1.205","172.30.1.104","TCP","54","42148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"11981","5.396476","172.30.1.104","172.30.1.205","TCP","66","49671 > 34786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11982","5.396484","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11983","5.396856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"11984","5.397764","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11985","5.397773","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11986","5.399656","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"11987","5.400012","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"11988","5.400018","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"11989","5.401403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"11990","5.402882","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"11991","5.402891","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"11992","5.403814","172.30.1.205","172.30.1.104","TCP","74","42152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908630 TSecr=0 WS=128" +"11993","5.404097","172.30.1.104","172.30.1.205","TCP","66","135 > 42152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"11994","5.404108","172.30.1.205","172.30.1.104","TCP","54","42152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"11995","5.404455","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"11996","5.406844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"11997","5.406853","172.30.1.205","172.30.1.104","TCP","54","42152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"11998","5.409097","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"11999","5.409800","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12000","5.409807","172.30.1.205","172.30.1.104","TCP","54","42152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12001","5.411634","172.30.1.205","172.30.1.104","TCP","54","42152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12002","5.411754","172.30.1.205","172.30.1.104","TCP","74","34790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908638 TSecr=0 WS=128" +"12003","5.411915","172.30.1.104","172.30.1.205","TCP","54","135 > 42152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12004","5.412126","172.30.1.104","172.30.1.205","TCP","66","49671 > 34790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12005","5.412136","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12006","5.412508","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12007","5.412697","172.30.1.104","172.30.1.205","TCP","54","135 > 42152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12008","5.412704","172.30.1.205","172.30.1.104","TCP","54","42152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12009","5.412822","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12010","5.412830","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12011","5.414705","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12012","5.415071","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12013","5.415077","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12014","5.416422","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12015","5.417957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12016","5.417975","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12017","5.419125","172.30.1.205","172.30.1.104","TCP","74","42156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908645 TSecr=0 WS=128" +"12018","5.419454","172.30.1.104","172.30.1.205","TCP","66","135 > 42156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12019","5.419465","172.30.1.205","172.30.1.104","TCP","54","42156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12020","5.419813","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12021","5.420113","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12022","5.420130","172.30.1.205","172.30.1.104","TCP","54","42156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12023","5.422578","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12024","5.422959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12025","5.422965","172.30.1.205","172.30.1.104","TCP","54","42156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12026","5.424771","172.30.1.205","172.30.1.104","TCP","54","42156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12027","5.424890","172.30.1.205","172.30.1.104","TCP","74","34794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908651 TSecr=0 WS=128" +"12028","5.425047","172.30.1.104","172.30.1.205","TCP","54","135 > 42156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12029","5.425056","172.30.1.104","172.30.1.205","TCP","54","135 > 42156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12030","5.425060","172.30.1.205","172.30.1.104","TCP","54","42156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12031","5.425192","172.30.1.104","172.30.1.205","TCP","66","49671 > 34794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12032","5.425200","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12033","5.425552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12034","5.426553","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12035","5.426560","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12036","5.428423","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12037","5.428799","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12038","5.428806","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12039","5.430165","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12040","5.431626","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12041","5.431636","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12042","5.432562","172.30.1.205","172.30.1.104","TCP","74","42160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908658 TSecr=0 WS=128" +"12043","5.432966","172.30.1.104","172.30.1.205","TCP","66","135 > 42160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12044","5.432977","172.30.1.205","172.30.1.104","TCP","54","42160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12045","5.433327","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12046","5.433617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12047","5.433626","172.30.1.205","172.30.1.104","TCP","54","42160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12048","5.435811","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12049","5.436238","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12050","5.436244","172.30.1.205","172.30.1.104","TCP","54","42160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12051","5.438074","172.30.1.205","172.30.1.104","TCP","54","42160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12052","5.438185","172.30.1.205","172.30.1.104","TCP","74","34798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908664 TSecr=0 WS=128" +"12053","5.438351","172.30.1.104","172.30.1.205","TCP","54","135 > 42160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12054","5.438359","172.30.1.104","172.30.1.205","TCP","54","135 > 42160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12055","5.438371","172.30.1.205","172.30.1.104","TCP","54","42160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12056","5.438462","172.30.1.104","172.30.1.205","TCP","66","49671 > 34798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12057","5.438470","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12058","5.438819","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12059","5.439109","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12060","5.439120","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12061","5.441052","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12062","5.441413","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12063","5.441420","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12064","5.442765","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12065","5.444214","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12066","5.444226","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12067","5.445212","172.30.1.205","172.30.1.104","TCP","74","42164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908671 TSecr=0 WS=128" +"12068","5.445526","172.30.1.104","172.30.1.205","TCP","66","135 > 42164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12069","5.445537","172.30.1.205","172.30.1.104","TCP","54","42164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12070","5.445899","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12071","5.446172","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12072","5.446180","172.30.1.205","172.30.1.104","TCP","54","42164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12073","5.448382","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12074","5.448769","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12075","5.448786","172.30.1.205","172.30.1.104","TCP","54","42164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12076","5.450603","172.30.1.205","172.30.1.104","TCP","54","42164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12077","5.450715","172.30.1.205","172.30.1.104","TCP","74","34802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908677 TSecr=0 WS=128" +"12078","5.450896","172.30.1.104","172.30.1.205","TCP","54","135 > 42164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12079","5.450933","172.30.1.104","172.30.1.205","TCP","54","135 > 42164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12080","5.450938","172.30.1.205","172.30.1.104","TCP","54","42164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12081","5.451010","172.30.1.104","172.30.1.205","TCP","66","49671 > 34802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12082","5.451018","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12083","5.451362","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12084","5.451642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12085","5.451651","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12086","5.453588","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12087","5.453968","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12088","5.453981","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12089","5.455554","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12090","5.457089","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12091","5.457098","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12092","5.458125","172.30.1.205","172.30.1.104","TCP","74","42168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908684 TSecr=0 WS=128" +"12093","5.458482","172.30.1.104","172.30.1.205","TCP","66","135 > 42168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12094","5.458503","172.30.1.205","172.30.1.104","TCP","54","42168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12095","5.459010","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12096","5.459304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12097","5.459317","172.30.1.205","172.30.1.104","TCP","54","42168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12098","5.461512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12099","5.461911","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12100","5.461918","172.30.1.205","172.30.1.104","TCP","54","42168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12101","5.463726","172.30.1.205","172.30.1.104","TCP","54","42168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12102","5.463836","172.30.1.205","172.30.1.104","TCP","74","34806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908690 TSecr=0 WS=128" +"12103","5.464021","172.30.1.104","172.30.1.205","TCP","54","135 > 42168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12104","5.464045","172.30.1.104","172.30.1.205","TCP","54","135 > 42168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12105","5.464050","172.30.1.205","172.30.1.104","TCP","54","42168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12106","5.464122","172.30.1.104","172.30.1.205","TCP","66","49671 > 34806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12107","5.464130","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12108","5.464474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12109","5.464767","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12110","5.464786","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12111","5.466663","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12112","5.467026","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12113","5.467032","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12114","5.468391","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12115","5.469833","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12116","5.469845","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12117","5.470791","172.30.1.205","172.30.1.104","TCP","74","42172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908697 TSecr=0 WS=128" +"12118","5.471092","172.30.1.104","172.30.1.205","TCP","66","135 > 42172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12119","5.471113","172.30.1.205","172.30.1.104","TCP","54","42172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12120","5.471708","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12121","5.471997","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12122","5.472006","172.30.1.205","172.30.1.104","TCP","54","42172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12123","5.474212","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12124","5.474623","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12125","5.474630","172.30.1.205","172.30.1.104","TCP","54","42172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12126","5.476436","172.30.1.205","172.30.1.104","TCP","54","42172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12127","5.476549","172.30.1.205","172.30.1.104","TCP","74","34810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908702 TSecr=0 WS=128" +"12128","5.476691","172.30.1.104","172.30.1.205","TCP","54","135 > 42172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12129","5.476712","172.30.1.104","172.30.1.205","TCP","54","135 > 42172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12130","5.476717","172.30.1.205","172.30.1.104","TCP","54","42172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12131","5.476838","172.30.1.104","172.30.1.205","TCP","66","49671 > 34810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12132","5.476847","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12133","5.477198","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12134","5.478172","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12135","5.478181","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12136","5.480059","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12137","5.480443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12138","5.480455","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12139","5.482033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12140","5.483504","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12141","5.483514","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12142","5.484441","172.30.1.205","172.30.1.104","TCP","74","42176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908710 TSecr=0 WS=128" +"12143","5.484745","172.30.1.104","172.30.1.205","TCP","66","135 > 42176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12144","5.484756","172.30.1.205","172.30.1.104","TCP","54","42176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12145","5.485122","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12146","5.485401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12147","5.485410","172.30.1.205","172.30.1.104","TCP","54","42176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12148","5.487586","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12149","5.487966","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12150","5.487972","172.30.1.205","172.30.1.104","TCP","54","42176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12151","5.489794","172.30.1.205","172.30.1.104","TCP","54","42176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12152","5.489903","172.30.1.205","172.30.1.104","TCP","74","34814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908716 TSecr=0 WS=128" +"12153","5.490083","172.30.1.104","172.30.1.205","TCP","54","135 > 42176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12154","5.490098","172.30.1.104","172.30.1.205","TCP","54","135 > 42176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12155","5.490103","172.30.1.205","172.30.1.104","TCP","54","42176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12156","5.490174","172.30.1.104","172.30.1.205","TCP","66","49671 > 34814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12157","5.490182","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12158","5.490532","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12159","5.490861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12160","5.490870","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12161","5.492753","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12162","5.493167","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12163","5.493174","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12164","5.494512","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12165","5.495995","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12166","5.496005","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12167","5.496949","172.30.1.205","172.30.1.104","TCP","74","42180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908723 TSecr=0 WS=128" +"12168","5.497261","172.30.1.104","172.30.1.205","TCP","66","135 > 42180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12169","5.497272","172.30.1.205","172.30.1.104","TCP","54","42180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12170","5.497623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12171","5.497901","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12172","5.497910","172.30.1.205","172.30.1.104","TCP","54","42180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12173","5.500077","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12174","5.500453","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12175","5.500466","172.30.1.205","172.30.1.104","TCP","54","42180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12176","5.502554","172.30.1.205","172.30.1.104","TCP","54","42180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12177","5.502665","172.30.1.205","172.30.1.104","TCP","74","34818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908729 TSecr=0 WS=128" +"12178","5.502812","172.30.1.104","172.30.1.205","TCP","54","135 > 42180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12179","5.502839","172.30.1.104","172.30.1.205","TCP","54","135 > 42180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12180","5.502845","172.30.1.205","172.30.1.104","TCP","54","42180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12181","5.502919","172.30.1.104","172.30.1.205","TCP","66","49671 > 34818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12182","5.502927","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12183","5.503270","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12184","5.503557","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12185","5.503566","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12186","5.505547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12187","5.505900","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12188","5.505906","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12189","5.507289","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12190","5.508692","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12191","5.508701","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12192","5.509698","172.30.1.205","172.30.1.104","TCP","74","42184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908736 TSecr=0 WS=128" +"12193","5.510090","172.30.1.104","172.30.1.205","TCP","66","135 > 42184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12194","5.510101","172.30.1.205","172.30.1.104","TCP","54","42184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12195","5.510451","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12196","5.510730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12197","5.510739","172.30.1.205","172.30.1.104","TCP","54","42184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12198","5.512931","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12199","5.513297","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12200","5.513304","172.30.1.205","172.30.1.104","TCP","54","42184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12201","5.514147","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12202","5.514196","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12203","5.514232","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12204","5.514264","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12205","5.514298","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12206","5.514324","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12207","5.514356","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12208","5.514378","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12209","5.514393","172.30.1.104","172.30.1.205","TCP","54","49671 > 34778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12210","5.514429","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12211","5.514462","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12212","5.514484","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12213","5.514507","172.30.1.104","172.30.1.205","TCP","54","49671 > 34782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12214","5.514525","172.30.1.104","172.30.1.205","TCP","54","49671 > 34778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12215","5.514531","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12216","5.514554","172.30.1.104","172.30.1.205","TCP","54","49671 > 34782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12217","5.514557","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12218","5.514579","172.30.1.104","172.30.1.205","TCP","54","49671 > 34786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12219","5.514601","172.30.1.104","172.30.1.205","TCP","54","49671 > 34790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12220","5.514621","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12221","5.514765","172.30.1.104","172.30.1.205","TCP","54","49671 > 34794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12222","5.514780","172.30.1.104","172.30.1.205","TCP","54","49671 > 34798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12223","5.514800","172.30.1.104","172.30.1.205","TCP","54","49671 > 34786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12224","5.514806","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12225","5.514820","172.30.1.104","172.30.1.205","TCP","54","49671 > 34798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12226","5.514823","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12227","5.514841","172.30.1.104","172.30.1.205","TCP","54","49671 > 34790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12228","5.514843","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12229","5.514870","172.30.1.104","172.30.1.205","TCP","54","49671 > 34794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12230","5.514874","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12231","5.514898","172.30.1.104","172.30.1.205","TCP","54","49671 > 34802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12232","5.514926","172.30.1.104","172.30.1.205","TCP","54","49671 > 34806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12233","5.514953","172.30.1.104","172.30.1.205","TCP","54","49671 > 34810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12234","5.514980","172.30.1.104","172.30.1.205","TCP","54","49671 > 34802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12235","5.514985","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12236","5.515010","172.30.1.104","172.30.1.205","TCP","54","49671 > 34806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12237","5.515015","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12238","5.515040","172.30.1.104","172.30.1.205","TCP","54","49671 > 34810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12239","5.515044","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12240","5.515069","172.30.1.104","172.30.1.205","TCP","54","49671 > 34814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12241","5.515098","172.30.1.104","172.30.1.205","TCP","54","49671 > 34818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12242","5.515124","172.30.1.104","172.30.1.205","TCP","54","49671 > 34814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12243","5.515129","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12244","5.515151","172.30.1.104","172.30.1.205","TCP","54","49671 > 34818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12245","5.515154","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12246","5.515529","172.30.1.104","172.30.1.205","TCP","54","49671 > 34774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12247","5.515554","172.30.1.104","172.30.1.205","TCP","54","49671 > 34774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12248","5.515559","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12249","5.516230","172.30.1.205","172.30.1.104","TCP","54","42184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12250","5.516342","172.30.1.205","172.30.1.104","TCP","74","34822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908742 TSecr=0 WS=128" +"12251","5.516496","172.30.1.104","172.30.1.205","TCP","54","135 > 42184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12252","5.516506","172.30.1.104","172.30.1.205","TCP","54","135 > 42184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12253","5.516512","172.30.1.205","172.30.1.104","TCP","54","42184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12254","5.516719","172.30.1.104","172.30.1.205","TCP","66","49671 > 34822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12255","5.516728","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12256","5.517111","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12257","5.517421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12258","5.517436","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12259","5.519399","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12260","5.519769","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12261","5.519777","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12262","5.521204","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12263","5.522717","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12264","5.522729","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12265","5.523715","172.30.1.205","172.30.1.104","TCP","74","42188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908750 TSecr=0 WS=128" +"12266","5.524017","172.30.1.104","172.30.1.205","TCP","66","135 > 42188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12267","5.524030","172.30.1.205","172.30.1.104","TCP","54","42188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12268","5.524391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12269","5.524689","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12270","5.524698","172.30.1.205","172.30.1.104","TCP","54","42188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12271","5.526942","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12272","5.527332","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12273","5.527339","172.30.1.205","172.30.1.104","TCP","54","42188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12274","5.529195","172.30.1.205","172.30.1.104","TCP","54","42188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12275","5.529310","172.30.1.205","172.30.1.104","TCP","74","34826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908755 TSecr=0 WS=128" +"12276","5.529487","172.30.1.104","172.30.1.205","TCP","54","135 > 42188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12277","5.529521","172.30.1.104","172.30.1.205","TCP","54","135 > 42188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12278","5.529528","172.30.1.205","172.30.1.104","TCP","54","42188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12279","5.529632","172.30.1.104","172.30.1.205","TCP","66","49671 > 34826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12280","5.529647","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12281","5.529992","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12282","5.530300","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12283","5.530309","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12284","5.532189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12285","5.532571","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12286","5.532577","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12287","5.533948","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12288","5.535403","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12289","5.535414","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12290","5.536355","172.30.1.205","172.30.1.104","TCP","74","42192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908762 TSecr=0 WS=128" +"12291","5.536826","172.30.1.104","172.30.1.205","TCP","66","135 > 42192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12292","5.536837","172.30.1.205","172.30.1.104","TCP","54","42192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12293","5.537203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12294","5.537495","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12295","5.537504","172.30.1.205","172.30.1.104","TCP","54","42192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12296","5.539686","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12297","5.540083","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12298","5.540090","172.30.1.205","172.30.1.104","TCP","54","42192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12299","5.541929","172.30.1.205","172.30.1.104","TCP","54","42192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12300","5.542043","172.30.1.205","172.30.1.104","TCP","74","34830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908768 TSecr=0 WS=128" +"12301","5.542225","172.30.1.104","172.30.1.205","TCP","54","135 > 42192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12302","5.542249","172.30.1.104","172.30.1.205","TCP","54","135 > 42192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12303","5.542254","172.30.1.205","172.30.1.104","TCP","54","42192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12304","5.542350","172.30.1.104","172.30.1.205","TCP","66","49671 > 34830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12305","5.542359","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12306","5.542710","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12307","5.542996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12308","5.543005","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12309","5.545028","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12310","5.545407","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12311","5.545413","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12312","5.546762","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12313","5.548303","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12314","5.548312","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12315","5.549337","172.30.1.205","172.30.1.104","TCP","74","42196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908775 TSecr=0 WS=128" +"12316","5.549691","172.30.1.104","172.30.1.205","TCP","66","135 > 42196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12317","5.549703","172.30.1.205","172.30.1.104","TCP","54","42196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12318","5.550051","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12319","5.550365","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12320","5.550373","172.30.1.205","172.30.1.104","TCP","54","42196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12321","5.552593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12322","5.552997","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12323","5.553004","172.30.1.205","172.30.1.104","TCP","54","42196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12324","5.554919","172.30.1.205","172.30.1.104","TCP","54","42196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12325","5.555031","172.30.1.205","172.30.1.104","TCP","74","34834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908781 TSecr=0 WS=128" +"12326","5.555191","172.30.1.104","172.30.1.205","TCP","54","135 > 42196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12327","5.555215","172.30.1.104","172.30.1.205","TCP","54","135 > 42196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12328","5.555220","172.30.1.205","172.30.1.104","TCP","54","42196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12329","5.555350","172.30.1.104","172.30.1.205","TCP","66","49671 > 34834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12330","5.555358","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12331","5.555729","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12332","5.557619","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12333","5.557628","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12334","5.559637","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12335","5.560012","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12336","5.560023","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12337","5.561409","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12338","5.562905","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12339","5.562916","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12340","5.563899","172.30.1.205","172.30.1.104","TCP","74","42200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908790 TSecr=0 WS=128" +"12341","5.564200","172.30.1.104","172.30.1.205","TCP","66","135 > 42200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12342","5.564210","172.30.1.205","172.30.1.104","TCP","54","42200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12343","5.564598","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12344","5.564912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12345","5.564921","172.30.1.205","172.30.1.104","TCP","54","42200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12346","5.567109","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12347","5.567495","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12348","5.567502","172.30.1.205","172.30.1.104","TCP","54","42200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12349","5.569338","172.30.1.205","172.30.1.104","TCP","54","42200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12350","5.569455","172.30.1.205","172.30.1.104","TCP","74","34838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908795 TSecr=0 WS=128" +"12351","5.569605","172.30.1.104","172.30.1.205","TCP","54","135 > 42200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12352","5.569629","172.30.1.104","172.30.1.205","TCP","54","135 > 42200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12353","5.569634","172.30.1.205","172.30.1.104","TCP","54","42200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12354","5.569722","172.30.1.104","172.30.1.205","TCP","66","49671 > 34838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12355","5.569730","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12356","5.570074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12357","5.570581","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12358","5.570590","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12359","5.572473","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12360","5.572833","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12361","5.572839","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12362","5.574202","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12363","5.575676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12364","5.575686","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12365","5.576618","172.30.1.205","172.30.1.104","TCP","74","42204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908803 TSecr=0 WS=128" +"12366","5.576928","172.30.1.104","172.30.1.205","TCP","66","135 > 42204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12367","5.576939","172.30.1.205","172.30.1.104","TCP","54","42204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12368","5.577296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12369","5.577588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12370","5.577597","172.30.1.205","172.30.1.104","TCP","54","42204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12371","5.579786","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12372","5.580174","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12373","5.580181","172.30.1.205","172.30.1.104","TCP","54","42204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12374","5.582089","172.30.1.205","172.30.1.104","TCP","54","42204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12375","5.582203","172.30.1.205","172.30.1.104","TCP","74","34842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908808 TSecr=0 WS=128" +"12376","5.582370","172.30.1.104","172.30.1.205","TCP","54","135 > 42204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12377","5.582381","172.30.1.104","172.30.1.205","TCP","54","135 > 42204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12378","5.582386","172.30.1.205","172.30.1.104","TCP","54","42204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12379","5.582468","172.30.1.104","172.30.1.205","TCP","66","49671 > 34842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12380","5.582476","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12381","5.582858","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12382","5.583169","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12383","5.583177","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12384","5.585108","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12385","5.585462","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12386","5.585466","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12387","5.586861","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12388","5.588279","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12389","5.588288","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12390","5.589256","172.30.1.205","172.30.1.104","TCP","74","42208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908815 TSecr=0 WS=128" +"12391","5.589645","172.30.1.104","172.30.1.205","TCP","66","135 > 42208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12392","5.589656","172.30.1.205","172.30.1.104","TCP","54","42208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12393","5.590004","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12394","5.590299","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12395","5.590307","172.30.1.205","172.30.1.104","TCP","54","42208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12396","5.592498","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12397","5.592869","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12398","5.592876","172.30.1.205","172.30.1.104","TCP","54","42208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12399","5.594775","172.30.1.205","172.30.1.104","TCP","54","42208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12400","5.594886","172.30.1.205","172.30.1.104","TCP","74","34846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908821 TSecr=0 WS=128" +"12401","5.595070","172.30.1.104","172.30.1.205","TCP","54","135 > 42208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12402","5.595094","172.30.1.104","172.30.1.205","TCP","54","135 > 42208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12403","5.595099","172.30.1.205","172.30.1.104","TCP","54","42208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12404","5.595204","172.30.1.104","172.30.1.205","TCP","66","49671 > 34846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12405","5.595213","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12406","5.595581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12407","5.597143","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12408","5.597152","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12409","5.599080","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12410","5.599440","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12411","5.599447","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12412","5.600835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12413","5.602317","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12414","5.602335","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12415","5.603442","172.30.1.205","172.30.1.104","TCP","74","42212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908829 TSecr=0 WS=128" +"12416","5.603782","172.30.1.104","172.30.1.205","TCP","66","135 > 42212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12417","5.603791","172.30.1.205","172.30.1.104","TCP","54","42212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12418","5.604173","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12419","5.604453","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12420","5.604462","172.30.1.205","172.30.1.104","TCP","54","42212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12421","5.606769","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12422","5.607208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12423","5.607214","172.30.1.205","172.30.1.104","TCP","54","42212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12424","5.609136","172.30.1.205","172.30.1.104","TCP","54","42212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12425","5.609245","172.30.1.205","172.30.1.104","TCP","74","34850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908835 TSecr=0 WS=128" +"12426","5.609399","172.30.1.104","172.30.1.205","TCP","54","135 > 42212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12427","5.609501","172.30.1.104","172.30.1.205","TCP","54","135 > 42212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12428","5.609507","172.30.1.205","172.30.1.104","TCP","54","42212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12429","5.609550","172.30.1.104","172.30.1.205","TCP","66","49671 > 34850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12430","5.609570","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12431","5.609913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12432","5.610190","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12433","5.610197","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12434","5.612095","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12435","5.612486","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12436","5.612492","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12437","5.613877","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12438","5.615356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12439","5.615365","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12440","5.616309","172.30.1.205","172.30.1.104","TCP","74","42216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908842 TSecr=0 WS=128" +"12441","5.616595","172.30.1.104","172.30.1.205","TCP","66","135 > 42216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12442","5.616606","172.30.1.205","172.30.1.104","TCP","54","42216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12443","5.616990","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12444","5.617311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12445","5.617321","172.30.1.205","172.30.1.104","TCP","54","42216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12446","5.619515","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12447","5.619904","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12448","5.619910","172.30.1.205","172.30.1.104","TCP","54","42216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12449","5.621773","172.30.1.205","172.30.1.104","TCP","54","42216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12450","5.621892","172.30.1.205","172.30.1.104","TCP","74","34854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908848 TSecr=0 WS=128" +"12451","5.622045","172.30.1.104","172.30.1.205","TCP","54","135 > 42216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12452","5.622057","172.30.1.104","172.30.1.205","TCP","54","135 > 42216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12453","5.622063","172.30.1.205","172.30.1.104","TCP","54","42216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12454","5.622155","172.30.1.104","172.30.1.205","TCP","66","49671 > 34854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12455","5.622164","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12456","5.622508","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12457","5.623480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12458","5.623488","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12459","5.625406","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12460","5.625755","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12461","5.625762","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12462","5.627112","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12463","5.628643","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12464","5.628652","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12465","5.629670","172.30.1.205","172.30.1.104","TCP","74","42220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908856 TSecr=0 WS=128" +"12466","5.629982","172.30.1.104","172.30.1.205","TCP","66","135 > 42220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12467","5.629993","172.30.1.205","172.30.1.104","TCP","54","42220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12468","5.630343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12469","5.630618","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12470","5.630627","172.30.1.205","172.30.1.104","TCP","54","42220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12471","5.632846","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12472","5.633212","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12473","5.633222","172.30.1.205","172.30.1.104","TCP","54","42220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12474","5.635123","172.30.1.205","172.30.1.104","TCP","54","42220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12475","5.635255","172.30.1.205","172.30.1.104","TCP","74","34858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908861 TSecr=0 WS=128" +"12476","5.635446","172.30.1.104","172.30.1.205","TCP","54","135 > 42220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12477","5.635474","172.30.1.104","172.30.1.205","TCP","54","135 > 42220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12478","5.635481","172.30.1.205","172.30.1.104","TCP","54","42220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12479","5.635566","172.30.1.104","172.30.1.205","TCP","66","49671 > 34858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12480","5.635574","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12481","5.635938","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12482","5.636694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12483","5.636703","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12484","5.638594","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12485","5.639006","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12486","5.639013","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12487","5.640371","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12488","5.641842","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12489","5.641853","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12490","5.642835","172.30.1.205","172.30.1.104","TCP","74","42224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908869 TSecr=0 WS=128" +"12491","5.643133","172.30.1.104","172.30.1.205","TCP","66","135 > 42224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12492","5.643146","172.30.1.205","172.30.1.104","TCP","54","42224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12493","5.643509","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12494","5.643773","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12495","5.643782","172.30.1.205","172.30.1.104","TCP","54","42224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12496","5.646022","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12497","5.646436","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12498","5.646443","172.30.1.205","172.30.1.104","TCP","54","42224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12499","5.648258","172.30.1.205","172.30.1.104","TCP","54","42224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12500","5.648372","172.30.1.205","172.30.1.104","TCP","74","34862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908874 TSecr=0 WS=128" +"12501","5.648515","172.30.1.104","172.30.1.205","TCP","54","135 > 42224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12502","5.648530","172.30.1.104","172.30.1.205","TCP","54","135 > 42224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12503","5.648536","172.30.1.205","172.30.1.104","TCP","54","42224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12504","5.648642","172.30.1.104","172.30.1.205","TCP","66","49671 > 34862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12505","5.648650","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12506","5.649028","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12507","5.649300","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12508","5.649307","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12509","5.651184","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12510","5.651551","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12511","5.651558","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12512","5.652931","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12513","5.654454","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12514","5.654464","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12515","5.655396","172.30.1.205","172.30.1.104","TCP","74","42228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908881 TSecr=0 WS=128" +"12516","5.655698","172.30.1.104","172.30.1.205","TCP","66","135 > 42228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12517","5.655709","172.30.1.205","172.30.1.104","TCP","54","42228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12518","5.656060","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12519","5.656347","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12520","5.656356","172.30.1.205","172.30.1.104","TCP","54","42228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12521","5.658558","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12522","5.658976","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12523","5.658982","172.30.1.205","172.30.1.104","TCP","54","42228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12524","5.660791","172.30.1.205","172.30.1.104","TCP","54","42228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12525","5.660899","172.30.1.205","172.30.1.104","TCP","74","34866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908887 TSecr=0 WS=128" +"12526","5.661062","172.30.1.104","172.30.1.205","TCP","54","135 > 42228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12527","5.661070","172.30.1.104","172.30.1.205","TCP","54","135 > 42228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12528","5.661075","172.30.1.205","172.30.1.104","TCP","54","42228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12529","5.661151","172.30.1.104","172.30.1.205","TCP","66","49671 > 34866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12530","5.661159","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12531","5.661506","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12532","5.661778","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12533","5.661786","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12534","5.663625","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12535","5.664007","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12536","5.664014","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12537","5.665392","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12538","5.666807","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12539","5.666816","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12540","5.667739","172.30.1.205","172.30.1.104","TCP","74","42232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908894 TSecr=0 WS=128" +"12541","5.668054","172.30.1.104","172.30.1.205","TCP","66","135 > 42232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12542","5.668064","172.30.1.205","172.30.1.104","TCP","54","42232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12543","5.668410","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12544","5.668693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12545","5.668702","172.30.1.205","172.30.1.104","TCP","54","42232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12546","5.670882","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12547","5.671286","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12548","5.671293","172.30.1.205","172.30.1.104","TCP","54","42232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12549","5.672153","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12550","5.672200","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12551","5.672236","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12552","5.672269","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12553","5.672296","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12554","5.672323","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12555","5.672350","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12556","5.672381","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12557","5.672404","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12558","5.672425","172.30.1.104","172.30.1.205","TCP","54","49671 > 34826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12559","5.672453","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12560","5.672482","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12561","5.672554","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12562","5.672706","172.30.1.104","172.30.1.205","TCP","54","49671 > 34830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12563","5.672725","172.30.1.104","172.30.1.205","TCP","54","49671 > 34826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12564","5.672732","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12565","5.672746","172.30.1.104","172.30.1.205","TCP","54","49671 > 34830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12566","5.672749","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12567","5.672769","172.30.1.104","172.30.1.205","TCP","54","49671 > 34834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12568","5.672793","172.30.1.104","172.30.1.205","TCP","54","49671 > 34838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12569","5.672810","172.30.1.104","172.30.1.205","TCP","54","49671 > 34842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12570","5.672843","172.30.1.104","172.30.1.205","TCP","54","49671 > 34846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12571","5.672862","172.30.1.104","172.30.1.205","TCP","54","49671 > 34834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12572","5.672868","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12573","5.672881","172.30.1.104","172.30.1.205","TCP","54","49671 > 34850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12574","5.672902","172.30.1.104","172.30.1.205","TCP","54","49671 > 34854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12575","5.672922","172.30.1.104","172.30.1.205","TCP","54","49671 > 34850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12576","5.672926","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12577","5.672942","172.30.1.104","172.30.1.205","TCP","54","49671 > 34846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12578","5.672945","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12579","5.672963","172.30.1.104","172.30.1.205","TCP","54","49671 > 34858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12580","5.672981","172.30.1.104","172.30.1.205","TCP","54","49671 > 34862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12581","5.673001","172.30.1.104","172.30.1.205","TCP","54","49671 > 34866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12582","5.673020","172.30.1.104","172.30.1.205","TCP","54","49671 > 34866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12583","5.673024","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12584","5.673039","172.30.1.104","172.30.1.205","TCP","54","49671 > 34862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12585","5.673042","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12586","5.673059","172.30.1.104","172.30.1.205","TCP","54","49671 > 34858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12587","5.673061","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12588","5.673080","172.30.1.104","172.30.1.205","TCP","54","49671 > 34854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12589","5.673083","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12590","5.673099","172.30.1.104","172.30.1.205","TCP","54","49671 > 34838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12591","5.673102","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12592","5.673118","172.30.1.104","172.30.1.205","TCP","54","49671 > 34842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12593","5.673121","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12594","5.673138","172.30.1.104","172.30.1.205","TCP","54","49671 > 34822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12595","5.673161","172.30.1.104","172.30.1.205","TCP","54","49671 > 34822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12596","5.673164","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12597","5.674122","172.30.1.205","172.30.1.104","TCP","54","42232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12598","5.674244","172.30.1.205","172.30.1.104","TCP","74","34870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908900 TSecr=0 WS=128" +"12599","5.674361","172.30.1.104","172.30.1.205","TCP","54","135 > 42232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12600","5.674381","172.30.1.104","172.30.1.205","TCP","54","135 > 42232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12601","5.674386","172.30.1.205","172.30.1.104","TCP","54","42232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12602","5.674551","172.30.1.104","172.30.1.205","TCP","66","49671 > 34870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12603","5.674559","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12604","5.674913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12605","5.675194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12606","5.675202","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12607","5.677091","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12608","5.677465","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12609","5.677471","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12610","5.678814","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12611","5.680284","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12612","5.680293","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12613","5.681245","172.30.1.205","172.30.1.104","TCP","74","42236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908907 TSecr=0 WS=128" +"12614","5.681991","172.30.1.104","172.30.1.205","TCP","66","135 > 42236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12615","5.682001","172.30.1.205","172.30.1.104","TCP","54","42236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12616","5.682351","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12617","5.682634","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12618","5.682643","172.30.1.205","172.30.1.104","TCP","54","42236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12619","5.684837","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12620","5.685220","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12621","5.685234","172.30.1.205","172.30.1.104","TCP","54","42236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12622","5.687045","172.30.1.205","172.30.1.104","TCP","54","42236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12623","5.687158","172.30.1.205","172.30.1.104","TCP","74","34874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908913 TSecr=0 WS=128" +"12624","5.687366","172.30.1.104","172.30.1.205","TCP","54","135 > 42236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12625","5.687375","172.30.1.104","172.30.1.205","TCP","54","135 > 42236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12626","5.687381","172.30.1.205","172.30.1.104","TCP","54","42236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12627","5.687481","172.30.1.104","172.30.1.205","TCP","66","49671 > 34874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12628","5.687489","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12629","5.687831","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12630","5.688148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12631","5.688155","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12632","5.690037","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12633","5.690399","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12634","5.690406","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12635","5.691743","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12636","5.693226","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12637","5.693236","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12638","5.694200","172.30.1.205","172.30.1.104","TCP","74","42240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908920 TSecr=0 WS=128" +"12639","5.694506","172.30.1.104","172.30.1.205","TCP","66","135 > 42240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12640","5.694516","172.30.1.205","172.30.1.104","TCP","54","42240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12641","5.694870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12642","5.695166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12643","5.695175","172.30.1.205","172.30.1.104","TCP","54","42240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12644","5.697400","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12645","5.697784","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12646","5.697791","172.30.1.205","172.30.1.104","TCP","54","42240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12647","5.699599","172.30.1.205","172.30.1.104","TCP","54","42240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12648","5.699713","172.30.1.205","172.30.1.104","TCP","74","34878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908926 TSecr=0 WS=128" +"12649","5.699862","172.30.1.104","172.30.1.205","TCP","54","135 > 42240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12650","5.699873","172.30.1.104","172.30.1.205","TCP","54","135 > 42240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12651","5.699879","172.30.1.205","172.30.1.104","TCP","54","42240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12652","5.699985","172.30.1.104","172.30.1.205","TCP","66","49671 > 34878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12653","5.699994","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12654","5.700335","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12655","5.700604","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12656","5.700612","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12657","5.702509","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12658","5.702873","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12659","5.702879","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12660","5.704225","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12661","5.707843","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12662","5.707855","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12663","5.708867","172.30.1.205","172.30.1.104","TCP","74","42244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908935 TSecr=0 WS=128" +"12664","5.709161","172.30.1.104","172.30.1.205","TCP","66","135 > 42244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12665","5.709172","172.30.1.205","172.30.1.104","TCP","54","42244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12666","5.709533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12667","5.709815","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12668","5.709824","172.30.1.205","172.30.1.104","TCP","54","42244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12669","5.712033","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12670","5.712406","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12671","5.712412","172.30.1.205","172.30.1.104","TCP","54","42244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12672","5.714258","172.30.1.205","172.30.1.104","TCP","54","42244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12673","5.714381","172.30.1.205","172.30.1.104","TCP","74","34882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908940 TSecr=0 WS=128" +"12674","5.714531","172.30.1.104","172.30.1.205","TCP","54","135 > 42244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12675","5.714577","172.30.1.104","172.30.1.205","TCP","54","135 > 42244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12676","5.714585","172.30.1.205","172.30.1.104","TCP","54","42244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12677","5.714759","172.30.1.104","172.30.1.205","TCP","66","49671 > 34882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12678","5.714767","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12679","5.715112","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12680","5.715416","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12681","5.715423","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12682","5.717317","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12683","5.717670","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12684","5.717677","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12685","5.719029","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12686","5.720469","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12687","5.720478","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12688","5.721461","172.30.1.205","172.30.1.104","TCP","74","42248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908947 TSecr=0 WS=128" +"12689","5.721742","172.30.1.104","172.30.1.205","TCP","66","135 > 42248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12690","5.721753","172.30.1.205","172.30.1.104","TCP","54","42248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12691","5.722099","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12692","5.722436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12693","5.722445","172.30.1.205","172.30.1.104","TCP","54","42248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12694","5.724637","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12695","5.725000","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12696","5.725008","172.30.1.205","172.30.1.104","TCP","54","42248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12697","5.726838","172.30.1.205","172.30.1.104","TCP","54","42248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12698","5.726962","172.30.1.205","172.30.1.104","TCP","74","34886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908953 TSecr=0 WS=128" +"12699","5.727091","172.30.1.104","172.30.1.205","TCP","54","135 > 42248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12700","5.727120","172.30.1.104","172.30.1.205","TCP","54","135 > 42248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12701","5.727128","172.30.1.205","172.30.1.104","TCP","54","42248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12702","5.727243","172.30.1.104","172.30.1.205","TCP","66","49671 > 34886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12703","5.727251","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12704","5.727611","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12705","5.727871","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12706","5.727879","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12707","5.729796","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12708","5.730147","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12709","5.730154","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12710","5.731506","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12711","5.732963","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12712","5.732972","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12713","5.733979","172.30.1.205","172.30.1.104","TCP","74","42252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908960 TSecr=0 WS=128" +"12714","5.734258","172.30.1.104","172.30.1.205","TCP","66","135 > 42252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12715","5.734270","172.30.1.205","172.30.1.104","TCP","54","42252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12716","5.734618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12717","5.734888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12718","5.734897","172.30.1.205","172.30.1.104","TCP","54","42252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12719","5.737118","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12720","5.737481","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12721","5.737488","172.30.1.205","172.30.1.104","TCP","54","42252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12722","5.739297","172.30.1.205","172.30.1.104","TCP","54","42252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12723","5.739414","172.30.1.205","172.30.1.104","TCP","74","34890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908965 TSecr=0 WS=128" +"12724","5.739534","172.30.1.104","172.30.1.205","TCP","54","135 > 42252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12725","5.739547","172.30.1.104","172.30.1.205","TCP","54","135 > 42252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12726","5.739554","172.30.1.205","172.30.1.104","TCP","54","42252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12727","5.739738","172.30.1.104","172.30.1.205","TCP","66","49671 > 34890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12728","5.739746","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12729","5.740092","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12730","5.740374","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12731","5.740383","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12732","5.742285","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12733","5.742653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12734","5.742660","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12735","5.744004","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12736","5.745446","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12737","5.745455","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12738","5.746399","172.30.1.205","172.30.1.104","TCP","74","42256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908972 TSecr=0 WS=128" +"12739","5.746814","172.30.1.104","172.30.1.205","TCP","66","135 > 42256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12740","5.746835","172.30.1.205","172.30.1.104","TCP","54","42256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12741","5.747401","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12742","5.747702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12743","5.747711","172.30.1.205","172.30.1.104","TCP","54","42256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12744","5.749917","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12745","5.750298","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12746","5.750305","172.30.1.205","172.30.1.104","TCP","54","42256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12747","5.752101","172.30.1.205","172.30.1.104","TCP","54","42256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12748","5.752213","172.30.1.205","172.30.1.104","TCP","74","34894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908978 TSecr=0 WS=128" +"12749","5.752443","172.30.1.104","172.30.1.205","TCP","54","135 > 42256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12750","5.752453","172.30.1.104","172.30.1.205","TCP","54","135 > 42256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12751","5.752459","172.30.1.205","172.30.1.104","TCP","54","42256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12752","5.752487","172.30.1.104","172.30.1.205","TCP","66","49671 > 34894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12753","5.752495","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12754","5.752857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12755","5.753164","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12756","5.753173","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12757","5.755043","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12758","5.755392","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12759","5.755398","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12760","5.756731","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12761","5.758213","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12762","5.758233","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12763","5.759214","172.30.1.205","172.30.1.104","TCP","74","42260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908985 TSecr=0 WS=128" +"12764","5.759543","172.30.1.104","172.30.1.205","TCP","66","135 > 42260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12765","5.759564","172.30.1.205","172.30.1.104","TCP","54","42260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12766","5.760051","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12767","5.760330","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12768","5.760339","172.30.1.205","172.30.1.104","TCP","54","42260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12769","5.762542","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12770","5.762912","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12771","5.762919","172.30.1.205","172.30.1.104","TCP","54","42260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12772","5.764703","172.30.1.205","172.30.1.104","TCP","54","42260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12773","5.764833","172.30.1.205","172.30.1.104","TCP","74","34898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908991 TSecr=0 WS=128" +"12774","5.764976","172.30.1.104","172.30.1.205","TCP","54","135 > 42260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12775","5.764991","172.30.1.104","172.30.1.205","TCP","54","135 > 42260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12776","5.764996","172.30.1.205","172.30.1.104","TCP","54","42260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12777","5.765107","172.30.1.104","172.30.1.205","TCP","66","49671 > 34898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12778","5.765115","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12779","5.765456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12780","5.765834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12781","5.765841","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12782","5.767692","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12783","5.768063","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12784","5.768074","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12785","5.769571","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12786","5.771028","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12787","5.771040","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12788","5.772049","172.30.1.205","172.30.1.104","TCP","74","42264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908998 TSecr=0 WS=128" +"12789","5.772350","172.30.1.104","172.30.1.205","TCP","66","135 > 42264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12790","5.772362","172.30.1.205","172.30.1.104","TCP","54","42264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12791","5.772718","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12792","5.773021","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12793","5.773030","172.30.1.205","172.30.1.104","TCP","54","42264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12794","5.775234","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12795","5.775625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12796","5.775632","172.30.1.205","172.30.1.104","TCP","54","42264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12797","5.777482","172.30.1.205","172.30.1.104","TCP","54","42264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12798","5.777596","172.30.1.205","172.30.1.104","TCP","74","34902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909004 TSecr=0 WS=128" +"12799","5.777756","172.30.1.104","172.30.1.205","TCP","54","135 > 42264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12800","5.777856","172.30.1.104","172.30.1.205","TCP","66","49671 > 34902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12801","5.777865","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12802","5.778012","172.30.1.104","172.30.1.205","TCP","54","135 > 42264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12803","5.778021","172.30.1.205","172.30.1.104","TCP","54","42264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12804","5.778249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12805","5.778675","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12806","5.778684","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12807","5.780556","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12808","5.780964","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12809","5.780971","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12810","5.782330","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12811","5.785268","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12812","5.785278","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12813","5.786224","172.30.1.205","172.30.1.104","TCP","74","42268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909012 TSecr=0 WS=128" +"12814","5.786527","172.30.1.104","172.30.1.205","TCP","66","135 > 42268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12815","5.786544","172.30.1.205","172.30.1.104","TCP","54","42268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12816","5.786956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12817","5.787271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12818","5.787285","172.30.1.205","172.30.1.104","TCP","54","42268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12819","5.789549","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12820","5.789909","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12821","5.789916","172.30.1.205","172.30.1.104","TCP","54","42268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12822","5.791750","172.30.1.205","172.30.1.104","TCP","54","42268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12823","5.791871","172.30.1.205","172.30.1.104","TCP","74","34906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909018 TSecr=0 WS=128" +"12824","5.792015","172.30.1.104","172.30.1.205","TCP","54","135 > 42268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12825","5.792073","172.30.1.104","172.30.1.205","TCP","54","135 > 42268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12826","5.792079","172.30.1.205","172.30.1.104","TCP","54","42268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12827","5.792153","172.30.1.104","172.30.1.205","TCP","66","49671 > 34906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12828","5.792162","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12829","5.792527","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12830","5.792907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12831","5.792916","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12832","5.794795","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12833","5.795138","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12834","5.795145","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12835","5.796499","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12836","5.797975","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12837","5.797984","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12838","5.798933","172.30.1.205","172.30.1.104","TCP","74","42272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909025 TSecr=0 WS=128" +"12839","5.799217","172.30.1.104","172.30.1.205","TCP","66","135 > 42272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12840","5.799228","172.30.1.205","172.30.1.104","TCP","54","42272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12841","5.799578","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12842","5.799852","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12843","5.799861","172.30.1.205","172.30.1.104","TCP","54","42272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12844","5.802076","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12845","5.802460","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12846","5.802467","172.30.1.205","172.30.1.104","TCP","54","42272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12847","5.804288","172.30.1.205","172.30.1.104","TCP","54","42272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12848","5.804399","172.30.1.205","172.30.1.104","TCP","74","34910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909030 TSecr=0 WS=128" +"12849","5.804566","172.30.1.104","172.30.1.205","TCP","54","135 > 42272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12850","5.804575","172.30.1.104","172.30.1.205","TCP","54","135 > 42272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12851","5.804580","172.30.1.205","172.30.1.104","TCP","54","42272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12852","5.804656","172.30.1.104","172.30.1.205","TCP","66","49671 > 34910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12853","5.804664","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12854","5.805044","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12855","5.805312","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12856","5.805322","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12857","5.807211","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12858","5.807562","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12859","5.807568","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12860","5.808941","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12861","5.810400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12862","5.810409","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12863","5.811364","172.30.1.205","172.30.1.104","TCP","74","42276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909037 TSecr=0 WS=128" +"12864","5.811714","172.30.1.104","172.30.1.205","TCP","66","135 > 42276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12865","5.811724","172.30.1.205","172.30.1.104","TCP","54","42276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12866","5.812079","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12867","5.812370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12868","5.812379","172.30.1.205","172.30.1.104","TCP","54","42276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12869","5.814599","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12870","5.814972","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12871","5.814978","172.30.1.205","172.30.1.104","TCP","54","42276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12872","5.816813","172.30.1.205","172.30.1.104","TCP","54","42276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12873","5.816922","172.30.1.205","172.30.1.104","TCP","74","34914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909043 TSecr=0 WS=128" +"12874","5.817069","172.30.1.104","172.30.1.205","TCP","54","135 > 42276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12875","5.817080","172.30.1.104","172.30.1.205","TCP","54","135 > 42276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12876","5.817086","172.30.1.205","172.30.1.104","TCP","54","42276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12877","5.817235","172.30.1.104","172.30.1.205","TCP","66","49671 > 34914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12878","5.817243","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12879","5.817601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12880","5.817889","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12881","5.817898","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12882","5.819776","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12883","5.820117","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12884","5.820124","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12885","5.821504","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12886","5.823090","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12887","5.823100","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12888","5.824033","172.30.1.205","172.30.1.104","TCP","74","42280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909050 TSecr=0 WS=128" +"12889","5.824324","172.30.1.104","172.30.1.205","TCP","66","135 > 42280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12890","5.824335","172.30.1.205","172.30.1.104","TCP","54","42280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12891","5.824681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12892","5.824988","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12893","5.824997","172.30.1.205","172.30.1.104","TCP","54","42280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12894","5.827182","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12895","5.827575","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12896","5.827581","172.30.1.205","172.30.1.104","TCP","54","42280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12897","5.828423","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12898","5.828471","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12899","5.828509","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12900","5.828542","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12901","5.828571","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12902","5.828599","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12903","5.828627","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12904","5.828666","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12905","5.828689","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12906","5.828706","172.30.1.104","172.30.1.205","TCP","54","49671 > 34874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12907","5.828738","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12908","5.828762","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12909","5.828860","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12910","5.828974","172.30.1.104","172.30.1.205","TCP","54","49671 > 34878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12911","5.828983","172.30.1.104","172.30.1.205","TCP","54","49671 > 34882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12912","5.828986","172.30.1.104","172.30.1.205","TCP","54","49671 > 34874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12913","5.828992","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12914","5.828998","172.30.1.104","172.30.1.205","TCP","54","49671 > 34878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12915","5.829000","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12916","5.829002","172.30.1.104","172.30.1.205","TCP","54","49671 > 34886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12917","5.829005","172.30.1.104","172.30.1.205","TCP","54","49671 > 34890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12918","5.829008","172.30.1.104","172.30.1.205","TCP","54","49671 > 34882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12919","5.829010","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12920","5.829011","172.30.1.104","172.30.1.205","TCP","54","49671 > 34894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12921","5.829243","172.30.1.104","172.30.1.205","TCP","54","49671 > 34894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12922","5.829248","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12923","5.829255","172.30.1.104","172.30.1.205","TCP","54","49671 > 34886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12924","5.829257","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12925","5.829258","172.30.1.104","172.30.1.205","TCP","54","49671 > 34890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12926","5.829259","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12927","5.829261","172.30.1.104","172.30.1.205","TCP","54","49671 > 34898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12928","5.829269","172.30.1.104","172.30.1.205","TCP","54","49671 > 34902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12929","5.829272","172.30.1.104","172.30.1.205","TCP","54","49671 > 34906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12930","5.829275","172.30.1.104","172.30.1.205","TCP","54","49671 > 34906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12931","5.829277","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12932","5.829278","172.30.1.104","172.30.1.205","TCP","54","49671 > 34898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12933","5.829280","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12934","5.829284","172.30.1.104","172.30.1.205","TCP","54","49671 > 34902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12935","5.829286","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12936","5.829288","172.30.1.104","172.30.1.205","TCP","54","49671 > 34910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12937","5.829517","172.30.1.104","172.30.1.205","TCP","54","49671 > 34914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12938","5.829524","172.30.1.104","172.30.1.205","TCP","54","49671 > 34870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12939","5.829527","172.30.1.104","172.30.1.205","TCP","54","49671 > 34910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12940","5.829531","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12941","5.829540","172.30.1.104","172.30.1.205","TCP","54","49671 > 34914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12942","5.829542","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12943","5.829543","172.30.1.104","172.30.1.205","TCP","54","49671 > 34870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"12944","5.829548","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"12945","5.830308","172.30.1.205","172.30.1.104","TCP","54","42280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12946","5.830421","172.30.1.205","172.30.1.104","TCP","74","34918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909056 TSecr=0 WS=128" +"12947","5.830591","172.30.1.104","172.30.1.205","TCP","54","135 > 42280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12948","5.830600","172.30.1.104","172.30.1.205","TCP","54","135 > 42280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12949","5.830604","172.30.1.205","172.30.1.104","TCP","54","42280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12950","5.830678","172.30.1.104","172.30.1.205","TCP","66","49671 > 34918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12951","5.830687","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12952","5.831040","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12953","5.831322","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12954","5.831331","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12955","5.833245","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12956","5.833601","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12957","5.833607","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12958","5.834975","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12959","5.836428","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12960","5.836438","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12961","5.837414","172.30.1.205","172.30.1.104","TCP","74","42284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909063 TSecr=0 WS=128" +"12962","5.837713","172.30.1.104","172.30.1.205","TCP","66","135 > 42284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12963","5.837724","172.30.1.205","172.30.1.104","TCP","54","42284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12964","5.838077","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12965","5.838338","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12966","5.838347","172.30.1.205","172.30.1.104","TCP","54","42284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12967","5.840535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12968","5.840902","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12969","5.840912","172.30.1.205","172.30.1.104","TCP","54","42284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12970","5.842732","172.30.1.205","172.30.1.104","TCP","54","42284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12971","5.842857","172.30.1.205","172.30.1.104","TCP","74","34922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909069 TSecr=0 WS=128" +"12972","5.843008","172.30.1.104","172.30.1.205","TCP","54","135 > 42284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12973","5.843019","172.30.1.104","172.30.1.205","TCP","54","135 > 42284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12974","5.843024","172.30.1.205","172.30.1.104","TCP","54","42284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"12975","5.843122","172.30.1.104","172.30.1.205","TCP","66","49671 > 34922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12976","5.843138","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12977","5.843484","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"12978","5.843753","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12979","5.843762","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12980","5.845690","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"12981","5.846054","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"12982","5.846061","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"12983","5.847418","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"12984","5.848957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"12985","5.848966","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"12986","5.849988","172.30.1.205","172.30.1.104","TCP","74","42288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909076 TSecr=0 WS=128" +"12987","5.850313","172.30.1.104","172.30.1.205","TCP","66","135 > 42288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"12988","5.850325","172.30.1.205","172.30.1.104","TCP","54","42288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"12989","5.850687","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"12990","5.850954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"12991","5.850963","172.30.1.205","172.30.1.104","TCP","54","42288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"12992","5.853220","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"12993","5.853649","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"12994","5.853656","172.30.1.205","172.30.1.104","TCP","54","42288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12995","5.855492","172.30.1.205","172.30.1.104","TCP","54","42288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"12996","5.855609","172.30.1.205","172.30.1.104","TCP","74","34926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909082 TSecr=0 WS=128" +"12997","5.855777","172.30.1.104","172.30.1.205","TCP","54","135 > 42288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12998","5.855789","172.30.1.104","172.30.1.205","TCP","54","135 > 42288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"12999","5.855802","172.30.1.205","172.30.1.104","TCP","54","42288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13000","5.855889","172.30.1.104","172.30.1.205","TCP","66","49671 > 34926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13001","5.855898","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13002","5.856249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13003","5.856530","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13004","5.856539","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13005","5.858457","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13006","5.859144","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13007","5.859150","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13008","5.860520","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13009","5.862145","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13010","5.862158","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13011","5.863150","172.30.1.205","172.30.1.104","TCP","74","42292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909089 TSecr=0 WS=128" +"13012","5.863491","172.30.1.104","172.30.1.205","TCP","66","135 > 42292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13013","5.863503","172.30.1.205","172.30.1.104","TCP","54","42292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13014","5.863856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13015","5.864154","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13016","5.864163","172.30.1.205","172.30.1.104","TCP","54","42292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13017","5.866405","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13018","5.866797","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13019","5.866804","172.30.1.205","172.30.1.104","TCP","54","42292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13020","5.868632","172.30.1.205","172.30.1.104","TCP","54","42292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13021","5.868754","172.30.1.205","172.30.1.104","TCP","74","34930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909095 TSecr=0 WS=128" +"13022","5.868904","172.30.1.104","172.30.1.205","TCP","54","135 > 42292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13023","5.868955","172.30.1.104","172.30.1.205","TCP","54","135 > 42292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13024","5.868962","172.30.1.205","172.30.1.104","TCP","54","42292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13025","5.869035","172.30.1.104","172.30.1.205","TCP","66","49671 > 34930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13026","5.869043","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13027","5.869397","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13028","5.869676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13029","5.869685","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13030","5.871578","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13031","5.871941","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13032","5.871948","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13033","5.873344","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13034","5.874887","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13035","5.874896","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13036","5.875887","172.30.1.205","172.30.1.104","TCP","74","42296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909102 TSecr=0 WS=128" +"13037","5.876235","172.30.1.104","172.30.1.205","TCP","66","135 > 42296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13038","5.876248","172.30.1.205","172.30.1.104","TCP","54","42296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13039","5.876604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13040","5.876906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13041","5.876916","172.30.1.205","172.30.1.104","TCP","54","42296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13042","5.879127","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13043","5.879519","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13044","5.879526","172.30.1.205","172.30.1.104","TCP","54","42296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13045","5.881378","172.30.1.205","172.30.1.104","TCP","54","42296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13046","5.881494","172.30.1.205","172.30.1.104","TCP","74","34934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909107 TSecr=0 WS=128" +"13047","5.881702","172.30.1.104","172.30.1.205","TCP","54","135 > 42296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13048","5.881715","172.30.1.104","172.30.1.205","TCP","54","135 > 42296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13049","5.881722","172.30.1.205","172.30.1.104","TCP","54","42296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13050","5.881750","172.30.1.104","172.30.1.205","TCP","66","49671 > 34934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13051","5.881758","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13052","5.882102","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13053","5.882418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13054","5.882427","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13055","5.884341","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13056","5.884793","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13057","5.884800","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13058","5.886189","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13059","5.887756","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13060","5.887765","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13061","5.888805","172.30.1.205","172.30.1.104","TCP","74","42300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909115 TSecr=0 WS=128" +"13062","5.889121","172.30.1.104","172.30.1.205","TCP","66","135 > 42300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13063","5.889133","172.30.1.205","172.30.1.104","TCP","54","42300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13064","5.889494","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13065","5.889770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13066","5.889779","172.30.1.205","172.30.1.104","TCP","54","42300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13067","5.892012","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13068","5.892386","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13069","5.892393","172.30.1.205","172.30.1.104","TCP","54","42300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13070","5.894251","172.30.1.205","172.30.1.104","TCP","54","42300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13071","5.894380","172.30.1.205","172.30.1.104","TCP","74","34938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909120 TSecr=0 WS=128" +"13072","5.894532","172.30.1.104","172.30.1.205","TCP","54","135 > 42300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13073","5.894544","172.30.1.104","172.30.1.205","TCP","54","135 > 42300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13074","5.894551","172.30.1.205","172.30.1.104","TCP","54","42300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13075","5.894642","172.30.1.104","172.30.1.205","TCP","66","49671 > 34938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13076","5.894651","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13077","5.895000","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13078","5.895293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13079","5.895301","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13080","5.897210","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13081","5.897600","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13082","5.897604","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13083","5.898970","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13084","5.901397","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13085","5.901407","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13086","5.902381","172.30.1.205","172.30.1.104","TCP","74","42304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909128 TSecr=0 WS=128" +"13087","5.902710","172.30.1.104","172.30.1.205","TCP","66","135 > 42304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13088","5.902720","172.30.1.205","172.30.1.104","TCP","54","42304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13089","5.903070","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13090","5.903358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13091","5.903367","172.30.1.205","172.30.1.104","TCP","54","42304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13092","5.905611","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13093","5.905995","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13094","5.906002","172.30.1.205","172.30.1.104","TCP","54","42304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13095","5.907821","172.30.1.205","172.30.1.104","TCP","54","42304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13096","5.907934","172.30.1.205","172.30.1.104","TCP","74","34942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909134 TSecr=0 WS=128" +"13097","5.908068","172.30.1.104","172.30.1.205","TCP","54","135 > 42304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13098","5.908079","172.30.1.104","172.30.1.205","TCP","54","135 > 42304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13099","5.908084","172.30.1.205","172.30.1.104","TCP","54","42304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13100","5.908211","172.30.1.104","172.30.1.205","TCP","66","49671 > 34942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13101","5.908219","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13102","5.908580","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13103","5.910687","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13104","5.910696","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13105","5.912583","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13106","5.912968","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13107","5.912975","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13108","5.914345","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13109","5.917190","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13110","5.917201","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13111","5.918186","172.30.1.205","172.30.1.104","TCP","74","42308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909144 TSecr=0 WS=128" +"13112","5.918524","172.30.1.104","172.30.1.205","TCP","66","135 > 42308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13113","5.918535","172.30.1.205","172.30.1.104","TCP","54","42308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13114","5.918899","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13115","5.919181","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13116","5.919190","172.30.1.205","172.30.1.104","TCP","54","42308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13117","5.921421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13118","5.921867","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13119","5.921873","172.30.1.205","172.30.1.104","TCP","54","42308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13120","5.923688","172.30.1.205","172.30.1.104","TCP","54","42308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13121","5.923803","172.30.1.205","172.30.1.104","TCP","74","34946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909150 TSecr=0 WS=128" +"13122","5.923963","172.30.1.104","172.30.1.205","TCP","54","135 > 42308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13123","5.923981","172.30.1.104","172.30.1.205","TCP","54","135 > 42308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13124","5.923994","172.30.1.205","172.30.1.104","TCP","54","42308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13125","5.924067","172.30.1.104","172.30.1.205","TCP","66","49671 > 34946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13126","5.924075","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13127","5.924422","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13128","5.924731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13129","5.924740","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13130","5.926633","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13131","5.926999","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13132","5.927006","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13133","5.928376","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13134","5.929907","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13135","5.929916","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13136","5.930870","172.30.1.205","172.30.1.104","TCP","74","42312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909157 TSecr=0 WS=128" +"13137","5.931169","172.30.1.104","172.30.1.205","TCP","66","135 > 42312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13138","5.931180","172.30.1.205","172.30.1.104","TCP","54","42312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13139","5.931540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13140","5.931827","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13141","5.931836","172.30.1.205","172.30.1.104","TCP","54","42312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13142","5.934043","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13143","5.934437","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13144","5.934444","172.30.1.205","172.30.1.104","TCP","54","42312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13145","5.936259","172.30.1.205","172.30.1.104","TCP","54","42312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13146","5.936370","172.30.1.205","172.30.1.104","TCP","74","34950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909162 TSecr=0 WS=128" +"13147","5.936535","172.30.1.104","172.30.1.205","TCP","54","135 > 42312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13148","5.936593","172.30.1.104","172.30.1.205","TCP","54","135 > 42312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13149","5.936598","172.30.1.205","172.30.1.104","TCP","54","42312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13150","5.936692","172.30.1.104","172.30.1.205","TCP","66","49671 > 34950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13151","5.936700","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13152","5.937079","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13153","5.937363","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13154","5.937372","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13155","5.939257","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13156","5.941047","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13157","5.941054","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13158","5.942417","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13159","5.943918","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13160","5.943927","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13161","5.944871","172.30.1.205","172.30.1.104","TCP","74","42316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909171 TSecr=0 WS=128" +"13162","5.945151","172.30.1.104","172.30.1.205","TCP","66","135 > 42316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13163","5.945162","172.30.1.205","172.30.1.104","TCP","54","42316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13164","5.945520","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13165","5.945836","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13166","5.945845","172.30.1.205","172.30.1.104","TCP","54","42316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13167","5.948019","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13168","5.948439","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13169","5.948446","172.30.1.205","172.30.1.104","TCP","54","42316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13170","5.950278","172.30.1.205","172.30.1.104","TCP","54","42316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13171","5.950390","172.30.1.205","172.30.1.104","TCP","74","34954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909176 TSecr=0 WS=128" +"13172","5.950561","172.30.1.104","172.30.1.205","TCP","54","135 > 42316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13173","5.950604","172.30.1.104","172.30.1.205","TCP","54","135 > 42316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13174","5.950610","172.30.1.205","172.30.1.104","TCP","54","42316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13175","5.950686","172.30.1.104","172.30.1.205","TCP","66","49671 > 34954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13176","5.950694","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13177","5.951040","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13178","5.952298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13179","5.952306","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13180","5.954194","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13181","5.954564","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13182","5.954571","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13183","5.955907","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13184","5.957519","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13185","5.957529","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13186","5.958467","172.30.1.205","172.30.1.104","TCP","74","42320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909184 TSecr=0 WS=128" +"13187","5.958769","172.30.1.104","172.30.1.205","TCP","66","135 > 42320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13188","5.958780","172.30.1.205","172.30.1.104","TCP","54","42320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13189","5.959130","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13190","5.959414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13191","5.959423","172.30.1.205","172.30.1.104","TCP","54","42320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13192","5.961646","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13193","5.962037","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13194","5.962045","172.30.1.205","172.30.1.104","TCP","54","42320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13195","5.963859","172.30.1.205","172.30.1.104","TCP","54","42320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13196","5.963974","172.30.1.205","172.30.1.104","TCP","74","34958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909190 TSecr=0 WS=128" +"13197","5.964172","172.30.1.104","172.30.1.205","TCP","54","135 > 42320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13198","5.964181","172.30.1.104","172.30.1.205","TCP","54","135 > 42320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13199","5.964186","172.30.1.205","172.30.1.104","TCP","54","42320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13200","5.964266","172.30.1.104","172.30.1.205","TCP","66","49671 > 34958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13201","5.964274","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13202","5.964623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13203","5.964890","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13204","5.964899","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13205","5.966813","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13206","5.967183","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13207","5.967190","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13208","5.968573","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13209","5.970140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13210","5.970149","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13211","5.971094","172.30.1.205","172.30.1.104","TCP","74","42324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909197 TSecr=0 WS=128" +"13212","5.971424","172.30.1.104","172.30.1.205","TCP","66","135 > 42324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13213","5.971435","172.30.1.205","172.30.1.104","TCP","54","42324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13214","5.971781","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13215","5.972043","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13216","5.972052","172.30.1.205","172.30.1.104","TCP","54","42324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13217","5.974264","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13218","5.974651","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13219","5.974658","172.30.1.205","172.30.1.104","TCP","54","42324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13220","5.976549","172.30.1.205","172.30.1.104","TCP","54","42324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13221","5.976652","172.30.1.205","172.30.1.104","TCP","74","34962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909203 TSecr=0 WS=128" +"13222","5.976829","172.30.1.104","172.30.1.205","TCP","54","135 > 42324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13223","5.976856","172.30.1.104","172.30.1.205","TCP","54","135 > 42324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13224","5.976862","172.30.1.205","172.30.1.104","TCP","54","42324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13225","5.976934","172.30.1.104","172.30.1.205","TCP","66","49671 > 34962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13226","5.976942","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13227","5.977319","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13228","5.979790","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13229","5.979797","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13230","5.981712","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13231","5.982086","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13232","5.982092","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13233","5.983472","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13234","5.985104","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13235","5.985114","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13236","5.986064","172.30.1.205","172.30.1.104","TCP","74","42328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909212 TSecr=0 WS=128" +"13237","5.986378","172.30.1.104","172.30.1.205","TCP","66","135 > 42328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13238","5.986388","172.30.1.205","172.30.1.104","TCP","54","42328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13239","5.986741","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13240","5.987010","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13241","5.987019","172.30.1.205","172.30.1.104","TCP","54","42328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13242","5.989211","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13243","5.989614","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13244","5.989621","172.30.1.205","172.30.1.104","TCP","54","42328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13245","5.990457","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13246","5.990508","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13247","5.990547","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13248","5.990589","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13249","5.990627","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13250","5.990663","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13251","5.990697","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13252","5.990730","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13253","5.990763","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13254","5.990792","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13255","5.990825","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13256","5.990901","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13257","5.991012","172.30.1.104","172.30.1.205","TCP","54","49671 > 34922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13258","5.991035","172.30.1.104","172.30.1.205","TCP","54","49671 > 34926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13259","5.991055","172.30.1.104","172.30.1.205","TCP","54","49671 > 34922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13260","5.991061","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13261","5.991075","172.30.1.104","172.30.1.205","TCP","54","49671 > 34930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13262","5.991100","172.30.1.104","172.30.1.205","TCP","54","49671 > 34934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13263","5.991121","172.30.1.104","172.30.1.205","TCP","54","49671 > 34938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13264","5.991139","172.30.1.104","172.30.1.205","TCP","54","49671 > 34934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13265","5.991143","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13266","5.991159","172.30.1.104","172.30.1.205","TCP","54","49671 > 34942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13267","5.991179","172.30.1.104","172.30.1.205","TCP","54","49671 > 34938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13268","5.991183","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13269","5.991199","172.30.1.104","172.30.1.205","TCP","54","49671 > 34946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13270","5.991219","172.30.1.104","172.30.1.205","TCP","54","49671 > 34942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13271","5.991223","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13272","5.991239","172.30.1.104","172.30.1.205","TCP","54","49671 > 34946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13273","5.991242","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13274","5.991262","172.30.1.104","172.30.1.205","TCP","54","49671 > 34950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13275","5.991391","172.30.1.104","172.30.1.205","TCP","54","49671 > 34954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13276","5.991411","172.30.1.104","172.30.1.205","TCP","54","49671 > 34950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13277","5.991416","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13278","5.991440","172.30.1.104","172.30.1.205","TCP","54","49671 > 34954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13279","5.991443","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13280","5.991461","172.30.1.104","172.30.1.205","TCP","54","49671 > 34926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13281","5.991464","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13282","5.991483","172.30.1.104","172.30.1.205","TCP","54","49671 > 34930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13283","5.991485","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13284","5.991605","172.30.1.104","172.30.1.205","TCP","54","49671 > 34958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13285","5.991629","172.30.1.104","172.30.1.205","TCP","54","49671 > 34962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13286","5.991649","172.30.1.104","172.30.1.205","TCP","54","49671 > 34918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13287","5.991689","172.30.1.104","172.30.1.205","TCP","54","49671 > 34958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13288","5.991694","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13289","5.991717","172.30.1.104","172.30.1.205","TCP","54","49671 > 34962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13290","5.991719","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13291","5.991743","172.30.1.104","172.30.1.205","TCP","54","49671 > 34918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13292","5.991745","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13293","5.992533","172.30.1.205","172.30.1.104","TCP","54","42328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13294","5.992644","172.30.1.205","172.30.1.104","TCP","74","34966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909219 TSecr=0 WS=128" +"13295","5.992795","172.30.1.104","172.30.1.205","TCP","54","135 > 42328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13296","5.992826","172.30.1.104","172.30.1.205","TCP","54","135 > 42328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13297","5.992832","172.30.1.205","172.30.1.104","TCP","54","42328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13298","5.992916","172.30.1.104","172.30.1.205","TCP","66","49671 > 34966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13299","5.992925","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13300","5.993290","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13301","5.993559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13302","5.993567","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13303","5.995445","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13304","5.995850","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13305","5.995857","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13306","5.997250","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13307","5.998845","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13308","5.998854","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13309","5.999790","172.30.1.205","172.30.1.104","TCP","74","42332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909226 TSecr=0 WS=128" +"13310","6.000090","172.30.1.104","172.30.1.205","TCP","66","135 > 42332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13311","6.000101","172.30.1.205","172.30.1.104","TCP","54","42332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13312","6.000451","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13313","6.000726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13314","6.000735","172.30.1.205","172.30.1.104","TCP","54","42332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13315","6.002947","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13316","6.003359","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13317","6.003365","172.30.1.205","172.30.1.104","TCP","54","42332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13318","6.005203","172.30.1.205","172.30.1.104","TCP","54","42332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13319","6.005318","172.30.1.205","172.30.1.104","TCP","74","34970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909231 TSecr=0 WS=128" +"13320","6.005464","172.30.1.104","172.30.1.205","TCP","54","135 > 42332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13321","6.005478","172.30.1.104","172.30.1.205","TCP","54","135 > 42332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13322","6.005483","172.30.1.205","172.30.1.104","TCP","54","42332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13323","6.005577","172.30.1.104","172.30.1.205","TCP","66","49671 > 34970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13324","6.005585","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13325","6.005931","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13326","6.006207","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13327","6.006215","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13328","6.008082","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13329","6.010459","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13330","6.010464","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13331","6.011853","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13332","6.013510","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13333","6.013519","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13334","6.014514","172.30.1.205","172.30.1.104","TCP","74","42336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909240 TSecr=0 WS=128" +"13335","6.014834","172.30.1.104","172.30.1.205","TCP","66","135 > 42336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13336","6.014845","172.30.1.205","172.30.1.104","TCP","54","42336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13337","6.015200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13338","6.015547","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13339","6.015556","172.30.1.205","172.30.1.104","TCP","54","42336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13340","6.017809","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13341","6.018224","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13342","6.018230","172.30.1.205","172.30.1.104","TCP","54","42336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13343","6.020055","172.30.1.205","172.30.1.104","TCP","54","42336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13344","6.020169","172.30.1.205","172.30.1.104","TCP","74","34974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909246 TSecr=0 WS=128" +"13345","6.020320","172.30.1.104","172.30.1.205","TCP","54","135 > 42336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13346","6.020334","172.30.1.104","172.30.1.205","TCP","54","135 > 42336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13347","6.020339","172.30.1.205","172.30.1.104","TCP","54","42336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13348","6.020441","172.30.1.104","172.30.1.205","TCP","66","49671 > 34974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13349","6.020457","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13350","6.020831","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13351","6.021118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13352","6.021126","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13353","6.023027","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13354","6.023412","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13355","6.023419","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13356","6.024793","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13357","6.026417","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13358","6.026426","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13359","6.027371","172.30.1.205","172.30.1.104","TCP","74","42340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909253 TSecr=0 WS=128" +"13360","6.027679","172.30.1.104","172.30.1.205","TCP","66","135 > 42340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13361","6.027690","172.30.1.205","172.30.1.104","TCP","54","42340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13362","6.028045","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13363","6.028343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13364","6.028352","172.30.1.205","172.30.1.104","TCP","54","42340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13365","6.030589","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13366","6.031001","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13367","6.031007","172.30.1.205","172.30.1.104","TCP","54","42340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13368","6.032850","172.30.1.205","172.30.1.104","TCP","54","42340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13369","6.032960","172.30.1.205","172.30.1.104","TCP","74","34978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909259 TSecr=0 WS=128" +"13370","6.033155","172.30.1.104","172.30.1.205","TCP","54","135 > 42340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13371","6.033164","172.30.1.104","172.30.1.205","TCP","54","135 > 42340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13372","6.033169","172.30.1.205","172.30.1.104","TCP","54","42340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13373","6.033244","172.30.1.104","172.30.1.205","TCP","66","49671 > 34978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13374","6.033253","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13375","6.033600","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13376","6.033876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13377","6.033883","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13378","6.035748","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13379","6.036115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13380","6.036122","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13381","6.037506","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13382","6.039113","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13383","6.039143","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13384","6.040082","172.30.1.205","172.30.1.104","TCP","74","42344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909266 TSecr=0 WS=128" +"13385","6.040396","172.30.1.104","172.30.1.205","TCP","66","135 > 42344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13386","6.040407","172.30.1.205","172.30.1.104","TCP","54","42344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13387","6.040767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13388","6.041076","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13389","6.041085","172.30.1.205","172.30.1.104","TCP","54","42344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13390","6.043269","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13391","6.043636","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13392","6.043642","172.30.1.205","172.30.1.104","TCP","54","42344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13393","6.045514","172.30.1.205","172.30.1.104","TCP","54","42344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13394","6.045628","172.30.1.205","172.30.1.104","TCP","74","34982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909272 TSecr=0 WS=128" +"13395","6.045769","172.30.1.104","172.30.1.205","TCP","54","135 > 42344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13396","6.045783","172.30.1.104","172.30.1.205","TCP","54","135 > 42344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13397","6.045789","172.30.1.205","172.30.1.104","TCP","54","42344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13398","6.045892","172.30.1.104","172.30.1.205","TCP","66","49671 > 34982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13399","6.045901","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13400","6.046246","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13401","6.046549","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13402","6.046557","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13403","6.048437","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13404","6.048793","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13405","6.048800","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13406","6.050167","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13407","6.051739","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13408","6.051748","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13409","6.052706","172.30.1.205","172.30.1.104","TCP","74","42348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909279 TSecr=0 WS=128" +"13410","6.053024","172.30.1.104","172.30.1.205","TCP","66","135 > 42348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13411","6.053035","172.30.1.205","172.30.1.104","TCP","54","42348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13412","6.053396","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13413","6.053669","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13414","6.053679","172.30.1.205","172.30.1.104","TCP","54","42348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13415","6.055864","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13416","6.056261","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13417","6.056269","172.30.1.205","172.30.1.104","TCP","54","42348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13418","6.058143","172.30.1.205","172.30.1.104","TCP","54","42348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13419","6.058256","172.30.1.205","172.30.1.104","TCP","74","34986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909284 TSecr=0 WS=128" +"13420","6.058459","172.30.1.104","172.30.1.205","TCP","54","135 > 42348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13421","6.058535","172.30.1.104","172.30.1.205","TCP","66","49671 > 34986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13422","6.058545","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13423","6.058593","172.30.1.104","172.30.1.205","TCP","54","135 > 42348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13424","6.058599","172.30.1.205","172.30.1.104","TCP","54","42348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13425","6.058928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13426","6.059205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13427","6.059220","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13428","6.061219","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13429","6.061708","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13430","6.061715","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13431","6.063077","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13432","6.064696","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13433","6.064715","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13434","6.065784","172.30.1.205","172.30.1.104","TCP","74","42352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909292 TSecr=0 WS=128" +"13435","6.066100","172.30.1.104","172.30.1.205","TCP","66","135 > 42352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13436","6.066111","172.30.1.205","172.30.1.104","TCP","54","42352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13437","6.066459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13438","6.066741","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13439","6.066750","172.30.1.205","172.30.1.104","TCP","54","42352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13440","6.068946","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13441","6.069324","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13442","6.069331","172.30.1.205","172.30.1.104","TCP","54","42352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13443","6.071154","172.30.1.205","172.30.1.104","TCP","54","42352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13444","6.071272","172.30.1.205","172.30.1.104","TCP","74","34990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909297 TSecr=0 WS=128" +"13445","6.071431","172.30.1.104","172.30.1.205","TCP","54","135 > 42352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13446","6.071479","172.30.1.104","172.30.1.205","TCP","54","135 > 42352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13447","6.071485","172.30.1.205","172.30.1.104","TCP","54","42352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13448","6.071559","172.30.1.104","172.30.1.205","TCP","66","49671 > 34990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13449","6.071567","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13450","6.071915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13451","6.072198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13452","6.072207","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13453","6.074127","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13454","6.074497","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13455","6.074511","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13456","6.075874","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13457","6.077427","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13458","6.077439","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13459","6.078482","172.30.1.205","172.30.1.104","TCP","74","42356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909304 TSecr=0 WS=128" +"13460","6.078788","172.30.1.104","172.30.1.205","TCP","66","135 > 42356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13461","6.078800","172.30.1.205","172.30.1.104","TCP","54","42356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13462","6.079154","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13463","6.079431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13464","6.079440","172.30.1.205","172.30.1.104","TCP","54","42356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13465","6.081701","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13466","6.082095","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13467","6.082102","172.30.1.205","172.30.1.104","TCP","54","42356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13468","6.083942","172.30.1.205","172.30.1.104","TCP","54","42356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13469","6.084083","172.30.1.205","172.30.1.104","TCP","74","34994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909310 TSecr=0 WS=128" +"13470","6.084226","172.30.1.104","172.30.1.205","TCP","54","135 > 42356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13471","6.084245","172.30.1.104","172.30.1.205","TCP","54","135 > 42356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13472","6.084253","172.30.1.205","172.30.1.104","TCP","54","42356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13473","6.084341","172.30.1.104","172.30.1.205","TCP","66","49671 > 34994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13474","6.084361","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13475","6.085085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13476","6.085378","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13477","6.085388","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13478","6.087311","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13479","6.087684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13480","6.087690","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13481","6.089116","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13482","6.091066","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13483","6.091076","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13484","6.092050","172.30.1.205","172.30.1.104","TCP","74","42360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909318 TSecr=0 WS=128" +"13485","6.092391","172.30.1.104","172.30.1.205","TCP","66","135 > 42360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13486","6.092403","172.30.1.205","172.30.1.104","TCP","54","42360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13487","6.092754","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13488","6.093023","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13489","6.093034","172.30.1.205","172.30.1.104","TCP","54","42360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13490","6.095235","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13491","6.095606","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13492","6.095613","172.30.1.205","172.30.1.104","TCP","54","42360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13493","6.097469","172.30.1.205","172.30.1.104","TCP","54","42360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13494","6.097582","172.30.1.205","172.30.1.104","TCP","74","34998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909324 TSecr=0 WS=128" +"13495","6.097729","172.30.1.104","172.30.1.205","TCP","54","135 > 42360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13496","6.097741","172.30.1.104","172.30.1.205","TCP","54","135 > 42360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13497","6.097746","172.30.1.205","172.30.1.104","TCP","54","42360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13498","6.097852","172.30.1.104","172.30.1.205","TCP","66","49671 > 34998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13499","6.097860","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13500","6.098210","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13501","6.098481","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13502","6.098490","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13503","6.100349","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13504","6.100696","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13505","6.100702","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13506","6.102071","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13507","6.103544","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13508","6.103553","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13509","6.104484","172.30.1.205","172.30.1.104","TCP","74","42364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909330 TSecr=0 WS=128" +"13510","6.104784","172.30.1.104","172.30.1.205","TCP","66","135 > 42364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13511","6.104795","172.30.1.205","172.30.1.104","TCP","54","42364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13512","6.105150","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13513","6.105453","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13514","6.105462","172.30.1.205","172.30.1.104","TCP","54","42364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13515","6.107630","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13516","6.107987","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13517","6.107994","172.30.1.205","172.30.1.104","TCP","54","42364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13518","6.109824","172.30.1.205","172.30.1.104","TCP","54","42364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13519","6.109935","172.30.1.205","172.30.1.104","TCP","74","35002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909336 TSecr=0 WS=128" +"13520","6.110084","172.30.1.104","172.30.1.205","TCP","54","135 > 42364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13521","6.110113","172.30.1.104","172.30.1.205","TCP","54","135 > 42364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13522","6.110118","172.30.1.205","172.30.1.104","TCP","54","42364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13523","6.110216","172.30.1.104","172.30.1.205","TCP","66","49671 > 35002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13524","6.110224","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13525","6.110576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13526","6.110864","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13527","6.110873","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13528","6.112747","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13529","6.113158","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13530","6.113164","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13531","6.114505","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13532","6.115995","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13533","6.116004","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13534","6.116942","172.30.1.205","172.30.1.104","TCP","74","42368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909343 TSecr=0 WS=128" +"13535","6.117267","172.30.1.104","172.30.1.205","TCP","66","135 > 42368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13536","6.117277","172.30.1.205","172.30.1.104","TCP","54","42368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13537","6.117635","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13538","6.117923","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13539","6.117932","172.30.1.205","172.30.1.104","TCP","54","42368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13540","6.120117","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13541","6.120483","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13542","6.120489","172.30.1.205","172.30.1.104","TCP","54","42368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13543","6.122315","172.30.1.205","172.30.1.104","TCP","54","42368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13544","6.122426","172.30.1.205","172.30.1.104","TCP","74","35006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909348 TSecr=0 WS=128" +"13545","6.122567","172.30.1.104","172.30.1.205","TCP","54","135 > 42368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13546","6.122612","172.30.1.104","172.30.1.205","TCP","54","135 > 42368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13547","6.122622","172.30.1.205","172.30.1.104","TCP","54","42368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13548","6.122697","172.30.1.104","172.30.1.205","TCP","66","49671 > 35006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13549","6.122710","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13550","6.123117","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13551","6.123383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13552","6.123403","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13553","6.125604","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13554","6.125999","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13555","6.126006","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13556","6.127371","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13557","6.128854","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13558","6.128865","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13559","6.129842","172.30.1.205","172.30.1.104","TCP","74","42372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909356 TSecr=0 WS=128" +"13560","6.130142","172.30.1.104","172.30.1.205","TCP","66","135 > 42372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13561","6.130153","172.30.1.205","172.30.1.104","TCP","54","42372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13562","6.130503","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13563","6.130798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13564","6.130807","172.30.1.205","172.30.1.104","TCP","54","42372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13565","6.133028","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13566","6.133444","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13567","6.133451","172.30.1.205","172.30.1.104","TCP","54","42372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13568","6.135271","172.30.1.205","172.30.1.104","TCP","54","42372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13569","6.135388","172.30.1.205","172.30.1.104","TCP","74","35010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909361 TSecr=0 WS=128" +"13570","6.135572","172.30.1.104","172.30.1.205","TCP","54","135 > 42372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13571","6.135613","172.30.1.104","172.30.1.205","TCP","54","135 > 42372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13572","6.135618","172.30.1.205","172.30.1.104","TCP","54","42372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13573","6.135693","172.30.1.104","172.30.1.205","TCP","66","49671 > 35010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13574","6.135701","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13575","6.136052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13576","6.136336","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13577","6.136343","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13578","6.138235","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13579","6.138615","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13580","6.138622","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13581","6.139969","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13582","6.141628","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13583","6.141638","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13584","6.142587","172.30.1.205","172.30.1.104","TCP","74","42376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909369 TSecr=0 WS=128" +"13585","6.142899","172.30.1.104","172.30.1.205","TCP","66","135 > 42376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13586","6.142909","172.30.1.205","172.30.1.104","TCP","54","42376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13587","6.143257","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13588","6.143535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13589","6.143543","172.30.1.205","172.30.1.104","TCP","54","42376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13590","6.145758","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13591","6.146412","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13592","6.146419","172.30.1.205","172.30.1.104","TCP","54","42376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13593","6.147270","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13594","6.147319","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13595","6.147356","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13596","6.147390","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13597","6.147414","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13598","6.147442","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13599","6.147470","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13600","6.147497","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13601","6.147524","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13602","6.147550","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13603","6.147557","172.30.1.104","172.30.1.205","TCP","54","49671 > 34970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13604","6.147596","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13605","6.147622","172.30.1.104","172.30.1.205","TCP","54","49671 > 34974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13606","6.147642","172.30.1.104","172.30.1.205","TCP","54","49671 > 34970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13607","6.147648","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13608","6.147707","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13609","6.147792","172.30.1.104","172.30.1.205","TCP","54","49671 > 34978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13610","6.147810","172.30.1.104","172.30.1.205","TCP","54","49671 > 34974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13611","6.147816","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13612","6.147830","172.30.1.104","172.30.1.205","TCP","54","49671 > 34978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13613","6.147833","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13614","6.147866","172.30.1.104","172.30.1.205","TCP","54","49671 > 34986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13615","6.147899","172.30.1.104","172.30.1.205","TCP","54","49671 > 34986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13616","6.147903","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13617","6.147919","172.30.1.104","172.30.1.205","TCP","54","49671 > 34990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13618","6.147938","172.30.1.104","172.30.1.205","TCP","54","49671 > 34994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13619","6.147958","172.30.1.104","172.30.1.205","TCP","54","49671 > 34982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13620","6.147978","172.30.1.104","172.30.1.205","TCP","54","49671 > 34998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13621","6.148079","172.30.1.104","172.30.1.205","TCP","54","49671 > 34998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13622","6.148084","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13623","6.148098","172.30.1.104","172.30.1.205","TCP","54","49671 > 35002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13624","6.148120","172.30.1.104","172.30.1.205","TCP","54","49671 > 34982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13625","6.148124","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13626","6.148140","172.30.1.104","172.30.1.205","TCP","54","49671 > 35002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13627","6.148143","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13628","6.148160","172.30.1.104","172.30.1.205","TCP","54","49671 > 34990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13629","6.148164","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13630","6.148180","172.30.1.104","172.30.1.205","TCP","54","49671 > 34994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13631","6.148183","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13632","6.148201","172.30.1.104","172.30.1.205","TCP","54","49671 > 34966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13633","6.148224","172.30.1.104","172.30.1.205","TCP","54","49671 > 34966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13634","6.148229","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13635","6.148242","172.30.1.104","172.30.1.205","TCP","54","49671 > 35006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13636","6.148263","172.30.1.104","172.30.1.205","TCP","54","49671 > 35010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13637","6.148324","172.30.1.104","172.30.1.205","TCP","54","49671 > 35006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13638","6.148329","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13639","6.148331","172.30.1.104","172.30.1.205","TCP","54","49671 > 35010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13640","6.148332","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13641","6.149290","172.30.1.205","172.30.1.104","TCP","54","42376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13642","6.149405","172.30.1.205","172.30.1.104","TCP","74","35014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909375 TSecr=0 WS=128" +"13643","6.149565","172.30.1.104","172.30.1.205","TCP","54","135 > 42376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13644","6.149576","172.30.1.104","172.30.1.205","TCP","54","135 > 42376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13645","6.149581","172.30.1.205","172.30.1.104","TCP","54","42376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13646","6.149664","172.30.1.104","172.30.1.205","TCP","66","49671 > 35014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13647","6.149672","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13648","6.150027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13649","6.150330","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13650","6.150338","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13651","6.152215","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13652","6.152621","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13653","6.152627","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13654","6.154015","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13655","6.155557","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13656","6.155567","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13657","6.156497","172.30.1.205","172.30.1.104","TCP","74","42380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909382 TSecr=0 WS=128" +"13658","6.156783","172.30.1.104","172.30.1.205","TCP","66","135 > 42380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13659","6.156794","172.30.1.205","172.30.1.104","TCP","54","42380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13660","6.157155","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13661","6.157456","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13662","6.157465","172.30.1.205","172.30.1.104","TCP","54","42380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13663","6.159635","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13664","6.160022","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13665","6.160029","172.30.1.205","172.30.1.104","TCP","54","42380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13666","6.161856","172.30.1.205","172.30.1.104","TCP","54","42380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13667","6.161967","172.30.1.205","172.30.1.104","TCP","74","35018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909388 TSecr=0 WS=128" +"13668","6.162140","172.30.1.104","172.30.1.205","TCP","54","135 > 42380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13669","6.162171","172.30.1.104","172.30.1.205","TCP","54","135 > 42380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13670","6.162176","172.30.1.205","172.30.1.104","TCP","54","42380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13671","6.162256","172.30.1.104","172.30.1.205","TCP","66","49671 > 35018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13672","6.162265","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13673","6.162615","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13674","6.162934","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13675","6.162943","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13676","6.164836","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13677","6.165231","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13678","6.165237","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13679","6.166582","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13680","6.168218","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13681","6.168227","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13682","6.169184","172.30.1.205","172.30.1.104","TCP","74","42384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909395 TSecr=0 WS=128" +"13683","6.169483","172.30.1.104","172.30.1.205","TCP","66","135 > 42384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13684","6.169494","172.30.1.205","172.30.1.104","TCP","54","42384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13685","6.169842","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13686","6.170139","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13687","6.170147","172.30.1.205","172.30.1.104","TCP","54","42384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13688","6.172336","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13689","6.172732","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13690","6.172738","172.30.1.205","172.30.1.104","TCP","54","42384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13691","6.174564","172.30.1.205","172.30.1.104","TCP","54","42384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13692","6.174681","172.30.1.205","172.30.1.104","TCP","74","35022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909401 TSecr=0 WS=128" +"13693","6.174823","172.30.1.104","172.30.1.205","TCP","54","135 > 42384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13694","6.174902","172.30.1.104","172.30.1.205","TCP","54","135 > 42384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13695","6.174912","172.30.1.205","172.30.1.104","TCP","54","42384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13696","6.174992","172.30.1.104","172.30.1.205","TCP","66","49671 > 35022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13697","6.175000","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13698","6.175348","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13699","6.175631","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13700","6.175640","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13701","6.177565","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13702","6.177906","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13703","6.177912","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13704","6.179263","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13705","6.180784","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13706","6.180793","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13707","6.181732","172.30.1.205","172.30.1.104","TCP","74","42388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909408 TSecr=0 WS=128" +"13708","6.182032","172.30.1.104","172.30.1.205","TCP","66","135 > 42388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13709","6.182043","172.30.1.205","172.30.1.104","TCP","54","42388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13710","6.182393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13711","6.182680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13712","6.182689","172.30.1.205","172.30.1.104","TCP","54","42388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13713","6.184904","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13714","6.185290","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13715","6.185297","172.30.1.205","172.30.1.104","TCP","54","42388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13716","6.187115","172.30.1.205","172.30.1.104","TCP","54","42388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13717","6.187225","172.30.1.205","172.30.1.104","TCP","74","35026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909413 TSecr=0 WS=128" +"13718","6.187379","172.30.1.104","172.30.1.205","TCP","54","135 > 42388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13719","6.187398","172.30.1.104","172.30.1.205","TCP","54","135 > 42388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13720","6.187403","172.30.1.205","172.30.1.104","TCP","54","42388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13721","6.187509","172.30.1.104","172.30.1.205","TCP","66","49671 > 35026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13722","6.187517","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13723","6.187865","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13724","6.188157","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13725","6.188166","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13726","6.190101","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13727","6.190489","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13728","6.190495","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13729","6.191895","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13730","6.193428","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13731","6.193447","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13732","6.194615","172.30.1.205","172.30.1.104","TCP","74","42392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909421 TSecr=0 WS=128" +"13733","6.195022","172.30.1.104","172.30.1.205","TCP","66","135 > 42392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13734","6.195033","172.30.1.205","172.30.1.104","TCP","54","42392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13735","6.195385","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13736","6.195685","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13737","6.195695","172.30.1.205","172.30.1.104","TCP","54","42392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13738","6.197905","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13739","6.198333","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13740","6.198340","172.30.1.205","172.30.1.104","TCP","54","42392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13741","6.200180","172.30.1.205","172.30.1.104","TCP","54","42392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13742","6.200290","172.30.1.205","172.30.1.104","TCP","74","35030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909426 TSecr=0 WS=128" +"13743","6.200446","172.30.1.104","172.30.1.205","TCP","54","135 > 42392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13744","6.200518","172.30.1.104","172.30.1.205","TCP","54","135 > 42392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13745","6.200523","172.30.1.205","172.30.1.104","TCP","54","42392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13746","6.200605","172.30.1.104","172.30.1.205","TCP","66","49671 > 35030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13747","6.200614","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13748","6.200991","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13749","6.202471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13750","6.202478","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13751","6.204338","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13752","6.204754","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13753","6.204761","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13754","6.206130","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13755","6.207697","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13756","6.207715","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13757","6.208884","172.30.1.205","172.30.1.104","TCP","74","42396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909435 TSecr=0 WS=128" +"13758","6.209186","172.30.1.104","172.30.1.205","TCP","66","135 > 42396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13759","6.209196","172.30.1.205","172.30.1.104","TCP","54","42396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13760","6.209551","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13761","6.209891","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13762","6.209900","172.30.1.205","172.30.1.104","TCP","54","42396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13763","6.212125","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13764","6.212555","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13765","6.212567","172.30.1.205","172.30.1.104","TCP","54","42396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13766","6.214549","172.30.1.205","172.30.1.104","TCP","54","42396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13767","6.214664","172.30.1.205","172.30.1.104","TCP","74","35034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909441 TSecr=0 WS=128" +"13768","6.214818","172.30.1.104","172.30.1.205","TCP","54","135 > 42396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13769","6.214849","172.30.1.104","172.30.1.205","TCP","54","135 > 42396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13770","6.214854","172.30.1.205","172.30.1.104","TCP","54","42396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13771","6.215002","172.30.1.104","172.30.1.205","TCP","66","49671 > 35034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13772","6.215010","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13773","6.215354","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13774","6.215706","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13775","6.215715","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13776","6.217640","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13777","6.218002","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13778","6.218008","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13779","6.219370","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13780","6.221198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13781","6.221207","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13782","6.222148","172.30.1.205","172.30.1.104","TCP","74","42400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909448 TSecr=0 WS=128" +"13783","6.222446","172.30.1.104","172.30.1.205","TCP","66","135 > 42400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13784","6.222456","172.30.1.205","172.30.1.104","TCP","54","42400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13785","6.222807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13786","6.223152","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13787","6.223162","172.30.1.205","172.30.1.104","TCP","54","42400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13788","6.225384","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13789","6.225754","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13790","6.225761","172.30.1.205","172.30.1.104","TCP","54","42400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13791","6.227578","172.30.1.205","172.30.1.104","TCP","54","42400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13792","6.227689","172.30.1.205","172.30.1.104","TCP","74","35038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909454 TSecr=0 WS=128" +"13793","6.227903","172.30.1.104","172.30.1.205","TCP","54","135 > 42400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13794","6.227922","172.30.1.104","172.30.1.205","TCP","54","135 > 42400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13795","6.227932","172.30.1.205","172.30.1.104","TCP","54","42400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13796","6.228053","172.30.1.104","172.30.1.205","TCP","66","49671 > 35038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13797","6.228069","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13798","6.228553","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13799","6.228888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13800","6.228897","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13801","6.230779","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13802","6.231205","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13803","6.231211","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13804","6.232613","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13805","6.234206","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13806","6.234216","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13807","6.235160","172.30.1.205","172.30.1.104","TCP","74","42404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909461 TSecr=0 WS=128" +"13808","6.235467","172.30.1.104","172.30.1.205","TCP","66","135 > 42404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13809","6.235479","172.30.1.205","172.30.1.104","TCP","54","42404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13810","6.235828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13811","6.236175","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13812","6.236184","172.30.1.205","172.30.1.104","TCP","54","42404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13813","6.238449","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13814","6.238879","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13815","6.238886","172.30.1.205","172.30.1.104","TCP","54","42404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13816","6.240813","172.30.1.205","172.30.1.104","TCP","54","42404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13817","6.240920","172.30.1.205","172.30.1.104","TCP","74","35042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909467 TSecr=0 WS=128" +"13818","6.241098","172.30.1.104","172.30.1.205","TCP","54","135 > 42404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13819","6.241128","172.30.1.104","172.30.1.205","TCP","54","135 > 42404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13820","6.241133","172.30.1.205","172.30.1.104","TCP","54","42404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13821","6.241231","172.30.1.104","172.30.1.205","TCP","66","49671 > 35042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13822","6.241239","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13823","6.241594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13824","6.242011","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13825","6.242020","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13826","6.243904","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13827","6.244297","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13828","6.244304","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13829","6.245768","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13830","6.248444","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13831","6.248454","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13832","6.249459","172.30.1.205","172.30.1.104","TCP","74","42408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909475 TSecr=0 WS=128" +"13833","6.249780","172.30.1.104","172.30.1.205","TCP","66","135 > 42408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13834","6.249790","172.30.1.205","172.30.1.104","TCP","54","42408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13835","6.250139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13836","6.250469","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13837","6.250477","172.30.1.205","172.30.1.104","TCP","54","42408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13838","6.252686","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13839","6.253102","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13840","6.253109","172.30.1.205","172.30.1.104","TCP","54","42408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13841","6.254929","172.30.1.205","172.30.1.104","TCP","54","42408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13842","6.255041","172.30.1.205","172.30.1.104","TCP","74","35046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909481 TSecr=0 WS=128" +"13843","6.255266","172.30.1.104","172.30.1.205","TCP","54","135 > 42408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13844","6.255285","172.30.1.104","172.30.1.205","TCP","54","135 > 42408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13845","6.255289","172.30.1.205","172.30.1.104","TCP","54","42408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13846","6.255390","172.30.1.104","172.30.1.205","TCP","66","49671 > 35046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13847","6.255398","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13848","6.255751","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13849","6.256103","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13850","6.256111","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13851","6.258055","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13852","6.258546","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13853","6.258559","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13854","6.260120","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13855","6.261765","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13856","6.261774","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13857","6.262717","172.30.1.205","172.30.1.104","TCP","74","42412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909489 TSecr=0 WS=128" +"13858","6.263043","172.30.1.104","172.30.1.205","TCP","66","135 > 42412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13859","6.263064","172.30.1.205","172.30.1.104","TCP","54","42412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13860","6.263568","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13861","6.263900","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13862","6.263909","172.30.1.205","172.30.1.104","TCP","54","42412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13863","6.266124","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13864","6.266607","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13865","6.266620","172.30.1.205","172.30.1.104","TCP","54","42412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13866","6.268632","172.30.1.205","172.30.1.104","TCP","54","42412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13867","6.268743","172.30.1.205","172.30.1.104","TCP","74","35050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909495 TSecr=0 WS=128" +"13868","6.268933","172.30.1.104","172.30.1.205","TCP","54","135 > 42412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13869","6.268963","172.30.1.104","172.30.1.205","TCP","54","135 > 42412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13870","6.268968","172.30.1.205","172.30.1.104","TCP","54","42412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13871","6.269070","172.30.1.104","172.30.1.205","TCP","66","49671 > 35050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13872","6.269078","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13873","6.269430","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13874","6.269757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13875","6.269766","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13876","6.271687","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13877","6.272085","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13878","6.272091","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13879","6.273475","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13880","6.275051","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13881","6.275060","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13882","6.276016","172.30.1.205","172.30.1.104","TCP","74","42416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909502 TSecr=0 WS=128" +"13883","6.276326","172.30.1.104","172.30.1.205","TCP","66","135 > 42416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13884","6.276337","172.30.1.205","172.30.1.104","TCP","54","42416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13885","6.276691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13886","6.276998","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13887","6.277007","172.30.1.205","172.30.1.104","TCP","54","42416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13888","6.279235","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13889","6.279634","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13890","6.279641","172.30.1.205","172.30.1.104","TCP","54","42416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13891","6.281469","172.30.1.205","172.30.1.104","TCP","54","42416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13892","6.281580","172.30.1.205","172.30.1.104","TCP","74","35054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909508 TSecr=0 WS=128" +"13893","6.281725","172.30.1.104","172.30.1.205","TCP","54","135 > 42416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13894","6.281739","172.30.1.104","172.30.1.205","TCP","54","135 > 42416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13895","6.281744","172.30.1.205","172.30.1.104","TCP","54","42416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13896","6.281843","172.30.1.104","172.30.1.205","TCP","66","49671 > 35054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13897","6.281851","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13898","6.282199","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13899","6.282463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13900","6.282472","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13901","6.284364","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13902","6.284733","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13903","6.284740","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13904","6.286134","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13905","6.287647","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13906","6.287657","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13907","6.288584","172.30.1.205","172.30.1.104","TCP","74","42420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909515 TSecr=0 WS=128" +"13908","6.288878","172.30.1.104","172.30.1.205","TCP","66","135 > 42420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13909","6.288889","172.30.1.205","172.30.1.104","TCP","54","42420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13910","6.289250","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13911","6.289509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13912","6.289518","172.30.1.205","172.30.1.104","TCP","54","42420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13913","6.291696","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13914","6.292052","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13915","6.292058","172.30.1.205","172.30.1.104","TCP","54","42420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13916","6.293891","172.30.1.205","172.30.1.104","TCP","54","42420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13917","6.294002","172.30.1.205","172.30.1.104","TCP","74","35058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909520 TSecr=0 WS=128" +"13918","6.294162","172.30.1.104","172.30.1.205","TCP","54","135 > 42420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13919","6.294172","172.30.1.104","172.30.1.205","TCP","54","135 > 42420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13920","6.294177","172.30.1.205","172.30.1.104","TCP","54","42420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13921","6.294277","172.30.1.104","172.30.1.205","TCP","66","49671 > 35058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13922","6.294286","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13923","6.294636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13924","6.294963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13925","6.294972","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13926","6.296864","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"13927","6.297271","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"13928","6.297283","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"13929","6.298866","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"13930","6.300491","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"13931","6.300500","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13932","6.301458","172.30.1.205","172.30.1.104","TCP","74","42424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909527 TSecr=0 WS=128" +"13933","6.301749","172.30.1.104","172.30.1.205","TCP","66","135 > 42424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13934","6.301759","172.30.1.205","172.30.1.104","TCP","54","42424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13935","6.302106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"13936","6.302408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13937","6.302416","172.30.1.205","172.30.1.104","TCP","54","42424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13938","6.304582","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"13939","6.304957","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"13940","6.304964","172.30.1.205","172.30.1.104","TCP","54","42424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13941","6.305811","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13942","6.305861","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13943","6.305899","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13944","6.305933","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13945","6.305961","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13946","6.305984","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13947","6.306012","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13948","6.306034","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13949","6.306058","172.30.1.104","172.30.1.205","TCP","54","49671 > 35018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13950","6.306075","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13951","6.306107","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13952","6.306134","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13953","6.306164","172.30.1.104","172.30.1.205","TCP","54","49671 > 35022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13954","6.306183","172.30.1.104","172.30.1.205","TCP","54","49671 > 35026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13955","6.306203","172.30.1.104","172.30.1.205","TCP","54","49671 > 35030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13956","6.306223","172.30.1.104","172.30.1.205","TCP","54","49671 > 35034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13957","6.306242","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"13958","6.306335","172.30.1.104","172.30.1.205","TCP","54","49671 > 35034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13959","6.306342","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13960","6.306353","172.30.1.104","172.30.1.205","TCP","54","49671 > 35038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13961","6.306372","172.30.1.104","172.30.1.205","TCP","54","49671 > 35042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13962","6.306392","172.30.1.104","172.30.1.205","TCP","54","49671 > 35030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13963","6.306396","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13964","6.306412","172.30.1.104","172.30.1.205","TCP","54","49671 > 35046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13965","6.306432","172.30.1.104","172.30.1.205","TCP","54","49671 > 35018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13966","6.306436","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13967","6.306453","172.30.1.104","172.30.1.205","TCP","54","49671 > 35046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13968","6.306456","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13969","6.306562","172.30.1.104","172.30.1.205","TCP","54","49671 > 35042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13970","6.306567","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13971","6.306580","172.30.1.104","172.30.1.205","TCP","54","49671 > 35038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13972","6.306582","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13973","6.306600","172.30.1.104","172.30.1.205","TCP","54","49671 > 35022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13974","6.306603","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13975","6.306621","172.30.1.104","172.30.1.205","TCP","54","49671 > 35026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13976","6.306624","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13977","6.306644","172.30.1.104","172.30.1.205","TCP","54","49671 > 35050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13978","6.306665","172.30.1.104","172.30.1.205","TCP","54","49671 > 35054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13979","6.306799","172.30.1.104","172.30.1.205","TCP","54","49671 > 35050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13980","6.306804","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13981","6.306820","172.30.1.104","172.30.1.205","TCP","54","49671 > 35058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13982","6.306843","172.30.1.104","172.30.1.205","TCP","54","49671 > 35054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13983","6.306846","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13984","6.306863","172.30.1.104","172.30.1.205","TCP","54","49671 > 35058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13985","6.306865","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13986","6.306884","172.30.1.104","172.30.1.205","TCP","54","49671 > 35014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13987","6.307174","172.30.1.104","172.30.1.205","TCP","54","49671 > 35014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"13988","6.307178","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"13989","6.307759","172.30.1.205","172.30.1.104","TCP","54","42424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"13990","6.307870","172.30.1.205","172.30.1.104","TCP","74","35062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909534 TSecr=0 WS=128" +"13991","6.308010","172.30.1.104","172.30.1.205","TCP","54","135 > 42424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13992","6.308040","172.30.1.104","172.30.1.205","TCP","54","135 > 42424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"13993","6.308045","172.30.1.205","172.30.1.104","TCP","54","42424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"13994","6.308124","172.30.1.104","172.30.1.205","TCP","66","49671 > 35062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"13995","6.308132","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"13996","6.308497","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"13997","6.308791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"13998","6.308801","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"13999","6.310686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14000","6.311115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14001","6.311121","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14002","6.312479","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14003","6.314155","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14004","6.314166","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14005","6.315115","172.30.1.205","172.30.1.104","TCP","74","42428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909541 TSecr=0 WS=128" +"14006","6.315417","172.30.1.104","172.30.1.205","TCP","66","135 > 42428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14007","6.315428","172.30.1.205","172.30.1.104","TCP","54","42428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14008","6.315775","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14009","6.316050","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14010","6.316058","172.30.1.205","172.30.1.104","TCP","54","42428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14011","6.318264","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14012","6.318696","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14013","6.318702","172.30.1.205","172.30.1.104","TCP","54","42428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14014","6.320507","172.30.1.205","172.30.1.104","TCP","54","42428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14015","6.320618","172.30.1.205","172.30.1.104","TCP","74","35066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909547 TSecr=0 WS=128" +"14016","6.320841","172.30.1.104","172.30.1.205","TCP","54","135 > 42428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14017","6.320883","172.30.1.104","172.30.1.205","TCP","54","135 > 42428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14018","6.320889","172.30.1.205","172.30.1.104","TCP","54","42428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14019","6.320985","172.30.1.104","172.30.1.205","TCP","66","49671 > 35066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14020","6.321001","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14021","6.321402","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14022","6.321681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14023","6.321690","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14024","6.323587","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14025","6.323929","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14026","6.323936","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14027","6.325319","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14028","6.326874","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14029","6.326885","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14030","6.327819","172.30.1.205","172.30.1.104","TCP","74","42432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909554 TSecr=0 WS=128" +"14031","6.328118","172.30.1.104","172.30.1.205","TCP","66","135 > 42432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14032","6.328129","172.30.1.205","172.30.1.104","TCP","54","42432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14033","6.328498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14034","6.328765","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14035","6.328784","172.30.1.205","172.30.1.104","TCP","54","42432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14036","6.330980","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14037","6.331334","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14038","6.331341","172.30.1.205","172.30.1.104","TCP","54","42432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14039","6.333166","172.30.1.205","172.30.1.104","TCP","54","42432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14040","6.333281","172.30.1.205","172.30.1.104","TCP","74","35070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909559 TSecr=0 WS=128" +"14041","6.333381","172.30.1.104","172.30.1.205","TCP","54","135 > 42432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14042","6.333417","172.30.1.104","172.30.1.205","TCP","54","135 > 42432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14043","6.333423","172.30.1.205","172.30.1.104","TCP","54","42432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14044","6.333536","172.30.1.104","172.30.1.205","TCP","66","49671 > 35070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14045","6.333544","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14046","6.333887","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14047","6.334136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14048","6.334145","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14049","6.336023","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14050","6.336401","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14051","6.336407","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14052","6.337775","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14053","6.339222","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14054","6.339231","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14055","6.340158","172.30.1.205","172.30.1.104","TCP","74","42436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909566 TSecr=0 WS=128" +"14056","6.340490","172.30.1.104","172.30.1.205","TCP","66","135 > 42436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14057","6.340511","172.30.1.205","172.30.1.104","TCP","54","42436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14058","6.341122","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14059","6.341448","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14060","6.341457","172.30.1.205","172.30.1.104","TCP","54","42436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14061","6.343645","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14062","6.344007","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14063","6.344013","172.30.1.205","172.30.1.104","TCP","54","42436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14064","6.345864","172.30.1.205","172.30.1.104","TCP","54","42436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14065","6.345981","172.30.1.205","172.30.1.104","TCP","74","35074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909572 TSecr=0 WS=128" +"14066","6.346177","172.30.1.104","172.30.1.205","TCP","54","135 > 42436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14067","6.346186","172.30.1.104","172.30.1.205","TCP","54","135 > 42436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14068","6.346191","172.30.1.205","172.30.1.104","TCP","54","42436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14069","6.346288","172.30.1.104","172.30.1.205","TCP","66","49671 > 35074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14070","6.346296","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14071","6.346644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14072","6.346927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14073","6.346935","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14074","6.348839","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14075","6.349210","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14076","6.349216","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14077","6.350559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14078","6.352069","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14079","6.352078","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14080","6.353019","172.30.1.205","172.30.1.104","TCP","74","42440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909579 TSecr=0 WS=128" +"14081","6.353351","172.30.1.104","172.30.1.205","TCP","66","135 > 42440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14082","6.353362","172.30.1.205","172.30.1.104","TCP","54","42440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14083","6.353707","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14084","6.353997","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14085","6.354006","172.30.1.205","172.30.1.104","TCP","54","42440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14086","6.356179","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14087","6.356587","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14088","6.356593","172.30.1.205","172.30.1.104","TCP","54","42440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14089","6.358409","172.30.1.205","172.30.1.104","TCP","54","42440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14090","6.358518","172.30.1.205","172.30.1.104","TCP","74","35078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909584 TSecr=0 WS=128" +"14091","6.358696","172.30.1.104","172.30.1.205","TCP","54","135 > 42440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14092","6.358729","172.30.1.104","172.30.1.205","TCP","54","135 > 42440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14093","6.358735","172.30.1.205","172.30.1.104","TCP","54","42440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14094","6.358807","172.30.1.104","172.30.1.205","TCP","66","49671 > 35078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14095","6.358815","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14096","6.359174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14097","6.359480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14098","6.359488","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14099","6.361368","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14100","6.361770","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14101","6.361776","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14102","6.363113","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14103","6.364638","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14104","6.364647","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14105","6.365607","172.30.1.205","172.30.1.104","TCP","74","42444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909592 TSecr=0 WS=128" +"14106","6.365893","172.30.1.104","172.30.1.205","TCP","66","135 > 42444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14107","6.365903","172.30.1.205","172.30.1.104","TCP","54","42444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14108","6.366249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14109","6.366525","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14110","6.366533","172.30.1.205","172.30.1.104","TCP","54","42444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14111","6.368700","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14112","6.369111","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14113","6.369118","172.30.1.205","172.30.1.104","TCP","54","42444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14114","6.370920","172.30.1.205","172.30.1.104","TCP","54","42444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14115","6.371028","172.30.1.205","172.30.1.104","TCP","74","35082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909597 TSecr=0 WS=128" +"14116","6.371217","172.30.1.104","172.30.1.205","TCP","54","135 > 42444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14117","6.371249","172.30.1.104","172.30.1.205","TCP","54","135 > 42444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14118","6.371255","172.30.1.205","172.30.1.104","TCP","54","42444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14119","6.371327","172.30.1.104","172.30.1.205","TCP","66","49671 > 35082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14120","6.371336","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14121","6.371679","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14122","6.372008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14123","6.372017","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14124","6.373932","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14125","6.374289","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14126","6.374295","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14127","6.375655","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14128","6.377342","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14129","6.377351","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14130","6.378280","172.30.1.205","172.30.1.104","TCP","74","42448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909604 TSecr=0 WS=128" +"14131","6.378589","172.30.1.104","172.30.1.205","TCP","66","135 > 42448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14132","6.378600","172.30.1.205","172.30.1.104","TCP","54","42448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14133","6.378941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14134","6.379258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14135","6.379267","172.30.1.205","172.30.1.104","TCP","54","42448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14136","6.381473","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14137","6.381879","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14138","6.381885","172.30.1.205","172.30.1.104","TCP","54","42448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14139","6.383680","172.30.1.205","172.30.1.104","TCP","54","42448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14140","6.383791","172.30.1.205","172.30.1.104","TCP","74","35086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909610 TSecr=0 WS=128" +"14141","6.383945","172.30.1.104","172.30.1.205","TCP","54","135 > 42448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14142","6.383965","172.30.1.104","172.30.1.205","TCP","54","135 > 42448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14143","6.383971","172.30.1.205","172.30.1.104","TCP","54","42448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14144","6.384443","172.30.1.104","172.30.1.205","TCP","66","49671 > 35086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14145","6.384451","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14146","6.384824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14147","6.385145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14148","6.385154","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14149","6.387001","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14150","6.387946","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14151","6.387952","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14152","6.389323","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14153","6.390937","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14154","6.390946","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14155","6.391888","172.30.1.205","172.30.1.104","TCP","74","42452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909618 TSecr=0 WS=128" +"14156","6.392178","172.30.1.104","172.30.1.205","TCP","66","135 > 42452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14157","6.392188","172.30.1.205","172.30.1.104","TCP","54","42452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14158","6.392534","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14159","6.392848","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14160","6.392857","172.30.1.205","172.30.1.104","TCP","54","42452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14161","6.395042","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14162","6.395468","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14163","6.395478","172.30.1.205","172.30.1.104","TCP","54","42452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14164","6.397418","172.30.1.205","172.30.1.104","TCP","54","42452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14165","6.397546","172.30.1.205","172.30.1.104","TCP","74","35090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909623 TSecr=0 WS=128" +"14166","6.397682","172.30.1.104","172.30.1.205","TCP","54","135 > 42452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14167","6.397694","172.30.1.104","172.30.1.205","TCP","54","135 > 42452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14168","6.397701","172.30.1.205","172.30.1.104","TCP","54","42452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14169","6.397834","172.30.1.104","172.30.1.205","TCP","66","49671 > 35090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14170","6.397843","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14171","6.398193","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14172","6.398461","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14173","6.398468","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14174","6.400326","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14175","6.400684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14176","6.400691","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14177","6.402084","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14178","6.403638","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14179","6.403647","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14180","6.404585","172.30.1.205","172.30.1.104","TCP","74","42456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909631 TSecr=0 WS=128" +"14181","6.404893","172.30.1.104","172.30.1.205","TCP","66","135 > 42456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14182","6.404904","172.30.1.205","172.30.1.104","TCP","54","42456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14183","6.405261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14184","6.405542","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14185","6.405551","172.30.1.205","172.30.1.104","TCP","54","42456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14186","6.407712","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14187","6.408121","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14188","6.408128","172.30.1.205","172.30.1.104","TCP","54","42456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14189","6.409952","172.30.1.205","172.30.1.104","TCP","54","42456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14190","6.410062","172.30.1.205","172.30.1.104","TCP","74","35094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909636 TSecr=0 WS=128" +"14191","6.410291","172.30.1.104","172.30.1.205","TCP","54","135 > 42456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14192","6.410346","172.30.1.104","172.30.1.205","TCP","66","49671 > 35094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14193","6.410356","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14194","6.410390","172.30.1.104","172.30.1.205","TCP","54","135 > 42456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14195","6.410396","172.30.1.205","172.30.1.104","TCP","54","42456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14196","6.410722","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14197","6.411020","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14198","6.411029","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14199","6.412914","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14200","6.413285","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14201","6.413292","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14202","6.414624","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14203","6.416180","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14204","6.416189","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14205","6.417139","172.30.1.205","172.30.1.104","TCP","74","42460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909643 TSecr=0 WS=128" +"14206","6.417442","172.30.1.104","172.30.1.205","TCP","66","135 > 42460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14207","6.417452","172.30.1.205","172.30.1.104","TCP","54","42460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14208","6.417798","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14209","6.418106","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14210","6.418116","172.30.1.205","172.30.1.104","TCP","54","42460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14211","6.420292","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14212","6.420656","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14213","6.420662","172.30.1.205","172.30.1.104","TCP","54","42460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14214","6.422473","172.30.1.205","172.30.1.104","TCP","54","42460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14215","6.422585","172.30.1.205","172.30.1.104","TCP","74","35098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909649 TSecr=0 WS=128" +"14216","6.422872","172.30.1.104","172.30.1.205","TCP","54","135 > 42460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14217","6.422881","172.30.1.104","172.30.1.205","TCP","54","135 > 42460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14218","6.422886","172.30.1.205","172.30.1.104","TCP","54","42460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14219","6.422894","172.30.1.104","172.30.1.205","TCP","66","49671 > 35098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14220","6.422901","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14221","6.423249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14222","6.423537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14223","6.423546","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14224","6.425436","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14225","6.425805","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14226","6.425811","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14227","6.427143","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14228","6.428723","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14229","6.428733","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14230","6.429678","172.30.1.205","172.30.1.104","TCP","74","42464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909656 TSecr=0 WS=128" +"14231","6.430009","172.30.1.104","172.30.1.205","TCP","66","135 > 42464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14232","6.430020","172.30.1.205","172.30.1.104","TCP","54","42464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14233","6.430372","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14234","6.430653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14235","6.430663","172.30.1.205","172.30.1.104","TCP","54","42464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14236","6.432849","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14237","6.433211","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14238","6.433217","172.30.1.205","172.30.1.104","TCP","54","42464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14239","6.435012","172.30.1.205","172.30.1.104","TCP","54","42464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14240","6.435120","172.30.1.205","172.30.1.104","TCP","74","35102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909661 TSecr=0 WS=128" +"14241","6.435276","172.30.1.104","172.30.1.205","TCP","54","135 > 42464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14242","6.435324","172.30.1.104","172.30.1.205","TCP","54","135 > 42464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14243","6.435330","172.30.1.205","172.30.1.104","TCP","54","42464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14244","6.435405","172.30.1.104","172.30.1.205","TCP","66","49671 > 35102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14245","6.435413","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14246","6.435774","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14247","6.436063","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14248","6.436072","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14249","6.437959","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14250","6.438325","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14251","6.438331","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14252","6.439666","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14253","6.441215","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14254","6.441225","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14255","6.442181","172.30.1.205","172.30.1.104","TCP","74","42468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909668 TSecr=0 WS=128" +"14256","6.442470","172.30.1.104","172.30.1.205","TCP","66","135 > 42468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14257","6.442481","172.30.1.205","172.30.1.104","TCP","54","42468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14258","6.442825","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14259","6.443112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14260","6.443121","172.30.1.205","172.30.1.104","TCP","54","42468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14261","6.445324","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14262","6.445713","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14263","6.445719","172.30.1.205","172.30.1.104","TCP","54","42468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14264","6.447508","172.30.1.205","172.30.1.104","TCP","54","42468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14265","6.447618","172.30.1.205","172.30.1.104","TCP","74","35106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909674 TSecr=0 WS=128" +"14266","6.447766","172.30.1.104","172.30.1.205","TCP","54","135 > 42468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14267","6.447777","172.30.1.104","172.30.1.205","TCP","54","135 > 42468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14268","6.447783","172.30.1.205","172.30.1.104","TCP","54","42468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14269","6.447861","172.30.1.104","172.30.1.205","TCP","66","49671 > 35106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14270","6.447869","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14271","6.448208","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14272","6.448545","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14273","6.448553","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14274","6.450441","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14275","6.450782","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14276","6.450789","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14277","6.452139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14278","6.453674","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14279","6.453684","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14280","6.454638","172.30.1.205","172.30.1.104","TCP","74","42472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909681 TSecr=0 WS=128" +"14281","6.454920","172.30.1.104","172.30.1.205","TCP","66","135 > 42472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14282","6.454930","172.30.1.205","172.30.1.104","TCP","54","42472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14283","6.455283","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14284","6.455550","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14285","6.455559","172.30.1.205","172.30.1.104","TCP","54","42472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14286","6.457765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14287","6.458158","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14288","6.458165","172.30.1.205","172.30.1.104","TCP","54","42472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14289","6.459035","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14290","6.459090","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14291","6.459126","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14292","6.459155","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14293","6.459182","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14294","6.459215","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14295","6.459241","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14296","6.459270","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14297","6.459296","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14298","6.459318","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14299","6.459337","172.30.1.104","172.30.1.205","TCP","54","49671 > 35066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14300","6.459354","172.30.1.104","172.30.1.205","TCP","54","49671 > 35070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14301","6.459370","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14302","6.459445","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14303","6.459473","172.30.1.104","172.30.1.205","TCP","54","49671 > 35074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14304","6.459511","172.30.1.104","172.30.1.205","TCP","54","49671 > 35078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14305","6.459532","172.30.1.104","172.30.1.205","TCP","54","49671 > 35066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14306","6.459539","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14307","6.459564","172.30.1.104","172.30.1.205","TCP","54","49671 > 35078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14308","6.459567","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14309","6.459584","172.30.1.104","172.30.1.205","TCP","54","49671 > 35070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14310","6.459587","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14311","6.459603","172.30.1.104","172.30.1.205","TCP","54","49671 > 35082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14312","6.459622","172.30.1.104","172.30.1.205","TCP","54","49671 > 35086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14313","6.459643","172.30.1.104","172.30.1.205","TCP","54","49671 > 35074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14314","6.459649","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14315","6.459758","172.30.1.104","172.30.1.205","TCP","54","49671 > 35090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14316","6.459776","172.30.1.104","172.30.1.205","TCP","54","49671 > 35094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14317","6.459796","172.30.1.104","172.30.1.205","TCP","54","49671 > 35094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14318","6.459801","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14319","6.459818","172.30.1.104","172.30.1.205","TCP","54","49671 > 35090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14320","6.459821","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14321","6.459838","172.30.1.104","172.30.1.205","TCP","54","49671 > 35082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14322","6.459841","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14323","6.459880","172.30.1.104","172.30.1.205","TCP","54","49671 > 35086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14324","6.459887","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14325","6.460027","172.30.1.104","172.30.1.205","TCP","54","49671 > 35098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14326","6.460051","172.30.1.104","172.30.1.205","TCP","54","49671 > 35102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14327","6.460080","172.30.1.104","172.30.1.205","TCP","54","49671 > 35106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14328","6.460107","172.30.1.104","172.30.1.205","TCP","54","49671 > 35098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14329","6.460111","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14330","6.460128","172.30.1.104","172.30.1.205","TCP","54","49671 > 35102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14331","6.460131","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14332","6.460149","172.30.1.104","172.30.1.205","TCP","54","49671 > 35106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14333","6.460151","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14334","6.460169","172.30.1.104","172.30.1.205","TCP","54","49671 > 35062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14335","6.460192","172.30.1.104","172.30.1.205","TCP","54","49671 > 35062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14336","6.460195","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14337","6.461042","172.30.1.205","172.30.1.104","TCP","54","42472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14338","6.461176","172.30.1.205","172.30.1.104","TCP","74","35110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909687 TSecr=0 WS=128" +"14339","6.461303","172.30.1.104","172.30.1.205","TCP","54","135 > 42472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14340","6.461324","172.30.1.104","172.30.1.205","TCP","54","135 > 42472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14341","6.461329","172.30.1.205","172.30.1.104","TCP","54","42472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14342","6.461476","172.30.1.104","172.30.1.205","TCP","66","49671 > 35110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14343","6.461484","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14344","6.461837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14345","6.462122","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14346","6.462131","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14347","6.464017","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14348","6.464365","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14349","6.464372","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14350","6.465757","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14351","6.467323","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14352","6.467333","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14353","6.468292","172.30.1.205","172.30.1.104","TCP","74","42476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909694 TSecr=0 WS=128" +"14354","6.468610","172.30.1.104","172.30.1.205","TCP","66","135 > 42476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14355","6.468620","172.30.1.205","172.30.1.104","TCP","54","42476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14356","6.469006","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14357","6.469289","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14358","6.469300","172.30.1.205","172.30.1.104","TCP","54","42476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14359","6.471484","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14360","6.471849","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14361","6.471856","172.30.1.205","172.30.1.104","TCP","54","42476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14362","6.473709","172.30.1.205","172.30.1.104","TCP","54","42476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14363","6.473824","172.30.1.205","172.30.1.104","TCP","74","35114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909700 TSecr=0 WS=128" +"14364","6.474067","172.30.1.104","172.30.1.205","TCP","54","135 > 42476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14365","6.474134","172.30.1.104","172.30.1.205","TCP","54","135 > 42476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14366","6.474140","172.30.1.205","172.30.1.104","TCP","54","42476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14367","6.474232","172.30.1.104","172.30.1.205","TCP","66","49671 > 35114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14368","6.474240","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14369","6.474586","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14370","6.474872","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14371","6.474881","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14372","6.476722","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14373","6.477095","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14374","6.477102","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14375","6.478443","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14376","6.481817","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14377","6.481835","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14378","6.482899","172.30.1.205","172.30.1.104","TCP","74","42480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909709 TSecr=0 WS=128" +"14379","6.483222","172.30.1.104","172.30.1.205","TCP","66","135 > 42480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14380","6.483232","172.30.1.205","172.30.1.104","TCP","54","42480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14381","6.483576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14382","6.483868","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14383","6.483885","172.30.1.205","172.30.1.104","TCP","54","42480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14384","6.486321","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14385","6.486691","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14386","6.486698","172.30.1.205","172.30.1.104","TCP","54","42480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14387","6.488498","172.30.1.205","172.30.1.104","TCP","54","42480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14388","6.488608","172.30.1.205","172.30.1.104","TCP","74","35118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909715 TSecr=0 WS=128" +"14389","6.488792","172.30.1.104","172.30.1.205","TCP","54","135 > 42480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14390","6.488821","172.30.1.104","172.30.1.205","TCP","54","135 > 42480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14391","6.488828","172.30.1.205","172.30.1.104","TCP","54","42480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14392","6.488897","172.30.1.104","172.30.1.205","TCP","66","49671 > 35118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14393","6.488904","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14394","6.489260","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14395","6.489537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14396","6.489547","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14397","6.491432","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14398","6.491790","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14399","6.491796","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14400","6.493175","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14401","6.496259","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14402","6.496277","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14403","6.497284","172.30.1.205","172.30.1.104","TCP","74","42484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909723 TSecr=0 WS=128" +"14404","6.497581","172.30.1.104","172.30.1.205","TCP","66","135 > 42484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14405","6.497591","172.30.1.205","172.30.1.104","TCP","54","42484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14406","6.497941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14407","6.498221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14408","6.498233","172.30.1.205","172.30.1.104","TCP","54","42484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14409","6.500415","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14410","6.500805","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14411","6.500812","172.30.1.205","172.30.1.104","TCP","54","42484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14412","6.502628","172.30.1.205","172.30.1.104","TCP","54","42484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14413","6.502738","172.30.1.205","172.30.1.104","TCP","74","35122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909729 TSecr=0 WS=128" +"14414","6.502961","172.30.1.104","172.30.1.205","TCP","54","135 > 42484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14415","6.503085","172.30.1.104","172.30.1.205","TCP","66","49671 > 35122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14416","6.503103","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14417","6.503131","172.30.1.104","172.30.1.205","TCP","54","135 > 42484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14418","6.503139","172.30.1.205","172.30.1.104","TCP","54","42484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14419","6.503697","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14420","6.503960","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14421","6.503969","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14422","6.505901","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14423","6.506276","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14424","6.506282","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14425","6.507709","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14426","6.509295","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14427","6.509304","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14428","6.510236","172.30.1.205","172.30.1.104","TCP","74","42488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909736 TSecr=0 WS=128" +"14429","6.510555","172.30.1.104","172.30.1.205","TCP","66","135 > 42488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14430","6.510566","172.30.1.205","172.30.1.104","TCP","54","42488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14431","6.510908","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14432","6.511192","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14433","6.511201","172.30.1.205","172.30.1.104","TCP","54","42488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14434","6.513388","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14435","6.513755","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14436","6.513761","172.30.1.205","172.30.1.104","TCP","54","42488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14437","6.515554","172.30.1.205","172.30.1.104","TCP","54","42488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14438","6.515666","172.30.1.205","172.30.1.104","TCP","74","35126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909742 TSecr=0 WS=128" +"14439","6.515798","172.30.1.104","172.30.1.205","TCP","54","135 > 42488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14440","6.515812","172.30.1.104","172.30.1.205","TCP","54","135 > 42488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14441","6.515817","172.30.1.205","172.30.1.104","TCP","54","42488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14442","6.515948","172.30.1.104","172.30.1.205","TCP","66","49671 > 35126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14443","6.515956","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14444","6.516297","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14445","6.516622","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14446","6.516639","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14447","6.518741","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14448","6.519095","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14449","6.519101","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14450","6.520437","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14451","6.522057","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14452","6.522067","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14453","6.522997","172.30.1.205","172.30.1.104","TCP","74","42492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909749 TSecr=0 WS=128" +"14454","6.523326","172.30.1.104","172.30.1.205","TCP","66","135 > 42492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14455","6.523336","172.30.1.205","172.30.1.104","TCP","54","42492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14456","6.523681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14457","6.523954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14458","6.523969","172.30.1.205","172.30.1.104","TCP","54","42492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14459","6.526279","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14460","6.526647","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14461","6.526655","172.30.1.205","172.30.1.104","TCP","54","42492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14462","6.528492","172.30.1.205","172.30.1.104","TCP","54","42492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14463","6.528608","172.30.1.205","172.30.1.104","TCP","74","35130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909755 TSecr=0 WS=128" +"14464","6.528743","172.30.1.104","172.30.1.205","TCP","54","135 > 42492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14465","6.528755","172.30.1.104","172.30.1.205","TCP","54","135 > 42492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14466","6.528761","172.30.1.205","172.30.1.104","TCP","54","42492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14467","6.528861","172.30.1.104","172.30.1.205","TCP","66","49671 > 35130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14468","6.528870","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14469","6.529240","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14470","6.529516","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14471","6.529526","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14472","6.531420","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14473","6.531789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14474","6.531796","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14475","6.533221","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14476","6.534788","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14477","6.534800","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14478","6.535761","172.30.1.205","172.30.1.104","TCP","74","42496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909762 TSecr=0 WS=128" +"14479","6.536042","172.30.1.104","172.30.1.205","TCP","66","135 > 42496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14480","6.536052","172.30.1.205","172.30.1.104","TCP","54","42496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14481","6.536401","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14482","6.536684","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14483","6.536693","172.30.1.205","172.30.1.104","TCP","54","42496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14484","6.538915","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14485","6.539318","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14486","6.539325","172.30.1.205","172.30.1.104","TCP","54","42496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14487","6.541171","172.30.1.205","172.30.1.104","TCP","54","42496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14488","6.541282","172.30.1.205","172.30.1.104","TCP","74","35134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909767 TSecr=0 WS=128" +"14489","6.541425","172.30.1.104","172.30.1.205","TCP","54","135 > 42496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14490","6.541436","172.30.1.104","172.30.1.205","TCP","54","135 > 42496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14491","6.541441","172.30.1.205","172.30.1.104","TCP","54","42496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14492","6.541562","172.30.1.104","172.30.1.205","TCP","66","49671 > 35134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14493","6.541570","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14494","6.541917","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14495","6.543008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14496","6.543017","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14497","6.544938","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14498","6.545306","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14499","6.545312","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14500","6.546681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14501","6.548331","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14502","6.548340","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14503","6.549371","172.30.1.205","172.30.1.104","TCP","74","42500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909775 TSecr=0 WS=128" +"14504","6.549676","172.30.1.104","172.30.1.205","TCP","66","135 > 42500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14505","6.549686","172.30.1.205","172.30.1.104","TCP","54","42500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14506","6.550037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14507","6.550321","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14508","6.550330","172.30.1.205","172.30.1.104","TCP","54","42500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14509","6.552532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14510","6.552911","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14511","6.552918","172.30.1.205","172.30.1.104","TCP","54","42500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14512","6.554738","172.30.1.205","172.30.1.104","TCP","54","42500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14513","6.554851","172.30.1.205","172.30.1.104","TCP","74","35138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909781 TSecr=0 WS=128" +"14514","6.554998","172.30.1.104","172.30.1.205","TCP","54","135 > 42500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14515","6.555013","172.30.1.104","172.30.1.205","TCP","54","135 > 42500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14516","6.555018","172.30.1.205","172.30.1.104","TCP","54","42500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14517","6.555110","172.30.1.104","172.30.1.205","TCP","66","49671 > 35138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14518","6.555118","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14519","6.555476","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14520","6.555822","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14521","6.555829","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14522","6.557805","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14523","6.558201","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14524","6.558207","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14525","6.559570","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14526","6.561239","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14527","6.561248","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14528","6.562210","172.30.1.205","172.30.1.104","TCP","74","42504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909788 TSecr=0 WS=128" +"14529","6.562505","172.30.1.104","172.30.1.205","TCP","66","135 > 42504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14530","6.562520","172.30.1.205","172.30.1.104","TCP","54","42504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14531","6.562870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14532","6.563182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14533","6.563192","172.30.1.205","172.30.1.104","TCP","54","42504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14534","6.565417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14535","6.565803","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14536","6.565809","172.30.1.205","172.30.1.104","TCP","54","42504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14537","6.567653","172.30.1.205","172.30.1.104","TCP","54","42504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14538","6.567764","172.30.1.205","172.30.1.104","TCP","74","35142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909794 TSecr=0 WS=128" +"14539","6.567903","172.30.1.104","172.30.1.205","TCP","54","135 > 42504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14540","6.567950","172.30.1.104","172.30.1.205","TCP","54","135 > 42504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14541","6.567956","172.30.1.205","172.30.1.104","TCP","54","42504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14542","6.568028","172.30.1.104","172.30.1.205","TCP","66","49671 > 35142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14543","6.568037","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14544","6.568383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14545","6.568692","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14546","6.568701","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14547","6.570665","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14548","6.571056","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14549","6.571063","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14550","6.572429","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14551","6.574170","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14552","6.574188","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14553","6.575244","172.30.1.205","172.30.1.104","TCP","74","42508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909801 TSecr=0 WS=128" +"14554","6.575557","172.30.1.104","172.30.1.205","TCP","66","135 > 42508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14555","6.575568","172.30.1.205","172.30.1.104","TCP","54","42508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14556","6.575922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14557","6.576220","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14558","6.576230","172.30.1.205","172.30.1.104","TCP","54","42508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14559","6.578437","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14560","6.578822","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14561","6.578829","172.30.1.205","172.30.1.104","TCP","54","42508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14562","6.580667","172.30.1.205","172.30.1.104","TCP","54","42508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14563","6.580798","172.30.1.205","172.30.1.104","TCP","74","35146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909807 TSecr=0 WS=128" +"14564","6.580922","172.30.1.104","172.30.1.205","TCP","54","135 > 42508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14565","6.580936","172.30.1.104","172.30.1.205","TCP","54","135 > 42508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14566","6.580942","172.30.1.205","172.30.1.104","TCP","54","42508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14567","6.581074","172.30.1.104","172.30.1.205","TCP","66","49671 > 35146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14568","6.581082","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14569","6.581473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14570","6.581770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14571","6.581778","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14572","6.583683","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14573","6.584115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14574","6.584121","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14575","6.585503","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14576","6.587234","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14577","6.587253","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14578","6.588429","172.30.1.205","172.30.1.104","TCP","74","42512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909814 TSecr=0 WS=128" +"14579","6.588744","172.30.1.104","172.30.1.205","TCP","66","135 > 42512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14580","6.588754","172.30.1.205","172.30.1.104","TCP","54","42512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14581","6.589127","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14582","6.589442","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14583","6.589451","172.30.1.205","172.30.1.104","TCP","54","42512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14584","6.591649","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14585","6.592052","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14586","6.592064","172.30.1.205","172.30.1.104","TCP","54","42512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14587","6.594093","172.30.1.205","172.30.1.104","TCP","54","42512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14588","6.594207","172.30.1.205","172.30.1.104","TCP","74","35150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909820 TSecr=0 WS=128" +"14589","6.594364","172.30.1.104","172.30.1.205","TCP","54","135 > 42512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14590","6.594378","172.30.1.104","172.30.1.205","TCP","54","135 > 42512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14591","6.594384","172.30.1.205","172.30.1.104","TCP","54","42512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14592","6.594507","172.30.1.104","172.30.1.205","TCP","66","49671 > 35150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14593","6.594515","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14594","6.594877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14595","6.595155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14596","6.595164","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14597","6.597159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14598","6.597519","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14599","6.597526","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14600","6.598889","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14601","6.600556","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14602","6.600565","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14603","6.601528","172.30.1.205","172.30.1.104","TCP","74","42516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909827 TSecr=0 WS=128" +"14604","6.601846","172.30.1.104","172.30.1.205","TCP","66","135 > 42516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14605","6.601857","172.30.1.205","172.30.1.104","TCP","54","42516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14606","6.602204","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14607","6.602502","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14608","6.602511","172.30.1.205","172.30.1.104","TCP","54","42516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14609","6.604683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14610","6.605138","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14611","6.605145","172.30.1.205","172.30.1.104","TCP","54","42516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14612","6.606957","172.30.1.205","172.30.1.104","TCP","54","42516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14613","6.607067","172.30.1.205","172.30.1.104","TCP","74","35154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909833 TSecr=0 WS=128" +"14614","6.607239","172.30.1.104","172.30.1.205","TCP","54","135 > 42516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14615","6.607253","172.30.1.104","172.30.1.205","TCP","54","135 > 42516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14616","6.607258","172.30.1.205","172.30.1.104","TCP","54","42516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14617","6.607363","172.30.1.104","172.30.1.205","TCP","66","49671 > 35154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14618","6.607372","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14619","6.607719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14620","6.608009","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14621","6.608018","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14622","6.609922","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14623","6.610280","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14624","6.610287","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14625","6.611627","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14626","6.613198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14627","6.613207","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14628","6.614144","172.30.1.205","172.30.1.104","TCP","74","42520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909840 TSecr=0 WS=128" +"14629","6.614455","172.30.1.104","172.30.1.205","TCP","66","135 > 42520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14630","6.614465","172.30.1.205","172.30.1.104","TCP","54","42520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14631","6.614820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14632","6.615119","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14633","6.615128","172.30.1.205","172.30.1.104","TCP","54","42520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14634","6.617330","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14635","6.617706","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14636","6.617713","172.30.1.205","172.30.1.104","TCP","54","42520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14637","6.618556","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14638","6.618604","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14639","6.618642","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14640","6.618676","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14641","6.618709","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14642","6.618742","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14643","6.618769","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14644","6.618801","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14645","6.618824","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14646","6.618840","172.30.1.104","172.30.1.205","TCP","54","49671 > 35114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14647","6.618858","172.30.1.104","172.30.1.205","TCP","54","49671 > 35118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14648","6.618880","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14649","6.618909","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14650","6.618978","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14651","6.619125","172.30.1.104","172.30.1.205","TCP","54","49671 > 35114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14652","6.619132","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14653","6.619138","172.30.1.104","172.30.1.205","TCP","54","49671 > 35122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14654","6.619148","172.30.1.104","172.30.1.205","TCP","54","49671 > 35118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14655","6.619150","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14656","6.619162","172.30.1.104","172.30.1.205","TCP","54","49671 > 35122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14657","6.619164","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14658","6.619182","172.30.1.104","172.30.1.205","TCP","54","49671 > 35126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14659","6.619201","172.30.1.104","172.30.1.205","TCP","54","49671 > 35130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14660","6.619223","172.30.1.104","172.30.1.205","TCP","54","49671 > 35126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14661","6.619226","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14662","6.619242","172.30.1.104","172.30.1.205","TCP","54","49671 > 35134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14663","6.619267","172.30.1.104","172.30.1.205","TCP","54","49671 > 35138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14664","6.619288","172.30.1.104","172.30.1.205","TCP","54","49671 > 35138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14665","6.619292","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14666","6.619309","172.30.1.104","172.30.1.205","TCP","54","49671 > 35142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14667","6.619329","172.30.1.104","172.30.1.205","TCP","54","49671 > 35142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14668","6.619333","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14669","6.619349","172.30.1.104","172.30.1.205","TCP","54","49671 > 35146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14670","6.619369","172.30.1.104","172.30.1.205","TCP","54","49671 > 35146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14671","6.619373","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14672","6.619523","172.30.1.104","172.30.1.205","TCP","54","49671 > 35150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14673","6.619543","172.30.1.104","172.30.1.205","TCP","54","49671 > 35150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14674","6.619547","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14675","6.619563","172.30.1.104","172.30.1.205","TCP","54","49671 > 35130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14676","6.619566","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14677","6.619584","172.30.1.104","172.30.1.205","TCP","54","49671 > 35134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14678","6.619586","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14679","6.619694","172.30.1.104","172.30.1.205","TCP","54","49671 > 35110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14680","6.619715","172.30.1.104","172.30.1.205","TCP","54","49671 > 35154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14681","6.619767","172.30.1.104","172.30.1.205","TCP","54","49671 > 35110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14682","6.619772","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14683","6.619788","172.30.1.104","172.30.1.205","TCP","54","49671 > 35154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14684","6.619790","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"14685","6.620539","172.30.1.205","172.30.1.104","TCP","54","42520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14686","6.620650","172.30.1.205","172.30.1.104","TCP","74","35158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909847 TSecr=0 WS=128" +"14687","6.620786","172.30.1.104","172.30.1.205","TCP","54","135 > 42520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14688","6.620804","172.30.1.104","172.30.1.205","TCP","54","135 > 42520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14689","6.620810","172.30.1.205","172.30.1.104","TCP","54","42520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14690","6.621010","172.30.1.104","172.30.1.205","TCP","66","49671 > 35158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14691","6.621018","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14692","6.621378","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14693","6.621656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14694","6.621665","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14695","6.623535","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14696","6.623883","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14697","6.623890","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14698","6.625275","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14699","6.626847","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14700","6.626857","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14701","6.627787","172.30.1.205","172.30.1.104","TCP","74","42524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909854 TSecr=0 WS=128" +"14702","6.628101","172.30.1.104","172.30.1.205","TCP","66","135 > 42524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14703","6.628112","172.30.1.205","172.30.1.104","TCP","54","42524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14704","6.628460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14705","6.628784","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14706","6.628793","172.30.1.205","172.30.1.104","TCP","54","42524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14707","6.630987","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14708","6.631378","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14709","6.631385","172.30.1.205","172.30.1.104","TCP","54","42524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14710","6.633220","172.30.1.205","172.30.1.104","TCP","54","42524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14711","6.633329","172.30.1.205","172.30.1.104","TCP","74","35162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909859 TSecr=0 WS=128" +"14712","6.633478","172.30.1.104","172.30.1.205","TCP","54","135 > 42524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14713","6.633499","172.30.1.104","172.30.1.205","TCP","54","135 > 42524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14714","6.633505","172.30.1.205","172.30.1.104","TCP","54","42524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14715","6.633607","172.30.1.104","172.30.1.205","TCP","66","49671 > 35162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14716","6.633615","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14717","6.633960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14718","6.634243","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14719","6.634249","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14720","6.636106","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14721","6.636473","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14722","6.636480","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14723","6.637843","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14724","6.639425","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14725","6.639434","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14726","6.640363","172.30.1.205","172.30.1.104","TCP","74","42528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909866 TSecr=0 WS=128" +"14727","6.640659","172.30.1.104","172.30.1.205","TCP","66","135 > 42528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14728","6.640669","172.30.1.205","172.30.1.104","TCP","54","42528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14729","6.641046","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14730","6.641350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14731","6.641368","172.30.1.205","172.30.1.104","TCP","54","42528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14732","6.643809","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14733","6.644176","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14734","6.644182","172.30.1.205","172.30.1.104","TCP","54","42528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14735","6.646011","172.30.1.205","172.30.1.104","TCP","54","42528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14736","6.646123","172.30.1.205","172.30.1.104","TCP","74","35166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909872 TSecr=0 WS=128" +"14737","6.646295","172.30.1.104","172.30.1.205","TCP","54","135 > 42528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14738","6.646308","172.30.1.104","172.30.1.205","TCP","54","135 > 42528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14739","6.646316","172.30.1.205","172.30.1.104","TCP","54","42528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14740","6.646446","172.30.1.104","172.30.1.205","TCP","66","49671 > 35166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14741","6.646457","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14742","6.646845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14743","6.647103","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14744","6.647112","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14745","6.649057","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14746","6.649411","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14747","6.649418","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14748","6.650773","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14749","6.652490","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14750","6.652501","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14751","6.653491","172.30.1.205","172.30.1.104","TCP","74","42532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909879 TSecr=0 WS=128" +"14752","6.653795","172.30.1.104","172.30.1.205","TCP","66","135 > 42532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14753","6.653806","172.30.1.205","172.30.1.104","TCP","54","42532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14754","6.654155","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14755","6.654423","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14756","6.654431","172.30.1.205","172.30.1.104","TCP","54","42532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14757","6.656611","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14758","6.656979","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14759","6.656986","172.30.1.205","172.30.1.104","TCP","54","42532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14760","6.658831","172.30.1.205","172.30.1.104","TCP","54","42532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14761","6.658942","172.30.1.205","172.30.1.104","TCP","74","35170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909885 TSecr=0 WS=128" +"14762","6.659084","172.30.1.104","172.30.1.205","TCP","54","135 > 42532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14763","6.659099","172.30.1.104","172.30.1.205","TCP","54","135 > 42532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14764","6.659104","172.30.1.205","172.30.1.104","TCP","54","42532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14765","6.659199","172.30.1.104","172.30.1.205","TCP","66","49671 > 35170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14766","6.659208","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14767","6.659550","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14768","6.659825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14769","6.659834","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14770","6.661749","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14771","6.662087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14772","6.662094","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14773","6.663434","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14774","6.665185","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14775","6.665195","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14776","6.666135","172.30.1.205","172.30.1.104","TCP","74","42536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909892 TSecr=0 WS=128" +"14777","6.666426","172.30.1.104","172.30.1.205","TCP","66","135 > 42536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14778","6.666437","172.30.1.205","172.30.1.104","TCP","54","42536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14779","6.666784","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14780","6.667089","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14781","6.667098","172.30.1.205","172.30.1.104","TCP","54","42536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14782","6.669301","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14783","6.669669","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14784","6.669676","172.30.1.205","172.30.1.104","TCP","54","42536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14785","6.671474","172.30.1.205","172.30.1.104","TCP","54","42536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14786","6.671583","172.30.1.205","172.30.1.104","TCP","74","35174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909898 TSecr=0 WS=128" +"14787","6.671751","172.30.1.104","172.30.1.205","TCP","54","135 > 42536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14788","6.671791","172.30.1.104","172.30.1.205","TCP","54","135 > 42536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14789","6.671797","172.30.1.205","172.30.1.104","TCP","54","42536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14790","6.671817","172.30.1.104","172.30.1.205","TCP","66","49671 > 35174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14791","6.671826","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14792","6.672168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14793","6.672435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14794","6.672444","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14795","6.674346","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14796","6.674743","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14797","6.674750","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14798","6.676112","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14799","6.677748","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14800","6.677758","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14801","6.678727","172.30.1.205","172.30.1.104","TCP","74","42540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909905 TSecr=0 WS=128" +"14802","6.679006","172.30.1.104","172.30.1.205","TCP","66","135 > 42540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14803","6.679017","172.30.1.205","172.30.1.104","TCP","54","42540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14804","6.679362","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14805","6.679631","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14806","6.679640","172.30.1.205","172.30.1.104","TCP","54","42540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14807","6.681861","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14808","6.682254","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14809","6.682261","172.30.1.205","172.30.1.104","TCP","54","42540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14810","6.684132","172.30.1.205","172.30.1.104","TCP","54","42540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14811","6.684241","172.30.1.205","172.30.1.104","TCP","74","35178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909910 TSecr=0 WS=128" +"14812","6.684412","172.30.1.104","172.30.1.205","TCP","54","135 > 42540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14813","6.684442","172.30.1.104","172.30.1.205","TCP","54","135 > 42540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14814","6.684448","172.30.1.205","172.30.1.104","TCP","54","42540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14815","6.684519","172.30.1.104","172.30.1.205","TCP","66","49671 > 35178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14816","6.684527","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14817","6.684896","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14818","6.685184","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14819","6.685193","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14820","6.687063","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14821","6.687649","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14822","6.687655","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14823","6.689022","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14824","6.690624","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14825","6.690633","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14826","6.691575","172.30.1.205","172.30.1.104","TCP","74","42544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909917 TSecr=0 WS=128" +"14827","6.691917","172.30.1.104","172.30.1.205","TCP","66","135 > 42544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14828","6.691937","172.30.1.205","172.30.1.104","TCP","54","42544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14829","6.692517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14830","6.692787","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14831","6.692796","172.30.1.205","172.30.1.104","TCP","54","42544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14832","6.694977","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14833","6.695360","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14834","6.695367","172.30.1.205","172.30.1.104","TCP","54","42544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14835","6.697192","172.30.1.205","172.30.1.104","TCP","54","42544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14836","6.697299","172.30.1.205","172.30.1.104","TCP","74","35182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909923 TSecr=0 WS=128" +"14837","6.697456","172.30.1.104","172.30.1.205","TCP","54","135 > 42544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14838","6.697507","172.30.1.104","172.30.1.205","TCP","54","135 > 42544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14839","6.697512","172.30.1.205","172.30.1.104","TCP","54","42544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14840","6.697595","172.30.1.104","172.30.1.205","TCP","66","49671 > 35182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14841","6.697603","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14842","6.697965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14843","6.698223","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14844","6.698232","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14845","6.700104","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14846","6.700445","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14847","6.700451","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14848","6.701843","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14849","6.703446","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14850","6.703456","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14851","6.704379","172.30.1.205","172.30.1.104","TCP","74","42548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909930 TSecr=0 WS=128" +"14852","6.704802","172.30.1.104","172.30.1.205","TCP","66","135 > 42548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14853","6.704813","172.30.1.205","172.30.1.104","TCP","54","42548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14854","6.705170","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14855","6.705436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14856","6.705445","172.30.1.205","172.30.1.104","TCP","54","42548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14857","6.707614","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14858","6.707986","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14859","6.707992","172.30.1.205","172.30.1.104","TCP","54","42548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14860","6.709808","172.30.1.205","172.30.1.104","TCP","54","42548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14861","6.709916","172.30.1.205","172.30.1.104","TCP","74","35186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909936 TSecr=0 WS=128" +"14862","6.710057","172.30.1.104","172.30.1.205","TCP","54","135 > 42548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14863","6.710080","172.30.1.104","172.30.1.205","TCP","54","135 > 42548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14864","6.710085","172.30.1.205","172.30.1.104","TCP","54","42548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14865","6.710166","172.30.1.104","172.30.1.205","TCP","66","49671 > 35186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14866","6.710174","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14867","6.710517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14868","6.712326","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14869","6.712335","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14870","6.714222","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14871","6.714578","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14872","6.714584","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14873","6.715928","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14874","6.717531","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14875","6.717540","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14876","6.718475","172.30.1.205","172.30.1.104","TCP","74","42552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909944 TSecr=0 WS=128" +"14877","6.718763","172.30.1.104","172.30.1.205","TCP","66","135 > 42552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14878","6.718774","172.30.1.205","172.30.1.104","TCP","54","42552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14879","6.719123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14880","6.719386","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14881","6.719395","172.30.1.205","172.30.1.104","TCP","54","42552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14882","6.721589","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14883","6.721952","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14884","6.721959","172.30.1.205","172.30.1.104","TCP","54","42552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14885","6.723804","172.30.1.205","172.30.1.104","TCP","54","42552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14886","6.723924","172.30.1.205","172.30.1.104","TCP","74","35190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909950 TSecr=0 WS=128" +"14887","6.724106","172.30.1.104","172.30.1.205","TCP","54","135 > 42552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14888","6.724122","172.30.1.104","172.30.1.205","TCP","54","135 > 42552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14889","6.724128","172.30.1.205","172.30.1.104","TCP","54","42552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14890","6.724274","172.30.1.104","172.30.1.205","TCP","66","49671 > 35190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14891","6.724282","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14892","6.724636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14893","6.724928","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14894","6.724937","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14895","6.726837","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14896","6.727193","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14897","6.727199","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14898","6.728532","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14899","6.730128","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14900","6.730137","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14901","6.731067","172.30.1.205","172.30.1.104","TCP","74","42556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909957 TSecr=0 WS=128" +"14902","6.731376","172.30.1.104","172.30.1.205","TCP","66","135 > 42556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14903","6.731387","172.30.1.205","172.30.1.104","TCP","54","42556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14904","6.731734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14905","6.732024","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14906","6.732033","172.30.1.205","172.30.1.104","TCP","54","42556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14907","6.734218","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14908","6.734591","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14909","6.734597","172.30.1.205","172.30.1.104","TCP","54","42556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14910","6.736384","172.30.1.205","172.30.1.104","TCP","54","42556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14911","6.736493","172.30.1.205","172.30.1.104","TCP","74","35194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909962 TSecr=0 WS=128" +"14912","6.736660","172.30.1.104","172.30.1.205","TCP","54","135 > 42556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14913","6.736692","172.30.1.104","172.30.1.205","TCP","54","135 > 42556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14914","6.736698","172.30.1.205","172.30.1.104","TCP","54","42556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14915","6.736770","172.30.1.104","172.30.1.205","TCP","66","49671 > 35194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14916","6.736788","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14917","6.737142","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14918","6.737434","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14919","6.737443","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14920","6.739305","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14921","6.739681","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14922","6.739688","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14923","6.741041","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14924","6.742998","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14925","6.743007","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14926","6.743936","172.30.1.205","172.30.1.104","TCP","74","42560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909970 TSecr=0 WS=128" +"14927","6.744226","172.30.1.104","172.30.1.205","TCP","66","135 > 42560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14928","6.744236","172.30.1.205","172.30.1.104","TCP","54","42560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14929","6.744580","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14930","6.744858","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14931","6.744868","172.30.1.205","172.30.1.104","TCP","54","42560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14932","6.747048","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14933","6.747456","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14934","6.747462","172.30.1.205","172.30.1.104","TCP","54","42560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14935","6.749278","172.30.1.205","172.30.1.104","TCP","54","42560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14936","6.749387","172.30.1.205","172.30.1.104","TCP","74","35198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909975 TSecr=0 WS=128" +"14937","6.749540","172.30.1.104","172.30.1.205","TCP","54","135 > 42560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14938","6.749548","172.30.1.104","172.30.1.205","TCP","54","135 > 42560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14939","6.749553","172.30.1.205","172.30.1.104","TCP","54","42560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14940","6.749670","172.30.1.104","172.30.1.205","TCP","66","49671 > 35198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14941","6.749678","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14942","6.750023","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14943","6.750289","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14944","6.750300","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14945","6.752475","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14946","6.752844","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14947","6.752851","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14948","6.754246","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14949","6.755823","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14950","6.755842","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14951","6.756871","172.30.1.205","172.30.1.104","TCP","74","42564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909983 TSecr=0 WS=128" +"14952","6.757161","172.30.1.104","172.30.1.205","TCP","66","135 > 42564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14953","6.757171","172.30.1.205","172.30.1.104","TCP","54","42564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14954","6.757515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14955","6.757813","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14956","6.757821","172.30.1.205","172.30.1.104","TCP","54","42564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14957","6.760008","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14958","6.760399","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14959","6.760406","172.30.1.205","172.30.1.104","TCP","54","42564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14960","6.762218","172.30.1.205","172.30.1.104","TCP","54","42564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14961","6.762327","172.30.1.205","172.30.1.104","TCP","74","35202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909988 TSecr=0 WS=128" +"14962","6.762490","172.30.1.104","172.30.1.205","TCP","54","135 > 42564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14963","6.762599","172.30.1.104","172.30.1.205","TCP","66","49671 > 35202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14964","6.762607","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14965","6.762947","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"14966","6.764752","172.30.1.104","172.30.1.205","TCP","54","135 > 42564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"14967","6.764757","172.30.1.205","172.30.1.104","TCP","54","42564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"14968","6.764792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14969","6.764800","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14970","6.766661","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"14971","6.767063","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"14972","6.767076","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"14973","6.768567","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"14974","6.770191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"14975","6.770201","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14976","6.771145","172.30.1.205","172.30.1.104","TCP","74","42568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909997 TSecr=0 WS=128" +"14977","6.771447","172.30.1.104","172.30.1.205","TCP","66","135 > 42568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"14978","6.771456","172.30.1.205","172.30.1.104","TCP","54","42568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"14979","6.771827","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"14980","6.772116","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"14981","6.772125","172.30.1.205","172.30.1.104","TCP","54","42568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"14982","6.774314","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"14983","6.774755","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"14984","6.774761","172.30.1.205","172.30.1.104","TCP","54","42568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"14985","6.775601","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14986","6.775650","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14987","6.775681","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14988","6.775711","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14989","6.775746","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14990","6.775773","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14991","6.775800","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14992","6.775828","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14993","6.775855","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14994","6.775882","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14995","6.775913","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14996","6.775981","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"14997","6.776032","172.30.1.104","172.30.1.205","TCP","54","49671 > 35162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14998","6.776049","172.30.1.104","172.30.1.205","TCP","54","49671 > 35162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"14999","6.776054","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15000","6.776076","172.30.1.104","172.30.1.205","TCP","54","49671 > 35166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15001","6.776083","172.30.1.104","172.30.1.205","TCP","54","49671 > 35170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15002","6.776110","172.30.1.104","172.30.1.205","TCP","54","49671 > 35166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15003","6.776115","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15004","6.776127","172.30.1.104","172.30.1.205","TCP","54","49671 > 35174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15005","6.776187","172.30.1.104","172.30.1.205","TCP","54","49671 > 35178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15006","6.776258","172.30.1.104","172.30.1.205","TCP","54","49671 > 35186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15007","6.776275","172.30.1.104","172.30.1.205","TCP","54","49671 > 35182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15008","6.776298","172.30.1.104","172.30.1.205","TCP","54","49671 > 35186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15009","6.776308","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15010","6.776330","172.30.1.104","172.30.1.205","TCP","54","49671 > 35182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15011","6.776334","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15012","6.776357","172.30.1.104","172.30.1.205","TCP","54","49671 > 35178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15013","6.776360","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15014","6.776377","172.30.1.104","172.30.1.205","TCP","54","49671 > 35174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15015","6.776380","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15016","6.776398","172.30.1.104","172.30.1.205","TCP","54","49671 > 35170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15017","6.776401","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15018","6.776421","172.30.1.104","172.30.1.205","TCP","54","49671 > 35190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15019","6.776442","172.30.1.104","172.30.1.205","TCP","54","49671 > 35194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15020","6.776461","172.30.1.104","172.30.1.205","TCP","54","49671 > 35198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15021","6.776479","172.30.1.104","172.30.1.205","TCP","54","49671 > 35202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15022","6.776499","172.30.1.104","172.30.1.205","TCP","54","49671 > 35202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15023","6.776503","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15024","6.776519","172.30.1.104","172.30.1.205","TCP","54","49671 > 35198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15025","6.776523","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15026","6.776540","172.30.1.104","172.30.1.205","TCP","54","49671 > 35190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15027","6.776543","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15028","6.776561","172.30.1.104","172.30.1.205","TCP","54","49671 > 35194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15029","6.776563","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15030","6.776583","172.30.1.104","172.30.1.205","TCP","54","49671 > 35158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15031","6.776794","172.30.1.104","172.30.1.205","TCP","54","49671 > 35158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15032","6.776800","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15033","6.777595","172.30.1.205","172.30.1.104","TCP","54","42568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15034","6.777705","172.30.1.205","172.30.1.104","TCP","74","35206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910004 TSecr=0 WS=128" +"15035","6.777850","172.30.1.104","172.30.1.205","TCP","54","135 > 42568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15036","6.777913","172.30.1.104","172.30.1.205","TCP","54","135 > 42568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15037","6.777918","172.30.1.205","172.30.1.104","TCP","54","42568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15038","6.777948","172.30.1.104","172.30.1.205","TCP","66","49671 > 35206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15039","6.777956","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15040","6.778301","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15041","6.778575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15042","6.778584","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15043","6.780465","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15044","6.780830","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15045","6.780837","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15046","6.782192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15047","6.783830","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15048","6.783841","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15049","6.784847","172.30.1.205","172.30.1.104","TCP","74","42572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910011 TSecr=0 WS=128" +"15050","6.785169","172.30.1.104","172.30.1.205","TCP","66","135 > 42572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15051","6.785180","172.30.1.205","172.30.1.104","TCP","54","42572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15052","6.785535","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15053","6.785808","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15054","6.785816","172.30.1.205","172.30.1.104","TCP","54","42572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15055","6.788039","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15056","6.788424","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15057","6.788431","172.30.1.205","172.30.1.104","TCP","54","42572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15058","6.790228","172.30.1.205","172.30.1.104","TCP","54","42572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15059","6.790336","172.30.1.205","172.30.1.104","TCP","74","35210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910016 TSecr=0 WS=128" +"15060","6.790505","172.30.1.104","172.30.1.205","TCP","54","135 > 42572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15061","6.790546","172.30.1.104","172.30.1.205","TCP","54","135 > 42572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15062","6.790551","172.30.1.205","172.30.1.104","TCP","54","42572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15063","6.790643","172.30.1.104","172.30.1.205","TCP","66","49671 > 35210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15064","6.790651","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15065","6.790990","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15066","6.791343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15067","6.791352","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15068","6.793240","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15069","6.793607","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15070","6.793613","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15071","6.794943","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15072","6.796520","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15073","6.796530","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15074","6.797471","172.30.1.205","172.30.1.104","TCP","74","42576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910023 TSecr=0 WS=128" +"15075","6.797758","172.30.1.104","172.30.1.205","TCP","66","135 > 42576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15076","6.797768","172.30.1.205","172.30.1.104","TCP","54","42576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15077","6.798117","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15078","6.798394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15079","6.798403","172.30.1.205","172.30.1.104","TCP","54","42576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15080","6.800584","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15081","6.801033","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15082","6.801046","172.30.1.205","172.30.1.104","TCP","54","42576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15083","6.802933","172.30.1.205","172.30.1.104","TCP","54","42576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15084","6.803060","172.30.1.205","172.30.1.104","TCP","74","35214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910029 TSecr=0 WS=128" +"15085","6.803206","172.30.1.104","172.30.1.205","TCP","54","135 > 42576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15086","6.803263","172.30.1.104","172.30.1.205","TCP","54","135 > 42576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15087","6.803269","172.30.1.205","172.30.1.104","TCP","54","42576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15088","6.803359","172.30.1.104","172.30.1.205","TCP","66","49671 > 35214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15089","6.803368","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15090","6.803735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15091","6.804014","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15092","6.804024","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15093","6.805948","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15094","6.806324","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15095","6.806331","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15096","6.807686","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15097","6.809391","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15098","6.809403","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15099","6.810354","172.30.1.205","172.30.1.104","TCP","74","42580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910036 TSecr=0 WS=128" +"15100","6.810660","172.30.1.104","172.30.1.205","TCP","66","135 > 42580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15101","6.810673","172.30.1.205","172.30.1.104","TCP","54","42580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15102","6.811038","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15103","6.811317","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15104","6.811326","172.30.1.205","172.30.1.104","TCP","54","42580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15105","6.813563","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15106","6.813917","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15107","6.813924","172.30.1.205","172.30.1.104","TCP","54","42580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15108","6.815754","172.30.1.205","172.30.1.104","TCP","54","42580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15109","6.815867","172.30.1.205","172.30.1.104","TCP","74","35218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910042 TSecr=0 WS=128" +"15110","6.815996","172.30.1.104","172.30.1.205","TCP","54","135 > 42580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15111","6.816030","172.30.1.104","172.30.1.205","TCP","54","135 > 42580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15112","6.816035","172.30.1.205","172.30.1.104","TCP","54","42580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15113","6.816124","172.30.1.104","172.30.1.205","TCP","66","49671 > 35218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15114","6.816132","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15115","6.816479","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15116","6.816747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15117","6.816757","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15118","6.818674","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15119","6.819015","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15120","6.819022","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15121","6.820396","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15122","6.821987","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15123","6.821996","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15124","6.822945","172.30.1.205","172.30.1.104","TCP","74","42584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910049 TSecr=0 WS=128" +"15125","6.823230","172.30.1.104","172.30.1.205","TCP","66","135 > 42584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15126","6.823240","172.30.1.205","172.30.1.104","TCP","54","42584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15127","6.823588","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15128","6.823907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15129","6.823917","172.30.1.205","172.30.1.104","TCP","54","42584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15130","6.826111","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15131","6.826535","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15132","6.826541","172.30.1.205","172.30.1.104","TCP","54","42584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15133","6.828350","172.30.1.205","172.30.1.104","TCP","54","42584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15134","6.828461","172.30.1.205","172.30.1.104","TCP","74","35222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910054 TSecr=0 WS=128" +"15135","6.828620","172.30.1.104","172.30.1.205","TCP","54","135 > 42584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15136","6.828652","172.30.1.104","172.30.1.205","TCP","54","135 > 42584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15137","6.828658","172.30.1.205","172.30.1.104","TCP","54","42584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15138","6.828732","172.30.1.104","172.30.1.205","TCP","66","49671 > 35222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15139","6.828740","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15140","6.829112","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15141","6.829411","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15142","6.829418","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15143","6.831275","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15144","6.831657","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15145","6.831663","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15146","6.833056","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15147","6.834701","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15148","6.834711","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15149","6.835638","172.30.1.205","172.30.1.104","TCP","74","42588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910062 TSecr=0 WS=128" +"15150","6.835920","172.30.1.104","172.30.1.205","TCP","66","135 > 42588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15151","6.835930","172.30.1.205","172.30.1.104","TCP","54","42588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15152","6.836291","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15153","6.836567","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15154","6.836581","172.30.1.205","172.30.1.104","TCP","54","42588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15155","6.838884","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15156","6.839269","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15157","6.839277","172.30.1.205","172.30.1.104","TCP","54","42588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15158","6.841156","172.30.1.205","172.30.1.104","TCP","54","42588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15159","6.841283","172.30.1.205","172.30.1.104","TCP","74","35226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910067 TSecr=0 WS=128" +"15160","6.841434","172.30.1.104","172.30.1.205","TCP","54","135 > 42588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15161","6.841443","172.30.1.104","172.30.1.205","TCP","54","135 > 42588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15162","6.841448","172.30.1.205","172.30.1.104","TCP","54","42588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15163","6.841546","172.30.1.104","172.30.1.205","TCP","66","49671 > 35226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15164","6.841558","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15165","6.841908","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15166","6.842171","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15167","6.842180","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15168","6.844076","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15169","6.844424","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15170","6.844430","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15171","6.845817","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15172","6.847414","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15173","6.847425","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15174","6.848403","172.30.1.205","172.30.1.104","TCP","74","42592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910074 TSecr=0 WS=128" +"15175","6.848698","172.30.1.104","172.30.1.205","TCP","66","135 > 42592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15176","6.848709","172.30.1.205","172.30.1.104","TCP","54","42592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15177","6.849088","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15178","6.849362","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15179","6.849371","172.30.1.205","172.30.1.104","TCP","54","42592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15180","6.851576","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15181","6.851954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15182","6.851960","172.30.1.205","172.30.1.104","TCP","54","42592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15183","6.853809","172.30.1.205","172.30.1.104","TCP","54","42592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15184","6.853922","172.30.1.205","172.30.1.104","TCP","74","35230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910080 TSecr=0 WS=128" +"15185","6.854073","172.30.1.104","172.30.1.205","TCP","54","135 > 42592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15186","6.854083","172.30.1.104","172.30.1.205","TCP","54","135 > 42592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15187","6.854088","172.30.1.205","172.30.1.104","TCP","54","42592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15188","6.854235","172.30.1.104","172.30.1.205","TCP","66","49671 > 35230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15189","6.854244","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15190","6.854594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15191","6.854883","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15192","6.854892","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15193","6.856802","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15194","6.857160","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15195","6.857167","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15196","6.858531","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15197","6.860151","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15198","6.860161","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15199","6.861156","172.30.1.205","172.30.1.104","TCP","74","42596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910087 TSecr=0 WS=128" +"15200","6.861444","172.30.1.104","172.30.1.205","TCP","66","135 > 42596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15201","6.861455","172.30.1.205","172.30.1.104","TCP","54","42596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15202","6.861806","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15203","6.862082","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15204","6.862091","172.30.1.205","172.30.1.104","TCP","54","42596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15205","6.864315","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15206","6.864693","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15207","6.864700","172.30.1.205","172.30.1.104","TCP","54","42596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15208","6.866550","172.30.1.205","172.30.1.104","TCP","54","42596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15209","6.866676","172.30.1.205","172.30.1.104","TCP","74","35234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910093 TSecr=0 WS=128" +"15210","6.866804","172.30.1.104","172.30.1.205","TCP","54","135 > 42596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15211","6.866815","172.30.1.104","172.30.1.205","TCP","54","135 > 42596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15212","6.866821","172.30.1.205","172.30.1.104","TCP","54","42596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15213","6.866962","172.30.1.104","172.30.1.205","TCP","66","49671 > 35234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15214","6.866970","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15215","6.867315","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15216","6.867586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15217","6.867595","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15218","6.869521","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15219","6.871126","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15220","6.871139","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15221","6.872596","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15222","6.874223","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15223","6.874235","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15224","6.875250","172.30.1.205","172.30.1.104","TCP","74","42600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910101 TSecr=0 WS=128" +"15225","6.875536","172.30.1.104","172.30.1.205","TCP","66","135 > 42600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15226","6.875548","172.30.1.205","172.30.1.104","TCP","54","42600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15227","6.875910","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15228","6.876324","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15229","6.876333","172.30.1.205","172.30.1.104","TCP","54","42600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15230","6.878578","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15231","6.878958","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15232","6.878965","172.30.1.205","172.30.1.104","TCP","54","42600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15233","6.880809","172.30.1.205","172.30.1.104","TCP","54","42600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15234","6.880927","172.30.1.205","172.30.1.104","TCP","74","35238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910107 TSecr=0 WS=128" +"15235","6.881095","172.30.1.104","172.30.1.205","TCP","54","135 > 42600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15236","6.881106","172.30.1.104","172.30.1.205","TCP","54","135 > 42600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15237","6.881112","172.30.1.205","172.30.1.104","TCP","54","42600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15238","6.881196","172.30.1.104","172.30.1.205","TCP","66","49671 > 35238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15239","6.881204","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15240","6.881550","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15241","6.881854","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15242","6.881861","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15243","6.883721","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15244","6.884067","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15245","6.884074","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15246","6.885465","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15247","6.887132","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15248","6.887142","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15249","6.888096","172.30.1.205","172.30.1.104","TCP","74","42604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910114 TSecr=0 WS=128" +"15250","6.888374","172.30.1.104","172.30.1.205","TCP","66","135 > 42604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15251","6.888384","172.30.1.205","172.30.1.104","TCP","54","42604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15252","6.888734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15253","6.888999","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15254","6.889009","172.30.1.205","172.30.1.104","TCP","54","42604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15255","6.891204","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15256","6.891571","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15257","6.891578","172.30.1.205","172.30.1.104","TCP","54","42604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15258","6.893421","172.30.1.205","172.30.1.104","TCP","54","42604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15259","6.893536","172.30.1.205","172.30.1.104","TCP","74","35242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910119 TSecr=0 WS=128" +"15260","6.893678","172.30.1.104","172.30.1.205","TCP","54","135 > 42604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15261","6.893714","172.30.1.104","172.30.1.205","TCP","54","135 > 42604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15262","6.893720","172.30.1.205","172.30.1.104","TCP","54","42604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15263","6.893824","172.30.1.104","172.30.1.205","TCP","66","49671 > 35242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15264","6.893832","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15265","6.894179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15266","6.894455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15267","6.894464","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15268","6.896347","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15269","6.896731","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15270","6.896741","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15271","6.898199","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15272","6.900258","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15273","6.900270","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15274","6.901287","172.30.1.205","172.30.1.104","TCP","74","42608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910127 TSecr=0 WS=128" +"15275","6.901591","172.30.1.104","172.30.1.205","TCP","66","135 > 42608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15276","6.901602","172.30.1.205","172.30.1.104","TCP","54","42608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15277","6.901952","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15278","6.902328","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15279","6.902337","172.30.1.205","172.30.1.104","TCP","54","42608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15280","6.904532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15281","6.904907","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15282","6.904914","172.30.1.205","172.30.1.104","TCP","54","42608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15283","6.906730","172.30.1.205","172.30.1.104","TCP","54","42608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15284","6.906842","172.30.1.205","172.30.1.104","TCP","74","35246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910133 TSecr=0 WS=128" +"15285","6.906991","172.30.1.104","172.30.1.205","TCP","54","135 > 42608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15286","6.907000","172.30.1.104","172.30.1.205","TCP","54","135 > 42608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15287","6.907006","172.30.1.205","172.30.1.104","TCP","54","42608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15288","6.907078","172.30.1.104","172.30.1.205","TCP","66","49671 > 35246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15289","6.907087","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15290","6.907432","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15291","6.907707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15292","6.907716","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15293","6.909626","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15294","6.910007","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15295","6.910013","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15296","6.911349","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15297","6.913432","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15298","6.913441","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15299","6.914385","172.30.1.205","172.30.1.104","TCP","74","42612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910140 TSecr=0 WS=128" +"15300","6.914698","172.30.1.104","172.30.1.205","TCP","66","135 > 42612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15301","6.914709","172.30.1.205","172.30.1.104","TCP","54","42612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15302","6.915058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15303","6.915350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15304","6.915359","172.30.1.205","172.30.1.104","TCP","54","42612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15305","6.917568","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15306","6.918034","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15307","6.918041","172.30.1.205","172.30.1.104","TCP","54","42612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15308","6.919867","172.30.1.205","172.30.1.104","TCP","54","42612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15309","6.919976","172.30.1.205","172.30.1.104","TCP","74","35250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910146 TSecr=0 WS=128" +"15310","6.920119","172.30.1.104","172.30.1.205","TCP","54","135 > 42612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15311","6.920170","172.30.1.104","172.30.1.205","TCP","54","135 > 42612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15312","6.920175","172.30.1.205","172.30.1.104","TCP","54","42612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15313","6.920240","172.30.1.104","172.30.1.205","TCP","66","49671 > 35250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15314","6.920248","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15315","6.920619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15316","6.920906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15317","6.920915","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15318","6.922784","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15319","6.923132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15320","6.923138","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15321","6.924523","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15322","6.926133","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15323","6.926142","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15324","6.927085","172.30.1.205","172.30.1.104","TCP","74","42616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910153 TSecr=0 WS=128" +"15325","6.927369","172.30.1.104","172.30.1.205","TCP","66","135 > 42616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15326","6.927379","172.30.1.205","172.30.1.104","TCP","54","42616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15327","6.927739","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15328","6.928039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15329","6.928052","172.30.1.205","172.30.1.104","TCP","54","42616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15330","6.930330","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15331","6.930730","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15332","6.930737","172.30.1.205","172.30.1.104","TCP","54","42616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15333","6.931590","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15334","6.931639","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15335","6.931670","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15336","6.931703","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15337","6.931736","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15338","6.931763","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15339","6.931790","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15340","6.931817","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15341","6.931839","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15342","6.931859","172.30.1.104","172.30.1.205","TCP","54","49671 > 35210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15343","6.931888","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15344","6.931912","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15345","6.931933","172.30.1.104","172.30.1.205","TCP","54","49671 > 35214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15346","6.931957","172.30.1.104","172.30.1.205","TCP","54","49671 > 35218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15347","6.931984","172.30.1.104","172.30.1.205","TCP","54","49671 > 35210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15348","6.931991","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15349","6.932031","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15350","6.932108","172.30.1.104","172.30.1.205","TCP","54","49671 > 35222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15351","6.932130","172.30.1.104","172.30.1.205","TCP","54","49671 > 35226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15352","6.932157","172.30.1.104","172.30.1.205","TCP","54","49671 > 35214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15353","6.932163","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15354","6.932184","172.30.1.104","172.30.1.205","TCP","54","49671 > 35226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15355","6.932187","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15356","6.932211","172.30.1.104","172.30.1.205","TCP","54","49671 > 35218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15357","6.932214","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15358","6.932237","172.30.1.104","172.30.1.205","TCP","54","49671 > 35222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15359","6.932240","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15360","6.932273","172.30.1.104","172.30.1.205","TCP","54","49671 > 35230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15361","6.932300","172.30.1.104","172.30.1.205","TCP","54","49671 > 35234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15362","6.932327","172.30.1.104","172.30.1.205","TCP","54","49671 > 35238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15363","6.932353","172.30.1.104","172.30.1.205","TCP","54","49671 > 35230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15364","6.932358","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15365","6.932379","172.30.1.104","172.30.1.205","TCP","54","49671 > 35242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15366","6.932406","172.30.1.104","172.30.1.205","TCP","54","49671 > 35242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15367","6.932410","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15368","6.932432","172.30.1.104","172.30.1.205","TCP","54","49671 > 35234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15369","6.932435","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15370","6.932470","172.30.1.104","172.30.1.205","TCP","54","49671 > 35238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15371","6.932474","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15372","6.932494","172.30.1.104","172.30.1.205","TCP","54","49671 > 35246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15373","6.932515","172.30.1.104","172.30.1.205","TCP","54","49671 > 35250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15374","6.932535","172.30.1.104","172.30.1.205","TCP","54","49671 > 35246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15375","6.932540","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15376","6.932555","172.30.1.104","172.30.1.205","TCP","54","49671 > 35250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15377","6.932559","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15378","6.932961","172.30.1.104","172.30.1.205","TCP","54","49671 > 35206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15379","6.932980","172.30.1.104","172.30.1.205","TCP","54","49671 > 35206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15380","6.932985","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15381","6.933623","172.30.1.205","172.30.1.104","TCP","54","42616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15382","6.933754","172.30.1.205","172.30.1.104","TCP","74","35254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910160 TSecr=0 WS=128" +"15383","6.933958","172.30.1.104","172.30.1.205","TCP","54","135 > 42616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15384","6.933966","172.30.1.104","172.30.1.205","TCP","54","135 > 42616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15385","6.933970","172.30.1.205","172.30.1.104","TCP","54","42616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15386","6.934050","172.30.1.104","172.30.1.205","TCP","66","49671 > 35254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15387","6.934058","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15388","6.934416","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15389","6.934811","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15390","6.934820","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15391","6.936683","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15392","6.937037","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15393","6.937043","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15394","6.938410","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15395","6.940013","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15396","6.940022","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15397","6.940993","172.30.1.205","172.30.1.104","TCP","74","42620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910167 TSecr=0 WS=128" +"15398","6.941286","172.30.1.104","172.30.1.205","TCP","66","135 > 42620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15399","6.941297","172.30.1.205","172.30.1.104","TCP","54","42620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15400","6.941651","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15401","6.941938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15402","6.941947","172.30.1.205","172.30.1.104","TCP","54","42620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15403","6.944125","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15404","6.944503","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15405","6.944510","172.30.1.205","172.30.1.104","TCP","54","42620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15406","6.946341","172.30.1.205","172.30.1.104","TCP","54","42620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15407","6.946456","172.30.1.205","172.30.1.104","TCP","74","35258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910172 TSecr=0 WS=128" +"15408","6.946613","172.30.1.104","172.30.1.205","TCP","54","135 > 42620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15409","6.946624","172.30.1.104","172.30.1.205","TCP","54","135 > 42620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15410","6.946630","172.30.1.205","172.30.1.104","TCP","54","42620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15411","6.946742","172.30.1.104","172.30.1.205","TCP","66","49671 > 35258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15412","6.946753","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15413","6.947107","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15414","6.947391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15415","6.947398","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15416","6.949301","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15417","6.949660","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15418","6.949666","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15419","6.951013","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15420","6.952603","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15421","6.952614","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15422","6.953581","172.30.1.205","172.30.1.104","TCP","74","42624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910180 TSecr=0 WS=128" +"15423","6.953868","172.30.1.104","172.30.1.205","TCP","66","135 > 42624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15424","6.953882","172.30.1.205","172.30.1.104","TCP","54","42624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15425","6.954231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15426","6.954497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15427","6.954506","172.30.1.205","172.30.1.104","TCP","54","42624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15428","6.956713","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15429","6.957080","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15430","6.957091","172.30.1.205","172.30.1.104","TCP","54","42624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15431","6.958921","172.30.1.205","172.30.1.104","TCP","54","42624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15432","6.959035","172.30.1.205","172.30.1.104","TCP","74","35262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910185 TSecr=0 WS=128" +"15433","6.959181","172.30.1.104","172.30.1.205","TCP","54","135 > 42624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15434","6.959195","172.30.1.104","172.30.1.205","TCP","54","135 > 42624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15435","6.959201","172.30.1.205","172.30.1.104","TCP","54","42624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15436","6.959280","172.30.1.104","172.30.1.205","TCP","66","49671 > 35262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15437","6.959289","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15438","6.959636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15439","6.959896","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15440","6.959904","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15441","6.961828","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15442","6.964208","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15443","6.964215","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15444","6.965616","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15445","6.967242","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15446","6.967251","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15447","6.968192","172.30.1.205","172.30.1.104","TCP","74","42628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910194 TSecr=0 WS=128" +"15448","6.968513","172.30.1.104","172.30.1.205","TCP","66","135 > 42628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15449","6.968524","172.30.1.205","172.30.1.104","TCP","54","42628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15450","6.968902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15451","6.969170","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15452","6.969179","172.30.1.205","172.30.1.104","TCP","54","42628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15453","6.971376","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15454","6.971782","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15455","6.971791","172.30.1.205","172.30.1.104","TCP","54","42628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15456","6.973712","172.30.1.205","172.30.1.104","TCP","54","42628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15457","6.973841","172.30.1.205","172.30.1.104","TCP","74","35266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910200 TSecr=0 WS=128" +"15458","6.973971","172.30.1.104","172.30.1.205","TCP","54","135 > 42628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15459","6.973983","172.30.1.104","172.30.1.205","TCP","54","135 > 42628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15460","6.973989","172.30.1.205","172.30.1.104","TCP","54","42628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15461","6.974112","172.30.1.104","172.30.1.205","TCP","66","49671 > 35266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15462","6.974121","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15463","6.974482","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15464","6.974790","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15465","6.974801","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15466","6.976709","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15467","6.977065","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15468","6.977072","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15469","6.978436","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15470","6.980061","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15471","6.980071","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15472","6.981045","172.30.1.205","172.30.1.104","TCP","74","42632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910207 TSecr=0 WS=128" +"15473","6.981320","172.30.1.104","172.30.1.205","TCP","66","135 > 42632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15474","6.981331","172.30.1.205","172.30.1.104","TCP","54","42632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15475","6.981682","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15476","6.981973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15477","6.981982","172.30.1.205","172.30.1.104","TCP","54","42632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15478","6.984169","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15479","6.984539","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15480","6.984547","172.30.1.205","172.30.1.104","TCP","54","42632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15481","6.986393","172.30.1.205","172.30.1.104","TCP","54","42632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15482","6.986506","172.30.1.205","172.30.1.104","TCP","74","35270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910212 TSecr=0 WS=128" +"15483","6.986660","172.30.1.104","172.30.1.205","TCP","54","135 > 42632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15484","6.986760","172.30.1.104","172.30.1.205","TCP","66","49671 > 35270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15485","6.986770","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15486","6.987075","172.30.1.104","172.30.1.205","TCP","54","135 > 42632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15487","6.987082","172.30.1.205","172.30.1.104","TCP","54","42632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15488","6.987145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15489","6.987401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15490","6.987410","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15491","6.989339","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15492","6.989678","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15493","6.989685","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15494","6.991038","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15495","6.992866","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15496","6.992883","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15497","6.993840","172.30.1.205","172.30.1.104","TCP","74","42636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910220 TSecr=0 WS=128" +"15498","6.994146","172.30.1.104","172.30.1.205","TCP","66","135 > 42636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15499","6.994156","172.30.1.205","172.30.1.104","TCP","54","42636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15500","6.994513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15501","6.994838","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15502","6.994847","172.30.1.205","172.30.1.104","TCP","54","42636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15503","6.997054","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15504","6.997466","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15505","6.997473","172.30.1.205","172.30.1.104","TCP","54","42636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15506","6.999327","172.30.1.205","172.30.1.104","TCP","54","42636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15507","6.999450","172.30.1.205","172.30.1.104","TCP","74","35274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910225 TSecr=0 WS=128" +"15508","6.999619","172.30.1.104","172.30.1.205","TCP","54","135 > 42636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15509","6.999658","172.30.1.104","172.30.1.205","TCP","54","135 > 42636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15510","6.999663","172.30.1.205","172.30.1.104","TCP","54","42636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15511","6.999743","172.30.1.104","172.30.1.205","TCP","66","49671 > 35274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15512","6.999751","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15513","7.000096","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15514","7.000399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15515","7.000408","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15516","7.002330","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15517","7.002686","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15518","7.002692","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15519","7.004063","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15520","7.005699","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15521","7.005709","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15522","7.006655","172.30.1.205","172.30.1.104","TCP","74","42640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910233 TSecr=0 WS=128" +"15523","7.006944","172.30.1.104","172.30.1.205","TCP","66","135 > 42640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15524","7.006955","172.30.1.205","172.30.1.104","TCP","54","42640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15525","7.007299","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15526","7.007655","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15527","7.007664","172.30.1.205","172.30.1.104","TCP","54","42640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15528","7.009877","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15529","7.010253","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15530","7.010261","172.30.1.205","172.30.1.104","TCP","54","42640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15531","7.012101","172.30.1.205","172.30.1.104","TCP","54","42640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15532","7.012256","172.30.1.205","172.30.1.104","TCP","74","35278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910238 TSecr=0 WS=128" +"15533","7.012383","172.30.1.104","172.30.1.205","TCP","54","135 > 42640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15534","7.012437","172.30.1.104","172.30.1.205","TCP","54","135 > 42640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15535","7.012445","172.30.1.205","172.30.1.104","TCP","54","42640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15536","7.012569","172.30.1.104","172.30.1.205","TCP","66","49671 > 35278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15537","7.012578","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15538","7.012965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15539","7.013251","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15540","7.013261","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15541","7.015155","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15542","7.015512","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15543","7.015517","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15544","7.016912","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15545","7.018563","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15546","7.018578","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15547","7.019660","172.30.1.205","172.30.1.104","TCP","74","42644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910246 TSecr=0 WS=128" +"15548","7.020001","172.30.1.104","172.30.1.205","TCP","66","135 > 42644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15549","7.020022","172.30.1.205","172.30.1.104","TCP","54","42644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15550","7.020405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15551","7.020710","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15552","7.020722","172.30.1.205","172.30.1.104","TCP","54","42644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15553","7.022992","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15554","7.023365","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15555","7.023372","172.30.1.205","172.30.1.104","TCP","54","42644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15556","7.025218","172.30.1.205","172.30.1.104","TCP","54","42644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15557","7.025338","172.30.1.205","172.30.1.104","TCP","74","35282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910251 TSecr=0 WS=128" +"15558","7.025489","172.30.1.104","172.30.1.205","TCP","54","135 > 42644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15559","7.025514","172.30.1.104","172.30.1.205","TCP","54","135 > 42644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15560","7.025521","172.30.1.205","172.30.1.104","TCP","54","42644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15561","7.025630","172.30.1.104","172.30.1.205","TCP","66","49671 > 35282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15562","7.025639","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15563","7.025981","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15564","7.026307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15565","7.026316","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15566","7.028172","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15567","7.028506","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15568","7.028512","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15569","7.029908","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15570","7.031459","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15571","7.031477","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15572","7.032568","172.30.1.205","172.30.1.104","TCP","74","42648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910258 TSecr=0 WS=128" +"15573","7.032866","172.30.1.104","172.30.1.205","TCP","66","135 > 42648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15574","7.032877","172.30.1.205","172.30.1.104","TCP","54","42648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15575","7.033240","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15576","7.033527","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15577","7.033545","172.30.1.205","172.30.1.104","TCP","54","42648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15578","7.035960","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15579","7.036304","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15580","7.036311","172.30.1.205","172.30.1.104","TCP","54","42648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15581","7.038133","172.30.1.205","172.30.1.104","TCP","54","42648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15582","7.038243","172.30.1.205","172.30.1.104","TCP","74","35286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910264 TSecr=0 WS=128" +"15583","7.038398","172.30.1.104","172.30.1.205","TCP","54","135 > 42648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15584","7.038436","172.30.1.104","172.30.1.205","TCP","54","135 > 42648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15585","7.038441","172.30.1.205","172.30.1.104","TCP","54","42648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15586","7.038527","172.30.1.104","172.30.1.205","TCP","66","49671 > 35286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15587","7.038536","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15588","7.038886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15589","7.039178","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15590","7.039187","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15591","7.041086","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15592","7.041453","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15593","7.041461","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15594","7.042816","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15595","7.044454","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15596","7.044465","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15597","7.045444","172.30.1.205","172.30.1.104","TCP","74","42652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910271 TSecr=0 WS=128" +"15598","7.045763","172.30.1.104","172.30.1.205","TCP","66","135 > 42652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15599","7.045778","172.30.1.205","172.30.1.104","TCP","54","42652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15600","7.046164","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15601","7.046435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15602","7.046445","172.30.1.205","172.30.1.104","TCP","54","42652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15603","7.048678","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15604","7.049067","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15605","7.049074","172.30.1.205","172.30.1.104","TCP","54","42652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15606","7.050893","172.30.1.205","172.30.1.104","TCP","54","42652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15607","7.051009","172.30.1.205","172.30.1.104","TCP","74","35290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910277 TSecr=0 WS=128" +"15608","7.051174","172.30.1.104","172.30.1.205","TCP","54","135 > 42652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15609","7.051184","172.30.1.104","172.30.1.205","TCP","54","135 > 42652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15610","7.051190","172.30.1.205","172.30.1.104","TCP","54","42652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15611","7.051272","172.30.1.104","172.30.1.205","TCP","66","49671 > 35290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15612","7.051281","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15613","7.051622","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15614","7.051957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15615","7.051965","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15616","7.053847","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15617","7.054228","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15618","7.054232","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15619","7.055567","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15620","7.057183","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15621","7.057202","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15622","7.058249","172.30.1.205","172.30.1.104","TCP","74","42656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910284 TSecr=0 WS=128" +"15623","7.058571","172.30.1.104","172.30.1.205","TCP","66","135 > 42656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15624","7.058592","172.30.1.205","172.30.1.104","TCP","54","42656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15625","7.059175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15626","7.059466","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15627","7.059475","172.30.1.205","172.30.1.104","TCP","54","42656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15628","7.061697","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15629","7.062101","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15630","7.062108","172.30.1.205","172.30.1.104","TCP","54","42656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15631","7.063929","172.30.1.205","172.30.1.104","TCP","54","42656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15632","7.064038","172.30.1.205","172.30.1.104","TCP","74","35294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910290 TSecr=0 WS=128" +"15633","7.064264","172.30.1.104","172.30.1.205","TCP","54","135 > 42656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15634","7.064274","172.30.1.104","172.30.1.205","TCP","54","135 > 42656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15635","7.064279","172.30.1.205","172.30.1.104","TCP","54","42656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15636","7.064389","172.30.1.104","172.30.1.205","TCP","66","49671 > 35294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15637","7.064397","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15638","7.064743","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15639","7.065035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15640","7.065044","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15641","7.066903","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15642","7.067265","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15643","7.067271","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15644","7.068624","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15645","7.070296","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15646","7.070305","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15647","7.071238","172.30.1.205","172.30.1.104","TCP","74","42660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910297 TSecr=0 WS=128" +"15648","7.071538","172.30.1.104","172.30.1.205","TCP","66","135 > 42660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15649","7.071559","172.30.1.205","172.30.1.104","TCP","54","42660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15650","7.072126","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15651","7.072412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15652","7.072421","172.30.1.205","172.30.1.104","TCP","54","42660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15653","7.074623","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15654","7.075051","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15655","7.075058","172.30.1.205","172.30.1.104","TCP","54","42660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15656","7.076866","172.30.1.205","172.30.1.104","TCP","54","42660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15657","7.076974","172.30.1.205","172.30.1.104","TCP","74","35298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910303 TSecr=0 WS=128" +"15658","7.077129","172.30.1.104","172.30.1.205","TCP","54","135 > 42660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15659","7.077191","172.30.1.104","172.30.1.205","TCP","54","135 > 42660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15660","7.077197","172.30.1.205","172.30.1.104","TCP","54","42660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15661","7.077270","172.30.1.104","172.30.1.205","TCP","66","49671 > 35298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15662","7.077277","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15663","7.077614","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15664","7.077899","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15665","7.077907","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15666","7.079762","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15667","7.080118","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15668","7.080124","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15669","7.081488","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15670","7.083203","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15671","7.083212","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15672","7.084137","172.30.1.205","172.30.1.104","TCP","74","42664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910310 TSecr=0 WS=128" +"15673","7.084478","172.30.1.104","172.30.1.205","TCP","66","135 > 42664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15674","7.084502","172.30.1.205","172.30.1.104","TCP","54","42664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15675","7.085078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15676","7.085366","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15677","7.085375","172.30.1.205","172.30.1.104","TCP","54","42664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15678","7.087560","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15679","7.087951","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15680","7.087958","172.30.1.205","172.30.1.104","TCP","54","42664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15681","7.088826","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15682","7.088874","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15683","7.088911","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15684","7.088943","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15685","7.088975","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15686","7.089002","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15687","7.089034","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15688","7.089067","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15689","7.089099","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15690","7.089126","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15691","7.089157","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15692","7.089184","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15693","7.089221","172.30.1.104","172.30.1.205","TCP","54","49671 > 35254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15694","7.089240","172.30.1.104","172.30.1.205","TCP","54","49671 > 35258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15695","7.089259","172.30.1.104","172.30.1.205","TCP","54","49671 > 35262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15696","7.089280","172.30.1.104","172.30.1.205","TCP","54","49671 > 35258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15697","7.089286","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15698","7.089300","172.30.1.104","172.30.1.205","TCP","54","49671 > 35266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15699","7.089320","172.30.1.104","172.30.1.205","TCP","54","49671 > 35270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15700","7.089340","172.30.1.104","172.30.1.205","TCP","54","49671 > 35254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15701","7.089344","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15702","7.089407","172.30.1.104","172.30.1.205","TCP","54","49671 > 35274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15703","7.089628","172.30.1.104","172.30.1.205","TCP","54","49671 > 35278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15704","7.089646","172.30.1.104","172.30.1.205","TCP","54","49671 > 35278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15705","7.089652","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15706","7.089667","172.30.1.104","172.30.1.205","TCP","54","49671 > 35274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15707","7.089669","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15708","7.089690","172.30.1.104","172.30.1.205","TCP","54","49671 > 35270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15709","7.089693","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15710","7.089710","172.30.1.104","172.30.1.205","TCP","54","49671 > 35266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15711","7.089713","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15712","7.089731","172.30.1.104","172.30.1.205","TCP","54","49671 > 35262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15713","7.089733","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15714","7.089752","172.30.1.104","172.30.1.205","TCP","54","49671 > 35282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15715","7.089771","172.30.1.104","172.30.1.205","TCP","54","49671 > 35286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15716","7.089791","172.30.1.104","172.30.1.205","TCP","54","49671 > 35282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15717","7.089794","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15718","7.089811","172.30.1.104","172.30.1.205","TCP","54","49671 > 35290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15719","7.089831","172.30.1.104","172.30.1.205","TCP","54","49671 > 35294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15720","7.089852","172.30.1.104","172.30.1.205","TCP","54","49671 > 35298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15721","7.089873","172.30.1.104","172.30.1.205","TCP","54","49671 > 35294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15722","7.089876","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15723","7.089893","172.30.1.104","172.30.1.205","TCP","54","49671 > 35298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15724","7.089896","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15725","7.089912","172.30.1.104","172.30.1.205","TCP","54","49671 > 35286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15726","7.089915","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15727","7.089933","172.30.1.104","172.30.1.205","TCP","54","49671 > 35290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"15728","7.089936","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"15729","7.090828","172.30.1.205","172.30.1.104","TCP","54","42664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15730","7.090937","172.30.1.205","172.30.1.104","TCP","74","35302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910317 TSecr=0 WS=128" +"15731","7.091079","172.30.1.104","172.30.1.205","TCP","54","135 > 42664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15732","7.091099","172.30.1.104","172.30.1.205","TCP","54","135 > 42664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15733","7.091104","172.30.1.205","172.30.1.104","TCP","54","42664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15734","7.091227","172.30.1.104","172.30.1.205","TCP","66","49671 > 35302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15735","7.091235","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15736","7.091596","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15737","7.091875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15738","7.091883","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15739","7.093817","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15740","7.094160","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15741","7.094166","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15742","7.095505","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15743","7.097252","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15744","7.097261","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15745","7.098189","172.30.1.205","172.30.1.104","TCP","74","42668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910324 TSecr=0 WS=128" +"15746","7.098489","172.30.1.104","172.30.1.205","TCP","66","135 > 42668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15747","7.098499","172.30.1.205","172.30.1.104","TCP","54","42668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15748","7.098844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15749","7.099129","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15750","7.099137","172.30.1.205","172.30.1.104","TCP","54","42668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15751","7.101346","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15752","7.101769","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15753","7.101775","172.30.1.205","172.30.1.104","TCP","54","42668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15754","7.103576","172.30.1.205","172.30.1.104","TCP","54","42668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15755","7.103687","172.30.1.205","172.30.1.104","TCP","74","35306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910330 TSecr=0 WS=128" +"15756","7.103841","172.30.1.104","172.30.1.205","TCP","54","135 > 42668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15757","7.103862","172.30.1.104","172.30.1.205","TCP","54","135 > 42668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15758","7.103867","172.30.1.205","172.30.1.104","TCP","54","42668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15759","7.103948","172.30.1.104","172.30.1.205","TCP","66","49671 > 35306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15760","7.103956","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15761","7.104295","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15762","7.104573","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15763","7.104579","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15764","7.106447","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15765","7.107872","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15766","7.107879","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15767","7.109240","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15768","7.110975","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15769","7.110986","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15770","7.111916","172.30.1.205","172.30.1.104","TCP","74","42672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910338 TSecr=0 WS=128" +"15771","7.112225","172.30.1.104","172.30.1.205","TCP","66","135 > 42672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15772","7.112236","172.30.1.205","172.30.1.104","TCP","54","42672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15773","7.112581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15774","7.112867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15775","7.112876","172.30.1.205","172.30.1.104","TCP","54","42672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15776","7.115064","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15777","7.115463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15778","7.115470","172.30.1.205","172.30.1.104","TCP","54","42672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15779","7.117300","172.30.1.205","172.30.1.104","TCP","54","42672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15780","7.117408","172.30.1.205","172.30.1.104","TCP","74","35310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910343 TSecr=0 WS=128" +"15781","7.117583","172.30.1.104","172.30.1.205","TCP","54","135 > 42672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15782","7.117619","172.30.1.104","172.30.1.205","TCP","54","135 > 42672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15783","7.117625","172.30.1.205","172.30.1.104","TCP","54","42672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15784","7.117707","172.30.1.104","172.30.1.205","TCP","66","49671 > 35310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15785","7.117715","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15786","7.118054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15787","7.118350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15788","7.118357","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15789","7.120209","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15790","7.120589","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15791","7.120600","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15792","7.122101","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15793","7.123767","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15794","7.123776","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15795","7.124697","172.30.1.205","172.30.1.104","TCP","74","42676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910351 TSecr=0 WS=128" +"15796","7.125010","172.30.1.104","172.30.1.205","TCP","66","135 > 42676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15797","7.125020","172.30.1.205","172.30.1.104","TCP","54","42676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15798","7.125373","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15799","7.125665","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15800","7.125674","172.30.1.205","172.30.1.104","TCP","54","42676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15801","7.127849","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15802","7.128246","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15803","7.128252","172.30.1.205","172.30.1.104","TCP","54","42676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15804","7.130086","172.30.1.205","172.30.1.104","TCP","54","42676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15805","7.130195","172.30.1.205","172.30.1.104","TCP","74","35314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910356 TSecr=0 WS=128" +"15806","7.130349","172.30.1.104","172.30.1.205","TCP","54","135 > 42676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15807","7.130380","172.30.1.104","172.30.1.205","TCP","54","135 > 42676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15808","7.130385","172.30.1.205","172.30.1.104","TCP","54","42676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15809","7.130458","172.30.1.104","172.30.1.205","TCP","66","49671 > 35314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15810","7.130466","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15811","7.130810","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15812","7.131112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15813","7.131122","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15814","7.133053","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15815","7.133448","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15816","7.133454","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15817","7.134801","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15818","7.136492","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15819","7.136501","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15820","7.137449","172.30.1.205","172.30.1.104","TCP","74","42680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910363 TSecr=0 WS=128" +"15821","7.137734","172.30.1.104","172.30.1.205","TCP","66","135 > 42680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15822","7.137744","172.30.1.205","172.30.1.104","TCP","54","42680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15823","7.138086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15824","7.138372","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15825","7.138380","172.30.1.205","172.30.1.104","TCP","54","42680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15826","7.140532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15827","7.140911","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15828","7.140918","172.30.1.205","172.30.1.104","TCP","54","42680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15829","7.142722","172.30.1.205","172.30.1.104","TCP","54","42680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15830","7.142832","172.30.1.205","172.30.1.104","TCP","74","35318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910369 TSecr=0 WS=128" +"15831","7.143001","172.30.1.104","172.30.1.205","TCP","54","135 > 42680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15832","7.143022","172.30.1.104","172.30.1.205","TCP","54","135 > 42680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15833","7.143027","172.30.1.205","172.30.1.104","TCP","54","42680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15834","7.143108","172.30.1.104","172.30.1.205","TCP","66","49671 > 35318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15835","7.143116","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15836","7.143457","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15837","7.143766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15838","7.143775","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15839","7.145673","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15840","7.146026","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15841","7.146031","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15842","7.147363","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15843","7.149057","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15844","7.149066","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15845","7.150002","172.30.1.205","172.30.1.104","TCP","74","42684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910376 TSecr=0 WS=128" +"15846","7.150310","172.30.1.104","172.30.1.205","TCP","66","135 > 42684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15847","7.150321","172.30.1.205","172.30.1.104","TCP","54","42684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15848","7.150667","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15849","7.150943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15850","7.150952","172.30.1.205","172.30.1.104","TCP","54","42684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15851","7.153157","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15852","7.153535","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15853","7.153547","172.30.1.205","172.30.1.104","TCP","54","42684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15854","7.155602","172.30.1.205","172.30.1.104","TCP","54","42684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15855","7.155714","172.30.1.205","172.30.1.104","TCP","74","35322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910382 TSecr=0 WS=128" +"15856","7.155854","172.30.1.104","172.30.1.205","TCP","54","135 > 42684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15857","7.155875","172.30.1.104","172.30.1.205","TCP","54","135 > 42684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15858","7.155881","172.30.1.205","172.30.1.104","TCP","54","42684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15859","7.155987","172.30.1.104","172.30.1.205","TCP","66","49671 > 35322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15860","7.155994","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15861","7.156340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15862","7.156606","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15863","7.156614","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15864","7.158585","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15865","7.158965","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15866","7.158971","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15867","7.160316","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15868","7.161952","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15869","7.161961","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15870","7.162896","172.30.1.205","172.30.1.104","TCP","74","42688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910389 TSecr=0 WS=128" +"15871","7.163177","172.30.1.104","172.30.1.205","TCP","66","135 > 42688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15872","7.163187","172.30.1.205","172.30.1.104","TCP","54","42688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15873","7.163530","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15874","7.163789","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15875","7.163798","172.30.1.205","172.30.1.104","TCP","54","42688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15876","7.166002","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15877","7.166379","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15878","7.166385","172.30.1.205","172.30.1.104","TCP","54","42688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15879","7.168190","172.30.1.205","172.30.1.104","TCP","54","42688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15880","7.168297","172.30.1.205","172.30.1.104","TCP","74","35326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910394 TSecr=0 WS=128" +"15881","7.168437","172.30.1.104","172.30.1.205","TCP","54","135 > 42688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15882","7.168452","172.30.1.104","172.30.1.205","TCP","54","135 > 42688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15883","7.168457","172.30.1.205","172.30.1.104","TCP","54","42688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15884","7.168551","172.30.1.104","172.30.1.205","TCP","66","49671 > 35326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15885","7.168560","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15886","7.168931","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15887","7.169771","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15888","7.169780","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15889","7.171653","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15890","7.172008","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15891","7.172014","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15892","7.173394","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15893","7.175060","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15894","7.175070","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15895","7.176006","172.30.1.205","172.30.1.104","TCP","74","42692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910402 TSecr=0 WS=128" +"15896","7.176335","172.30.1.104","172.30.1.205","TCP","66","135 > 42692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15897","7.176345","172.30.1.205","172.30.1.104","TCP","54","42692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15898","7.176690","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15899","7.176994","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15900","7.177003","172.30.1.205","172.30.1.104","TCP","54","42692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15901","7.179185","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15902","7.179573","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15903","7.179579","172.30.1.205","172.30.1.104","TCP","54","42692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15904","7.181397","172.30.1.205","172.30.1.104","TCP","54","42692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15905","7.181508","172.30.1.205","172.30.1.104","TCP","74","35330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910407 TSecr=0 WS=128" +"15906","7.181660","172.30.1.104","172.30.1.205","TCP","54","135 > 42692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15907","7.181705","172.30.1.104","172.30.1.205","TCP","54","135 > 42692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15908","7.181711","172.30.1.205","172.30.1.104","TCP","54","42692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15909","7.181806","172.30.1.104","172.30.1.205","TCP","66","49671 > 35330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15910","7.181814","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15911","7.182158","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15912","7.183287","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15913","7.183297","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15914","7.185230","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15915","7.185601","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15916","7.185607","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15917","7.186964","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15918","7.188577","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15919","7.188586","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15920","7.189553","172.30.1.205","172.30.1.104","TCP","74","42696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910415 TSecr=0 WS=128" +"15921","7.189839","172.30.1.104","172.30.1.205","TCP","66","135 > 42696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15922","7.189851","172.30.1.205","172.30.1.104","TCP","54","42696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15923","7.190194","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15924","7.190471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15925","7.190480","172.30.1.205","172.30.1.104","TCP","54","42696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15926","7.192649","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15927","7.193015","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15928","7.193025","172.30.1.205","172.30.1.104","TCP","54","42696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15929","7.194923","172.30.1.205","172.30.1.104","TCP","54","42696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15930","7.195055","172.30.1.205","172.30.1.104","TCP","74","35334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910421 TSecr=0 WS=128" +"15931","7.195196","172.30.1.104","172.30.1.205","TCP","54","135 > 42696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15932","7.195206","172.30.1.104","172.30.1.205","TCP","54","135 > 42696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15933","7.195212","172.30.1.205","172.30.1.104","TCP","54","42696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15934","7.195310","172.30.1.104","172.30.1.205","TCP","66","49671 > 35334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15935","7.195319","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15936","7.195694","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15937","7.197577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15938","7.197585","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15939","7.199520","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15940","7.199864","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15941","7.199871","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15942","7.201289","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15943","7.203027","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15944","7.203037","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15945","7.204018","172.30.1.205","172.30.1.104","TCP","74","42700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910430 TSecr=0 WS=128" +"15946","7.204276","172.30.1.104","172.30.1.205","TCP","66","135 > 42700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15947","7.204287","172.30.1.205","172.30.1.104","TCP","54","42700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15948","7.204646","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15949","7.204922","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15950","7.204931","172.30.1.205","172.30.1.104","TCP","54","42700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15951","7.207157","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15952","7.207549","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15953","7.207555","172.30.1.205","172.30.1.104","TCP","54","42700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15954","7.209405","172.30.1.205","172.30.1.104","TCP","54","42700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15955","7.209521","172.30.1.205","172.30.1.104","TCP","74","35338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910435 TSecr=0 WS=128" +"15956","7.209678","172.30.1.104","172.30.1.205","TCP","54","135 > 42700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15957","7.209730","172.30.1.104","172.30.1.205","TCP","54","135 > 42700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15958","7.209737","172.30.1.205","172.30.1.104","TCP","54","42700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15959","7.209819","172.30.1.104","172.30.1.205","TCP","66","49671 > 35338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15960","7.209827","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15961","7.210176","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15962","7.210483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15963","7.210492","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15964","7.212400","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15965","7.212794","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15966","7.212800","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15967","7.214174","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15968","7.215934","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15969","7.215944","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15970","7.216910","172.30.1.205","172.30.1.104","TCP","74","42704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910443 TSecr=0 WS=128" +"15971","7.217242","172.30.1.104","172.30.1.205","TCP","66","135 > 42704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15972","7.217252","172.30.1.205","172.30.1.104","TCP","54","42704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15973","7.217609","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15974","7.217915","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15975","7.217924","172.30.1.205","172.30.1.104","TCP","54","42704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15976","7.220133","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"15977","7.220623","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"15978","7.220629","172.30.1.205","172.30.1.104","TCP","54","42704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15979","7.222478","172.30.1.205","172.30.1.104","TCP","54","42704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"15980","7.222594","172.30.1.205","172.30.1.104","TCP","74","35342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910449 TSecr=0 WS=128" +"15981","7.222757","172.30.1.104","172.30.1.205","TCP","54","135 > 42704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15982","7.222876","172.30.1.104","172.30.1.205","TCP","54","135 > 42704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"15983","7.222883","172.30.1.205","172.30.1.104","TCP","54","42704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"15984","7.222902","172.30.1.104","172.30.1.205","TCP","66","49671 > 35342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15985","7.222910","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15986","7.223264","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"15987","7.223589","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"15988","7.223598","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"15989","7.225525","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"15990","7.225932","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"15991","7.225939","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"15992","7.227290","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"15993","7.229082","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"15994","7.229091","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"15995","7.230045","172.30.1.205","172.30.1.104","TCP","74","42708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910456 TSecr=0 WS=128" +"15996","7.230380","172.30.1.104","172.30.1.205","TCP","66","135 > 42708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"15997","7.230391","172.30.1.205","172.30.1.104","TCP","54","42708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"15998","7.230741","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"15999","7.231036","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16000","7.231045","172.30.1.205","172.30.1.104","TCP","54","42708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16001","7.233261","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16002","7.233645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16003","7.233651","172.30.1.205","172.30.1.104","TCP","54","42708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16004","7.235475","172.30.1.205","172.30.1.104","TCP","54","42708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16005","7.235586","172.30.1.205","172.30.1.104","TCP","74","35346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910462 TSecr=0 WS=128" +"16006","7.235739","172.30.1.104","172.30.1.205","TCP","54","135 > 42708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16007","7.235763","172.30.1.104","172.30.1.205","TCP","54","135 > 42708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16008","7.235768","172.30.1.205","172.30.1.104","TCP","54","42708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16009","7.235877","172.30.1.104","172.30.1.205","TCP","66","49671 > 35346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16010","7.235886","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16011","7.236232","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16012","7.236510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16013","7.236519","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16014","7.238427","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16015","7.238796","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16016","7.238803","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16017","7.240151","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16018","7.241849","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16019","7.241859","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16020","7.242805","172.30.1.205","172.30.1.104","TCP","74","42712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910469 TSecr=0 WS=128" +"16021","7.243107","172.30.1.104","172.30.1.205","TCP","66","135 > 42712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16022","7.243118","172.30.1.205","172.30.1.104","TCP","54","42712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16023","7.243475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16024","7.243803","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16025","7.243812","172.30.1.205","172.30.1.104","TCP","54","42712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16026","7.246018","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16027","7.246437","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16028","7.246444","172.30.1.205","172.30.1.104","TCP","54","42712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16029","7.247289","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16030","7.247337","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16031","7.247373","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16032","7.247402","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16033","7.247435","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16034","7.247463","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16035","7.247491","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16036","7.247522","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16037","7.247545","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16038","7.247568","172.30.1.104","172.30.1.205","TCP","54","49671 > 35306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16039","7.247589","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16040","7.247625","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16041","7.247695","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16042","7.247716","172.30.1.104","172.30.1.205","TCP","54","49671 > 35310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16043","7.247745","172.30.1.104","172.30.1.205","TCP","54","49671 > 35314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16044","7.247818","172.30.1.104","172.30.1.205","TCP","54","49671 > 35306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16045","7.247825","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16046","7.247827","172.30.1.104","172.30.1.205","TCP","54","49671 > 35318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16047","7.247832","172.30.1.104","172.30.1.205","TCP","54","49671 > 35322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16048","7.247848","172.30.1.104","172.30.1.205","TCP","54","49671 > 35310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16049","7.247851","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16050","7.247948","172.30.1.104","172.30.1.205","TCP","54","49671 > 35326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16051","7.247974","172.30.1.104","172.30.1.205","TCP","54","49671 > 35330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16052","7.248011","172.30.1.104","172.30.1.205","TCP","54","49671 > 35330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16053","7.248016","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16054","7.248041","172.30.1.104","172.30.1.205","TCP","54","49671 > 35326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16055","7.248044","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16056","7.248069","172.30.1.104","172.30.1.205","TCP","54","49671 > 35322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16057","7.248073","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16058","7.248095","172.30.1.104","172.30.1.205","TCP","54","49671 > 35314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16059","7.248098","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16060","7.248130","172.30.1.104","172.30.1.205","TCP","54","49671 > 35318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16061","7.248133","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16062","7.248158","172.30.1.104","172.30.1.205","TCP","54","49671 > 35334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16063","7.248184","172.30.1.104","172.30.1.205","TCP","54","49671 > 35338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16064","7.248211","172.30.1.104","172.30.1.205","TCP","54","49671 > 35342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16065","7.248237","172.30.1.104","172.30.1.205","TCP","54","49671 > 35346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16066","7.248263","172.30.1.104","172.30.1.205","TCP","54","49671 > 35334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16067","7.248268","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16068","7.248292","172.30.1.104","172.30.1.205","TCP","54","49671 > 35346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16069","7.248294","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16070","7.248328","172.30.1.104","172.30.1.205","TCP","54","49671 > 35338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16071","7.248331","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16072","7.248355","172.30.1.104","172.30.1.205","TCP","54","49671 > 35342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16073","7.248358","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16074","7.248403","172.30.1.104","172.30.1.205","TCP","54","49671 > 35302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16075","7.248429","172.30.1.104","172.30.1.205","TCP","54","49671 > 35302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16076","7.248434","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16077","7.249311","172.30.1.205","172.30.1.104","TCP","54","42712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16078","7.249422","172.30.1.205","172.30.1.104","TCP","74","35350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910475 TSecr=0 WS=128" +"16079","7.249578","172.30.1.104","172.30.1.205","TCP","54","135 > 42712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16080","7.249601","172.30.1.104","172.30.1.205","TCP","54","135 > 42712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16081","7.249606","172.30.1.205","172.30.1.104","TCP","54","42712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16082","7.249695","172.30.1.104","172.30.1.205","TCP","66","49671 > 35350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16083","7.249704","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16084","7.250065","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16085","7.250392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16086","7.250401","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16087","7.252273","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16088","7.253574","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16089","7.253582","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16090","7.254949","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16091","7.256656","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16092","7.256665","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16093","7.257634","172.30.1.205","172.30.1.104","TCP","74","42716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910484 TSecr=0 WS=128" +"16094","7.257952","172.30.1.104","172.30.1.205","TCP","66","135 > 42716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16095","7.257963","172.30.1.205","172.30.1.104","TCP","54","42716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16096","7.258320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16097","7.258609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16098","7.258618","172.30.1.205","172.30.1.104","TCP","54","42716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16099","7.260855","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16100","7.261260","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16101","7.261267","172.30.1.205","172.30.1.104","TCP","54","42716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16102","7.263103","172.30.1.205","172.30.1.104","TCP","54","42716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16103","7.263215","172.30.1.205","172.30.1.104","TCP","74","35354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910489 TSecr=0 WS=128" +"16104","7.263390","172.30.1.104","172.30.1.205","TCP","54","135 > 42716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16105","7.263464","172.30.1.104","172.30.1.205","TCP","54","135 > 42716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16106","7.263469","172.30.1.205","172.30.1.104","TCP","54","42716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16107","7.263557","172.30.1.104","172.30.1.205","TCP","66","49671 > 35354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16108","7.263565","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16109","7.263914","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16110","7.264226","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16111","7.264235","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16112","7.266152","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16113","7.266518","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16114","7.266530","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16115","7.268145","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16116","7.269872","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16117","7.269882","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16118","7.270821","172.30.1.205","172.30.1.104","TCP","74","42720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910497 TSecr=0 WS=128" +"16119","7.271139","172.30.1.104","172.30.1.205","TCP","66","135 > 42720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16120","7.271150","172.30.1.205","172.30.1.104","TCP","54","42720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16121","7.271502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16122","7.271786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16123","7.271794","172.30.1.205","172.30.1.104","TCP","54","42720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16124","7.274019","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16125","7.274414","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16126","7.274421","172.30.1.205","172.30.1.104","TCP","54","42720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16127","7.276239","172.30.1.205","172.30.1.104","TCP","54","42720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16128","7.276349","172.30.1.205","172.30.1.104","TCP","74","35358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910502 TSecr=0 WS=128" +"16129","7.276533","172.30.1.104","172.30.1.205","TCP","54","135 > 42720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16130","7.276556","172.30.1.104","172.30.1.205","TCP","54","135 > 42720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16131","7.276561","172.30.1.205","172.30.1.104","TCP","54","42720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16132","7.276675","172.30.1.104","172.30.1.205","TCP","66","49671 > 35358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16133","7.276683","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16134","7.277067","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16135","7.277344","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16136","7.277353","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16137","7.279245","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16138","7.279606","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16139","7.279612","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16140","7.280997","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16141","7.282826","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16142","7.282835","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16143","7.283779","172.30.1.205","172.30.1.104","TCP","74","42724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910510 TSecr=0 WS=128" +"16144","7.284089","172.30.1.104","172.30.1.205","TCP","66","135 > 42724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16145","7.284099","172.30.1.205","172.30.1.104","TCP","54","42724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16146","7.284450","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16147","7.284786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16148","7.284795","172.30.1.205","172.30.1.104","TCP","54","42724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16149","7.286991","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16150","7.287433","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16151","7.287439","172.30.1.205","172.30.1.104","TCP","54","42724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16152","7.289287","172.30.1.205","172.30.1.104","TCP","54","42724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16153","7.289397","172.30.1.205","172.30.1.104","TCP","74","35362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910515 TSecr=0 WS=128" +"16154","7.289557","172.30.1.104","172.30.1.205","TCP","54","135 > 42724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16155","7.289568","172.30.1.104","172.30.1.205","TCP","54","135 > 42724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16156","7.289573","172.30.1.205","172.30.1.104","TCP","54","42724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16157","7.289724","172.30.1.104","172.30.1.205","TCP","66","49671 > 35362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16158","7.289732","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16159","7.290079","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16160","7.290376","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16161","7.290385","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16162","7.292274","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16163","7.292678","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16164","7.292684","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16165","7.294067","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16166","7.295733","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16167","7.295751","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16168","7.296723","172.30.1.205","172.30.1.104","TCP","74","42728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910523 TSecr=0 WS=128" +"16169","7.296991","172.30.1.104","172.30.1.205","TCP","66","135 > 42728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16170","7.297002","172.30.1.205","172.30.1.104","TCP","54","42728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16171","7.297358","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16172","7.297633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16173","7.297643","172.30.1.205","172.30.1.104","TCP","54","42728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16174","7.299824","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16175","7.300225","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16176","7.300231","172.30.1.205","172.30.1.104","TCP","54","42728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16177","7.302071","172.30.1.205","172.30.1.104","TCP","54","42728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16178","7.302182","172.30.1.205","172.30.1.104","TCP","74","35366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910528 TSecr=0 WS=128" +"16179","7.302324","172.30.1.104","172.30.1.205","TCP","54","135 > 42728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16180","7.302355","172.30.1.104","172.30.1.205","TCP","54","135 > 42728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16181","7.302361","172.30.1.205","172.30.1.104","TCP","54","42728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16182","7.302446","172.30.1.104","172.30.1.205","TCP","66","49671 > 35366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16183","7.302454","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16184","7.302817","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16185","7.303149","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16186","7.303158","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16187","7.305057","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16188","7.305404","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16189","7.305411","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16190","7.306764","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16191","7.308379","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16192","7.308388","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16193","7.309346","172.30.1.205","172.30.1.104","TCP","74","42732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910535 TSecr=0 WS=128" +"16194","7.309645","172.30.1.104","172.30.1.205","TCP","66","135 > 42732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16195","7.309656","172.30.1.205","172.30.1.104","TCP","54","42732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16196","7.310008","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16197","7.310298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16198","7.310307","172.30.1.205","172.30.1.104","TCP","54","42732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16199","7.312476","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16200","7.312858","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16201","7.312867","172.30.1.205","172.30.1.104","TCP","54","42732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16202","7.314772","172.30.1.205","172.30.1.104","TCP","54","42732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16203","7.314894","172.30.1.205","172.30.1.104","TCP","74","35370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910541 TSecr=0 WS=128" +"16204","7.315064","172.30.1.104","172.30.1.205","TCP","54","135 > 42732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16205","7.315096","172.30.1.104","172.30.1.205","TCP","54","135 > 42732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16206","7.315103","172.30.1.205","172.30.1.104","TCP","54","42732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16207","7.315195","172.30.1.104","172.30.1.205","TCP","66","49671 > 35370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16208","7.315207","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16209","7.315565","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16210","7.315862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16211","7.315871","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16212","7.317791","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16213","7.318183","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16214","7.318190","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16215","7.319545","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16216","7.321247","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16217","7.321256","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16218","7.322201","172.30.1.205","172.30.1.104","TCP","74","42736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910548 TSecr=0 WS=128" +"16219","7.322543","172.30.1.104","172.30.1.205","TCP","66","135 > 42736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16220","7.322558","172.30.1.205","172.30.1.104","TCP","54","42736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16221","7.322951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16222","7.323239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16223","7.323248","172.30.1.205","172.30.1.104","TCP","54","42736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16224","7.325494","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16225","7.325918","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16226","7.325925","172.30.1.205","172.30.1.104","TCP","54","42736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16227","7.327740","172.30.1.205","172.30.1.104","TCP","54","42736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16228","7.327852","172.30.1.205","172.30.1.104","TCP","74","35374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910554 TSecr=0 WS=128" +"16229","7.328016","172.30.1.104","172.30.1.205","TCP","54","135 > 42736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16230","7.328027","172.30.1.104","172.30.1.205","TCP","54","135 > 42736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16231","7.328032","172.30.1.205","172.30.1.104","TCP","54","42736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16232","7.328103","172.30.1.104","172.30.1.205","TCP","66","49671 > 35374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16233","7.328112","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16234","7.328454","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16235","7.328829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16236","7.328838","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16237","7.330725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16238","7.331103","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16239","7.331110","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16240","7.332461","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16241","7.334167","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16242","7.334178","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16243","7.335139","172.30.1.205","172.30.1.104","TCP","74","42740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910561 TSecr=0 WS=128" +"16244","7.335432","172.30.1.104","172.30.1.205","TCP","66","135 > 42740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16245","7.335443","172.30.1.205","172.30.1.104","TCP","54","42740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16246","7.335795","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16247","7.336066","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16248","7.336075","172.30.1.205","172.30.1.104","TCP","54","42740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16249","7.338286","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16250","7.338693","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16251","7.338699","172.30.1.205","172.30.1.104","TCP","54","42740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16252","7.340499","172.30.1.205","172.30.1.104","TCP","54","42740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16253","7.340607","172.30.1.205","172.30.1.104","TCP","74","35378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910567 TSecr=0 WS=128" +"16254","7.340771","172.30.1.104","172.30.1.205","TCP","54","135 > 42740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16255","7.340817","172.30.1.104","172.30.1.205","TCP","54","135 > 42740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16256","7.340824","172.30.1.205","172.30.1.104","TCP","54","42740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16257","7.340928","172.30.1.104","172.30.1.205","TCP","66","49671 > 35378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16258","7.340936","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16259","7.341306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16260","7.341633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16261","7.341641","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16262","7.343502","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16263","7.343834","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16264","7.343840","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16265","7.345223","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16266","7.348077","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16267","7.348087","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16268","7.349053","172.30.1.205","172.30.1.104","TCP","74","42744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910575 TSecr=0 WS=128" +"16269","7.349359","172.30.1.104","172.30.1.205","TCP","66","135 > 42744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16270","7.349370","172.30.1.205","172.30.1.104","TCP","54","42744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16271","7.349720","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16272","7.349991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16273","7.350000","172.30.1.205","172.30.1.104","TCP","54","42744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16274","7.352175","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16275","7.352583","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16276","7.352590","172.30.1.205","172.30.1.104","TCP","54","42744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16277","7.354422","172.30.1.205","172.30.1.104","TCP","54","42744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16278","7.354531","172.30.1.205","172.30.1.104","TCP","74","35382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910580 TSecr=0 WS=128" +"16279","7.354752","172.30.1.104","172.30.1.205","TCP","54","135 > 42744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16280","7.354783","172.30.1.104","172.30.1.205","TCP","54","135 > 42744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16281","7.354789","172.30.1.205","172.30.1.104","TCP","54","42744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16282","7.354828","172.30.1.104","172.30.1.205","TCP","66","49671 > 35382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16283","7.354836","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16284","7.355191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16285","7.355513","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16286","7.355521","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16287","7.357398","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16288","7.357789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16289","7.357795","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16290","7.359133","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16291","7.360910","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16292","7.360919","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16293","7.361854","172.30.1.205","172.30.1.104","TCP","74","42748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910588 TSecr=0 WS=128" +"16294","7.362130","172.30.1.104","172.30.1.205","TCP","66","135 > 42748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16295","7.362140","172.30.1.205","172.30.1.104","TCP","54","42748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16296","7.362492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16297","7.362767","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16298","7.362776","172.30.1.205","172.30.1.104","TCP","54","42748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16299","7.364962","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16300","7.365374","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16301","7.365380","172.30.1.205","172.30.1.104","TCP","54","42748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16302","7.367181","172.30.1.205","172.30.1.104","TCP","54","42748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16303","7.367290","172.30.1.205","172.30.1.104","TCP","74","35386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910593 TSecr=0 WS=128" +"16304","7.367445","172.30.1.104","172.30.1.205","TCP","54","135 > 42748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16305","7.367473","172.30.1.104","172.30.1.205","TCP","54","135 > 42748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16306","7.367478","172.30.1.205","172.30.1.104","TCP","54","42748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16307","7.367559","172.30.1.104","172.30.1.205","TCP","66","49671 > 35386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16308","7.367567","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16309","7.367909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16310","7.369422","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16311","7.369432","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16312","7.371293","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16313","7.371685","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16314","7.371691","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16315","7.373056","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16316","7.374823","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16317","7.374834","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16318","7.375773","172.30.1.205","172.30.1.104","TCP","74","42752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910602 TSecr=0 WS=128" +"16319","7.376069","172.30.1.104","172.30.1.205","TCP","66","135 > 42752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16320","7.376079","172.30.1.205","172.30.1.104","TCP","54","42752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16321","7.376427","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16322","7.376750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16323","7.376758","172.30.1.205","172.30.1.104","TCP","54","42752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16324","7.378953","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16325","7.379344","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16326","7.379351","172.30.1.205","172.30.1.104","TCP","54","42752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16327","7.381178","172.30.1.205","172.30.1.104","TCP","54","42752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16328","7.381287","172.30.1.205","172.30.1.104","TCP","74","35390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910607 TSecr=0 WS=128" +"16329","7.381422","172.30.1.104","172.30.1.205","TCP","54","135 > 42752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16330","7.381565","172.30.1.104","172.30.1.205","TCP","66","49671 > 35390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16331","7.381574","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16332","7.381922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16333","7.383921","172.30.1.104","172.30.1.205","TCP","54","135 > 42752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16334","7.383928","172.30.1.205","172.30.1.104","TCP","54","42752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16335","7.384060","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16336","7.384070","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16337","7.386011","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16338","7.386350","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16339","7.386356","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16340","7.387694","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16341","7.389405","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16342","7.389414","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16343","7.390345","172.30.1.205","172.30.1.104","TCP","74","42756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910616 TSecr=0 WS=128" +"16344","7.390633","172.30.1.104","172.30.1.205","TCP","66","135 > 42756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16345","7.390644","172.30.1.205","172.30.1.104","TCP","54","42756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16346","7.390989","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16347","7.391262","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16348","7.391270","172.30.1.205","172.30.1.104","TCP","54","42756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16349","7.393471","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16350","7.393846","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16351","7.393852","172.30.1.205","172.30.1.104","TCP","54","42756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16352","7.395654","172.30.1.205","172.30.1.104","TCP","54","42756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16353","7.395762","172.30.1.205","172.30.1.104","TCP","74","35394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910622 TSecr=0 WS=128" +"16354","7.395937","172.30.1.104","172.30.1.205","TCP","54","135 > 42756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16355","7.395945","172.30.1.104","172.30.1.205","TCP","54","135 > 42756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16356","7.395950","172.30.1.205","172.30.1.104","TCP","54","42756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16357","7.396028","172.30.1.104","172.30.1.205","TCP","66","49671 > 35394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16358","7.396036","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16359","7.396376","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16360","7.396668","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16361","7.396677","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16362","7.398566","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16363","7.398910","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16364","7.398916","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16365","7.400244","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16366","7.401913","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16367","7.401922","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16368","7.402857","172.30.1.205","172.30.1.104","TCP","74","42760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910629 TSecr=0 WS=128" +"16369","7.403134","172.30.1.104","172.30.1.205","TCP","66","135 > 42760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16370","7.403144","172.30.1.205","172.30.1.104","TCP","54","42760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16371","7.403486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16372","7.403815","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16373","7.403824","172.30.1.205","172.30.1.104","TCP","54","42760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16374","7.406012","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16375","7.406430","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16376","7.406437","172.30.1.205","172.30.1.104","TCP","54","42760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16377","7.407282","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16378","7.407330","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16379","7.407377","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16380","7.407412","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16381","7.407444","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16382","7.407471","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16383","7.407498","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16384","7.407541","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16385","7.407571","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16386","7.407578","172.30.1.104","172.30.1.205","TCP","54","49671 > 35354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16387","7.407595","172.30.1.104","172.30.1.205","TCP","54","49671 > 35358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16388","7.407627","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16389","7.407653","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16390","7.407736","172.30.1.104","172.30.1.205","TCP","54","49671 > 35354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16391","7.407743","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16392","7.407757","172.30.1.104","172.30.1.205","TCP","54","49671 > 35358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16393","7.407759","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16394","7.407765","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16395","7.408049","172.30.1.104","172.30.1.205","TCP","54","49671 > 35362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16396","7.408063","172.30.1.104","172.30.1.205","TCP","54","49671 > 35366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16397","7.408087","172.30.1.104","172.30.1.205","TCP","54","49671 > 35370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16398","7.408110","172.30.1.104","172.30.1.205","TCP","54","49671 > 35374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16399","7.408132","172.30.1.104","172.30.1.205","TCP","54","49671 > 35378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16400","7.408151","172.30.1.104","172.30.1.205","TCP","54","49671 > 35382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16401","7.408171","172.30.1.104","172.30.1.205","TCP","54","49671 > 35386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16402","7.408192","172.30.1.104","172.30.1.205","TCP","54","49671 > 35390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16403","7.408223","172.30.1.104","172.30.1.205","TCP","54","49671 > 35394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16404","7.408243","172.30.1.104","172.30.1.205","TCP","54","49671 > 35394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16405","7.408248","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16406","7.408275","172.30.1.104","172.30.1.205","TCP","54","49671 > 35390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16407","7.408278","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16408","7.408302","172.30.1.104","172.30.1.205","TCP","54","49671 > 35386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16409","7.408305","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16410","7.408318","172.30.1.104","172.30.1.205","TCP","54","49671 > 35382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16411","7.408321","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16412","7.408337","172.30.1.104","172.30.1.205","TCP","54","49671 > 35378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16413","7.408339","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16414","7.408356","172.30.1.104","172.30.1.205","TCP","54","49671 > 35374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16415","7.408359","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16416","7.408376","172.30.1.104","172.30.1.205","TCP","54","49671 > 35362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16417","7.408379","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16418","7.408394","172.30.1.104","172.30.1.205","TCP","54","49671 > 35366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16419","7.408397","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16420","7.408413","172.30.1.104","172.30.1.205","TCP","54","49671 > 35370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16421","7.408416","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16422","7.408433","172.30.1.104","172.30.1.205","TCP","54","49671 > 35350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16423","7.408452","172.30.1.104","172.30.1.205","TCP","54","49671 > 35350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16424","7.408456","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16425","7.409611","172.30.1.205","172.30.1.104","TCP","54","42760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16426","7.409731","172.30.1.205","172.30.1.104","TCP","74","35398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910636 TSecr=0 WS=128" +"16427","7.409928","172.30.1.104","172.30.1.205","TCP","54","135 > 42760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16428","7.409936","172.30.1.104","172.30.1.205","TCP","54","135 > 42760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16429","7.409940","172.30.1.205","172.30.1.104","TCP","54","42760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16430","7.410016","172.30.1.104","172.30.1.205","TCP","66","49671 > 35398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16431","7.410024","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16432","7.410379","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16433","7.410645","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16434","7.410661","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16435","7.412534","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16436","7.412881","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16437","7.412888","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16438","7.414245","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16439","7.415956","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16440","7.415965","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16441","7.416909","172.30.1.205","172.30.1.104","TCP","74","42764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910643 TSecr=0 WS=128" +"16442","7.417254","172.30.1.104","172.30.1.205","TCP","66","135 > 42764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16443","7.417265","172.30.1.205","172.30.1.104","TCP","54","42764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16444","7.417623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16445","7.417932","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16446","7.417941","172.30.1.205","172.30.1.104","TCP","54","42764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16447","7.420104","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16448","7.420542","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16449","7.420548","172.30.1.205","172.30.1.104","TCP","54","42764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16450","7.422356","172.30.1.205","172.30.1.104","TCP","54","42764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16451","7.422465","172.30.1.205","172.30.1.104","TCP","74","35402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910648 TSecr=0 WS=128" +"16452","7.422620","172.30.1.104","172.30.1.205","TCP","54","135 > 42764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16453","7.422675","172.30.1.104","172.30.1.205","TCP","54","135 > 42764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16454","7.422681","172.30.1.205","172.30.1.104","TCP","54","42764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16455","7.422754","172.30.1.104","172.30.1.205","TCP","66","49671 > 35402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16456","7.422762","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16457","7.423103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16458","7.423436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16459","7.423445","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16460","7.425323","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16461","7.425707","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16462","7.425713","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16463","7.427070","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16464","7.428840","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16465","7.428849","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16466","7.429777","172.30.1.205","172.30.1.104","TCP","74","42768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910656 TSecr=0 WS=128" +"16467","7.430087","172.30.1.104","172.30.1.205","TCP","66","135 > 42768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16468","7.430097","172.30.1.205","172.30.1.104","TCP","54","42768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16469","7.430450","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16470","7.430761","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16471","7.430770","172.30.1.205","172.30.1.104","TCP","54","42768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16472","7.432988","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16473","7.433400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16474","7.433406","172.30.1.205","172.30.1.104","TCP","54","42768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16475","7.435212","172.30.1.205","172.30.1.104","TCP","54","42768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16476","7.435321","172.30.1.205","172.30.1.104","TCP","74","35406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910661 TSecr=0 WS=128" +"16477","7.435526","172.30.1.104","172.30.1.205","TCP","54","135 > 42768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16478","7.435554","172.30.1.104","172.30.1.205","TCP","54","135 > 42768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16479","7.435560","172.30.1.205","172.30.1.104","TCP","54","42768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16480","7.435680","172.30.1.104","172.30.1.205","TCP","66","49671 > 35406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16481","7.435688","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16482","7.436034","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16483","7.436346","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16484","7.436354","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16485","7.438241","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16486","7.438611","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16487","7.438615","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16488","7.439950","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16489","7.441817","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16490","7.441826","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16491","7.442771","172.30.1.205","172.30.1.104","TCP","74","42772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910669 TSecr=0 WS=128" +"16492","7.443078","172.30.1.104","172.30.1.205","TCP","66","135 > 42772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16493","7.443089","172.30.1.205","172.30.1.104","TCP","54","42772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16494","7.443435","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16495","7.443713","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16496","7.443721","172.30.1.205","172.30.1.104","TCP","54","42772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16497","7.445947","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16498","7.446402","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16499","7.446408","172.30.1.205","172.30.1.104","TCP","54","42772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16500","7.448212","172.30.1.205","172.30.1.104","TCP","54","42772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16501","7.448321","172.30.1.205","172.30.1.104","TCP","74","35410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910674 TSecr=0 WS=128" +"16502","7.448502","172.30.1.104","172.30.1.205","TCP","54","135 > 42772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16503","7.448511","172.30.1.104","172.30.1.205","TCP","54","135 > 42772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16504","7.448515","172.30.1.205","172.30.1.104","TCP","54","42772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16505","7.448585","172.30.1.104","172.30.1.205","TCP","66","49671 > 35410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16506","7.448594","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16507","7.448971","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16508","7.449273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16509","7.449281","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16510","7.451153","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16511","7.451577","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16512","7.451584","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16513","7.452953","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16514","7.454744","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16515","7.454754","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16516","7.455680","172.30.1.205","172.30.1.104","TCP","74","42776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910682 TSecr=0 WS=128" +"16517","7.455956","172.30.1.104","172.30.1.205","TCP","66","135 > 42776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16518","7.455967","172.30.1.205","172.30.1.104","TCP","54","42776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16519","7.456313","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16520","7.456636","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16521","7.456644","172.30.1.205","172.30.1.104","TCP","54","42776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16522","7.458835","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16523","7.459251","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16524","7.459261","172.30.1.205","172.30.1.104","TCP","54","42776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16525","7.461190","172.30.1.205","172.30.1.104","TCP","54","42776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16526","7.461314","172.30.1.205","172.30.1.104","TCP","74","35414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910687 TSecr=0 WS=128" +"16527","7.461558","172.30.1.104","172.30.1.205","TCP","54","135 > 42776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16528","7.461565","172.30.1.104","172.30.1.205","TCP","54","135 > 42776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16529","7.461571","172.30.1.205","172.30.1.104","TCP","54","42776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16530","7.461633","172.30.1.104","172.30.1.205","TCP","66","49671 > 35414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16531","7.461642","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16532","7.461987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16533","7.462280","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16534","7.462289","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16535","7.464161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16536","7.464526","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16537","7.464532","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16538","7.465933","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16539","7.467719","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16540","7.467729","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16541","7.468677","172.30.1.205","172.30.1.104","TCP","74","42780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910695 TSecr=0 WS=128" +"16542","7.468994","172.30.1.104","172.30.1.205","TCP","66","135 > 42780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16543","7.469005","172.30.1.205","172.30.1.104","TCP","54","42780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16544","7.469363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16545","7.469670","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16546","7.469680","172.30.1.205","172.30.1.104","TCP","54","42780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16547","7.471874","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16548","7.472308","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16549","7.472315","172.30.1.205","172.30.1.104","TCP","54","42780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16550","7.474179","172.30.1.205","172.30.1.104","TCP","54","42780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16551","7.474297","172.30.1.205","172.30.1.104","TCP","74","35418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910700 TSecr=0 WS=128" +"16552","7.474481","172.30.1.104","172.30.1.205","TCP","54","135 > 42780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16553","7.474509","172.30.1.104","172.30.1.205","TCP","54","135 > 42780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16554","7.474515","172.30.1.205","172.30.1.104","TCP","54","42780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16555","7.474623","172.30.1.104","172.30.1.205","TCP","66","49671 > 35418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16556","7.474633","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16557","7.474987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16558","7.475401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16559","7.475410","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16560","7.477334","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16561","7.477709","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16562","7.477715","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16563","7.479072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16564","7.481006","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16565","7.481020","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16566","7.482035","172.30.1.205","172.30.1.104","TCP","74","42784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910708 TSecr=0 WS=128" +"16567","7.482340","172.30.1.104","172.30.1.205","TCP","66","135 > 42784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16568","7.482351","172.30.1.205","172.30.1.104","TCP","54","42784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16569","7.482704","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16570","7.482976","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16571","7.482985","172.30.1.205","172.30.1.104","TCP","54","42784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16572","7.485233","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16573","7.485649","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16574","7.485655","172.30.1.205","172.30.1.104","TCP","54","42784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16575","7.487465","172.30.1.205","172.30.1.104","TCP","54","42784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16576","7.487590","172.30.1.205","172.30.1.104","TCP","74","35422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910714 TSecr=0 WS=128" +"16577","7.487764","172.30.1.104","172.30.1.205","TCP","54","135 > 42784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16578","7.487773","172.30.1.104","172.30.1.205","TCP","54","135 > 42784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16579","7.487778","172.30.1.205","172.30.1.104","TCP","54","42784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16580","7.487874","172.30.1.104","172.30.1.205","TCP","66","49671 > 35422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16581","7.487882","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16582","7.488231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16583","7.488535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16584","7.488544","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16585","7.490461","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16586","7.490823","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16587","7.490829","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16588","7.492249","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16589","7.494041","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16590","7.494050","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16591","7.495018","172.30.1.205","172.30.1.104","TCP","74","42788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910721 TSecr=0 WS=128" +"16592","7.495340","172.30.1.104","172.30.1.205","TCP","66","135 > 42788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16593","7.495351","172.30.1.205","172.30.1.104","TCP","54","42788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16594","7.495702","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16595","7.496060","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16596","7.496069","172.30.1.205","172.30.1.104","TCP","54","42788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16597","7.498275","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16598","7.498679","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16599","7.498685","172.30.1.205","172.30.1.104","TCP","54","42788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16600","7.500483","172.30.1.205","172.30.1.104","TCP","54","42788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16601","7.500593","172.30.1.205","172.30.1.104","TCP","74","35426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910727 TSecr=0 WS=128" +"16602","7.500744","172.30.1.104","172.30.1.205","TCP","54","135 > 42788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16603","7.500791","172.30.1.104","172.30.1.205","TCP","54","135 > 42788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16604","7.500798","172.30.1.205","172.30.1.104","TCP","54","42788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16605","7.500874","172.30.1.104","172.30.1.205","TCP","66","49671 > 35426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16606","7.500882","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16607","7.501231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16608","7.501499","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16609","7.501508","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16610","7.503378","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16611","7.503734","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16612","7.503753","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16613","7.505154","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16614","7.506981","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16615","7.506990","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16616","7.507916","172.30.1.205","172.30.1.104","TCP","74","42792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910734 TSecr=0 WS=128" +"16617","7.508237","172.30.1.104","172.30.1.205","TCP","66","135 > 42792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16618","7.508248","172.30.1.205","172.30.1.104","TCP","54","42792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16619","7.508594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16620","7.508891","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16621","7.508900","172.30.1.205","172.30.1.104","TCP","54","42792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16622","7.511073","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16623","7.511458","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16624","7.511464","172.30.1.205","172.30.1.104","TCP","54","42792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16625","7.513295","172.30.1.205","172.30.1.104","TCP","54","42792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16626","7.513403","172.30.1.205","172.30.1.104","TCP","74","35430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910739 TSecr=0 WS=128" +"16627","7.513578","172.30.1.104","172.30.1.205","TCP","54","135 > 42792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16628","7.513587","172.30.1.104","172.30.1.205","TCP","54","135 > 42792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16629","7.513592","172.30.1.205","172.30.1.104","TCP","54","42792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16630","7.513680","172.30.1.104","172.30.1.205","TCP","66","49671 > 35430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16631","7.513689","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16632","7.514029","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16633","7.514311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16634","7.514318","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16635","7.516161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16636","7.518668","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16637","7.518675","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16638","7.520023","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16639","7.521836","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16640","7.521846","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16641","7.522782","172.30.1.205","172.30.1.104","TCP","74","42796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910749 TSecr=0 WS=128" +"16642","7.523110","172.30.1.104","172.30.1.205","TCP","66","135 > 42796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16643","7.523121","172.30.1.205","172.30.1.104","TCP","54","42796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16644","7.523465","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16645","7.523750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16646","7.523759","172.30.1.205","172.30.1.104","TCP","54","42796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16647","7.525956","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16648","7.526369","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16649","7.526376","172.30.1.205","172.30.1.104","TCP","54","42796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16650","7.528196","172.30.1.205","172.30.1.104","TCP","54","42796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16651","7.528326","172.30.1.205","172.30.1.104","TCP","74","35434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910754 TSecr=0 WS=128" +"16652","7.528436","172.30.1.104","172.30.1.205","TCP","54","135 > 42796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16653","7.528472","172.30.1.104","172.30.1.205","TCP","54","135 > 42796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16654","7.528479","172.30.1.205","172.30.1.104","TCP","54","42796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16655","7.528601","172.30.1.104","172.30.1.205","TCP","66","49671 > 35434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16656","7.528609","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16657","7.528994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16658","7.529281","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16659","7.529290","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16660","7.531167","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16661","7.532755","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16662","7.532761","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16663","7.534124","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16664","7.535903","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16665","7.535914","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16666","7.536915","172.30.1.205","172.30.1.104","TCP","74","42800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910763 TSecr=0 WS=128" +"16667","7.537256","172.30.1.104","172.30.1.205","TCP","66","135 > 42800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16668","7.537267","172.30.1.205","172.30.1.104","TCP","54","42800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16669","7.537624","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16670","7.537889","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16671","7.537898","172.30.1.205","172.30.1.104","TCP","54","42800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16672","7.540097","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16673","7.540512","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16674","7.540519","172.30.1.205","172.30.1.104","TCP","54","42800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16675","7.542339","172.30.1.205","172.30.1.104","TCP","54","42800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16676","7.542450","172.30.1.205","172.30.1.104","TCP","74","35438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910768 TSecr=0 WS=128" +"16677","7.542644","172.30.1.104","172.30.1.205","TCP","54","135 > 42800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16678","7.542657","172.30.1.104","172.30.1.205","TCP","54","135 > 42800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16679","7.542666","172.30.1.205","172.30.1.104","TCP","54","42800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16680","7.542744","172.30.1.104","172.30.1.205","TCP","66","49671 > 35438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16681","7.542755","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16682","7.543157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16683","7.543428","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16684","7.543437","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16685","7.545395","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16686","7.546833","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16687","7.546841","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16688","7.548225","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16689","7.550003","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16690","7.550018","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16691","7.551057","172.30.1.205","172.30.1.104","TCP","74","42804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910777 TSecr=0 WS=128" +"16692","7.551377","172.30.1.104","172.30.1.205","TCP","66","135 > 42804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16693","7.551391","172.30.1.205","172.30.1.104","TCP","54","42804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16694","7.551757","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16695","7.552046","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16696","7.552057","172.30.1.205","172.30.1.104","TCP","54","42804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16697","7.554310","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16698","7.554761","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16699","7.554769","172.30.1.205","172.30.1.104","TCP","54","42804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16700","7.556639","172.30.1.205","172.30.1.104","TCP","54","42804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16701","7.556766","172.30.1.205","172.30.1.104","TCP","74","35442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910783 TSecr=0 WS=128" +"16702","7.556933","172.30.1.104","172.30.1.205","TCP","54","135 > 42804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16703","7.556955","172.30.1.104","172.30.1.205","TCP","54","135 > 42804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16704","7.556962","172.30.1.205","172.30.1.104","TCP","54","42804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16705","7.557063","172.30.1.104","172.30.1.205","TCP","66","49671 > 35442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16706","7.557071","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16707","7.557422","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16708","7.557730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16709","7.557739","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16710","7.559605","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16711","7.559945","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16712","7.559952","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16713","7.561328","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16714","7.564327","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16715","7.564336","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16716","7.565294","172.30.1.205","172.30.1.104","TCP","74","42808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910791 TSecr=0 WS=128" +"16717","7.565595","172.30.1.104","172.30.1.205","TCP","66","135 > 42808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16718","7.565605","172.30.1.205","172.30.1.104","TCP","54","42808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16719","7.565964","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16720","7.566277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16721","7.566286","172.30.1.205","172.30.1.104","TCP","54","42808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16722","7.568448","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16723","7.568843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16724","7.568849","172.30.1.205","172.30.1.104","TCP","54","42808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16725","7.569689","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16726","7.569737","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16727","7.569774","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16728","7.569807","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16729","7.569839","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16730","7.569872","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16731","7.569895","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16732","7.569926","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16733","7.569952","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16734","7.569974","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16735","7.569994","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16736","7.570067","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16737","7.570140","172.30.1.104","172.30.1.205","TCP","54","49671 > 35402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16738","7.570150","172.30.1.104","172.30.1.205","TCP","54","49671 > 35406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16739","7.570153","172.30.1.104","172.30.1.205","TCP","54","49671 > 35402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16740","7.570159","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16741","7.570166","172.30.1.104","172.30.1.205","TCP","54","49671 > 35410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16742","7.570674","172.30.1.104","172.30.1.205","TCP","54","49671 > 35414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16743","7.570682","172.30.1.104","172.30.1.205","TCP","54","49671 > 35414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16744","7.570689","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16745","7.570696","172.30.1.104","172.30.1.205","TCP","54","49671 > 35406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16746","7.570698","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16747","7.570699","172.30.1.104","172.30.1.205","TCP","54","49671 > 35410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16748","7.570701","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16749","7.570702","172.30.1.104","172.30.1.205","TCP","54","49671 > 35418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16750","7.570706","172.30.1.104","172.30.1.205","TCP","54","49671 > 35422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16751","7.570708","172.30.1.104","172.30.1.205","TCP","54","49671 > 35418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16752","7.570710","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16753","7.570711","172.30.1.104","172.30.1.205","TCP","54","49671 > 35426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16754","7.570713","172.30.1.104","172.30.1.205","TCP","54","49671 > 35430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16755","7.570716","172.30.1.104","172.30.1.205","TCP","54","49671 > 35430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16756","7.570718","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16757","7.570719","172.30.1.104","172.30.1.205","TCP","54","49671 > 35434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16758","7.570722","172.30.1.104","172.30.1.205","TCP","54","49671 > 35422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16759","7.570724","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16760","7.570725","172.30.1.104","172.30.1.205","TCP","54","49671 > 35438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16761","7.570731","172.30.1.104","172.30.1.205","TCP","54","49671 > 35438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16762","7.570734","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16763","7.570882","172.30.1.104","172.30.1.205","TCP","54","49671 > 35442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16764","7.570887","172.30.1.104","172.30.1.205","TCP","54","49671 > 35434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16765","7.570890","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16766","7.570896","172.30.1.104","172.30.1.205","TCP","54","49671 > 35398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16767","7.570900","172.30.1.104","172.30.1.205","TCP","54","49671 > 35398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16768","7.570902","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16769","7.570911","172.30.1.104","172.30.1.205","TCP","54","49671 > 35442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16770","7.570913","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16771","7.570914","172.30.1.104","172.30.1.205","TCP","54","49671 > 35426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"16772","7.570916","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"16773","7.571499","172.30.1.205","172.30.1.104","TCP","54","42808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16774","7.571623","172.30.1.205","172.30.1.104","TCP","74","35446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910798 TSecr=0 WS=128" +"16775","7.571748","172.30.1.104","172.30.1.205","TCP","54","135 > 42808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16776","7.571760","172.30.1.104","172.30.1.205","TCP","54","135 > 42808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16777","7.571764","172.30.1.205","172.30.1.104","TCP","54","42808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16778","7.571880","172.30.1.104","172.30.1.205","TCP","66","49671 > 35446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16779","7.571888","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16780","7.572242","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16781","7.572514","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16782","7.572521","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16783","7.574427","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16784","7.574791","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16785","7.574798","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16786","7.576173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16787","7.577866","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16788","7.577875","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16789","7.578836","172.30.1.205","172.30.1.104","TCP","74","42812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910805 TSecr=0 WS=128" +"16790","7.579125","172.30.1.104","172.30.1.205","TCP","66","135 > 42812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16791","7.579136","172.30.1.205","172.30.1.104","TCP","54","42812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16792","7.579481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16793","7.579758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16794","7.579767","172.30.1.205","172.30.1.104","TCP","54","42812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16795","7.582004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16796","7.582373","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16797","7.582379","172.30.1.205","172.30.1.104","TCP","54","42812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16798","7.584182","172.30.1.205","172.30.1.104","TCP","54","42812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16799","7.584291","172.30.1.205","172.30.1.104","TCP","74","35450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910810 TSecr=0 WS=128" +"16800","7.584468","172.30.1.104","172.30.1.205","TCP","54","135 > 42812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16801","7.584491","172.30.1.104","172.30.1.205","TCP","54","135 > 42812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16802","7.584496","172.30.1.205","172.30.1.104","TCP","54","42812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16803","7.584587","172.30.1.104","172.30.1.205","TCP","66","49671 > 35450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16804","7.584595","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16805","7.584971","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16806","7.585264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16807","7.585272","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16808","7.587138","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16809","7.587490","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16810","7.587496","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16811","7.588861","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16812","7.590708","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16813","7.590717","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16814","7.591654","172.30.1.205","172.30.1.104","TCP","74","42816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910818 TSecr=0 WS=128" +"16815","7.591939","172.30.1.104","172.30.1.205","TCP","66","135 > 42816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16816","7.591949","172.30.1.205","172.30.1.104","TCP","54","42816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16817","7.592296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16818","7.592567","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16819","7.592576","172.30.1.205","172.30.1.104","TCP","54","42816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16820","7.594860","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16821","7.595264","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16822","7.595271","172.30.1.205","172.30.1.104","TCP","54","42816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16823","7.597100","172.30.1.205","172.30.1.104","TCP","54","42816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16824","7.597209","172.30.1.205","172.30.1.104","TCP","74","35454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910823 TSecr=0 WS=128" +"16825","7.597365","172.30.1.104","172.30.1.205","TCP","54","135 > 42816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16826","7.597376","172.30.1.104","172.30.1.205","TCP","54","135 > 42816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16827","7.597381","172.30.1.205","172.30.1.104","TCP","54","42816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16828","7.597464","172.30.1.104","172.30.1.205","TCP","66","49671 > 35454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16829","7.597472","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16830","7.597827","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16831","7.598105","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16832","7.598113","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16833","7.599969","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16834","7.600339","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16835","7.600345","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16836","7.601708","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16837","7.603476","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16838","7.603485","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16839","7.604404","172.30.1.205","172.30.1.104","TCP","74","42820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910830 TSecr=0 WS=128" +"16840","7.604676","172.30.1.104","172.30.1.205","TCP","66","135 > 42820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16841","7.604686","172.30.1.205","172.30.1.104","TCP","54","42820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16842","7.605063","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16843","7.605393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16844","7.605402","172.30.1.205","172.30.1.104","TCP","54","42820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16845","7.607577","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16846","7.608007","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16847","7.608014","172.30.1.205","172.30.1.104","TCP","54","42820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16848","7.609861","172.30.1.205","172.30.1.104","TCP","54","42820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16849","7.609972","172.30.1.205","172.30.1.104","TCP","74","35458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910836 TSecr=0 WS=128" +"16850","7.610123","172.30.1.104","172.30.1.205","TCP","54","135 > 42820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16851","7.610151","172.30.1.104","172.30.1.205","TCP","54","135 > 42820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16852","7.610156","172.30.1.205","172.30.1.104","TCP","54","42820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16853","7.610260","172.30.1.104","172.30.1.205","TCP","66","49671 > 35458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16854","7.610268","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16855","7.610612","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16856","7.610909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16857","7.610918","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16858","7.612813","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16859","7.613210","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16860","7.613216","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16861","7.614559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16862","7.616366","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16863","7.616375","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16864","7.617329","172.30.1.205","172.30.1.104","TCP","74","42824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910843 TSecr=0 WS=128" +"16865","7.617618","172.30.1.104","172.30.1.205","TCP","66","135 > 42824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16866","7.617629","172.30.1.205","172.30.1.104","TCP","54","42824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16867","7.617971","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16868","7.618262","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16869","7.618271","172.30.1.205","172.30.1.104","TCP","54","42824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16870","7.620436","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16871","7.620831","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16872","7.620838","172.30.1.205","172.30.1.104","TCP","54","42824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16873","7.622653","172.30.1.205","172.30.1.104","TCP","54","42824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16874","7.622763","172.30.1.205","172.30.1.104","TCP","74","35462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910849 TSecr=0 WS=128" +"16875","7.622954","172.30.1.104","172.30.1.205","TCP","54","135 > 42824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16876","7.622976","172.30.1.104","172.30.1.205","TCP","54","135 > 42824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16877","7.622982","172.30.1.205","172.30.1.104","TCP","54","42824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16878","7.623028","172.30.1.104","172.30.1.205","TCP","66","49671 > 35462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16879","7.623036","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16880","7.623374","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16881","7.623684","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16882","7.623694","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16883","7.625612","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16884","7.625991","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16885","7.625998","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16886","7.627339","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16887","7.629063","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16888","7.629072","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16889","7.630008","172.30.1.205","172.30.1.104","TCP","74","42828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910856 TSecr=0 WS=128" +"16890","7.630301","172.30.1.104","172.30.1.205","TCP","66","135 > 42828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16891","7.630311","172.30.1.205","172.30.1.104","TCP","54","42828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16892","7.630655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16893","7.630962","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16894","7.630971","172.30.1.205","172.30.1.104","TCP","54","42828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16895","7.633170","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16896","7.633574","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16897","7.633580","172.30.1.205","172.30.1.104","TCP","54","42828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16898","7.635396","172.30.1.205","172.30.1.104","TCP","54","42828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16899","7.635502","172.30.1.205","172.30.1.104","TCP","74","35466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910861 TSecr=0 WS=128" +"16900","7.635656","172.30.1.104","172.30.1.205","TCP","54","135 > 42828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16901","7.635678","172.30.1.104","172.30.1.205","TCP","54","135 > 42828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16902","7.635683","172.30.1.205","172.30.1.104","TCP","54","42828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16903","7.635782","172.30.1.104","172.30.1.205","TCP","66","49671 > 35466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16904","7.635790","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16905","7.636132","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16906","7.636469","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16907","7.636478","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16908","7.638385","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16909","7.638773","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16910","7.638779","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16911","7.640123","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16912","7.641955","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16913","7.641971","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16914","7.642914","172.30.1.205","172.30.1.104","TCP","74","42832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910869 TSecr=0 WS=128" +"16915","7.643199","172.30.1.104","172.30.1.205","TCP","66","135 > 42832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16916","7.643208","172.30.1.205","172.30.1.104","TCP","54","42832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16917","7.643554","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16918","7.643821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16919","7.643830","172.30.1.205","172.30.1.104","TCP","54","42832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16920","7.646022","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16921","7.646432","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16922","7.646438","172.30.1.205","172.30.1.104","TCP","54","42832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16923","7.648263","172.30.1.205","172.30.1.104","TCP","54","42832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16924","7.648374","172.30.1.205","172.30.1.104","TCP","74","35470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910874 TSecr=0 WS=128" +"16925","7.648544","172.30.1.104","172.30.1.205","TCP","54","135 > 42832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16926","7.648564","172.30.1.104","172.30.1.205","TCP","54","135 > 42832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16927","7.648569","172.30.1.205","172.30.1.104","TCP","54","42832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16928","7.648656","172.30.1.104","172.30.1.205","TCP","66","49671 > 35470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16929","7.648664","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16930","7.649037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16931","7.649307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16932","7.649315","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16933","7.651175","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16934","7.652184","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16935","7.652190","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16936","7.653568","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16937","7.657166","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16938","7.657176","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16939","7.658139","172.30.1.205","172.30.1.104","TCP","74","42836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910884 TSecr=0 WS=128" +"16940","7.658806","172.30.1.104","172.30.1.205","TCP","66","135 > 42836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16941","7.658817","172.30.1.205","172.30.1.104","TCP","54","42836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16942","7.659176","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16943","7.659462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16944","7.659471","172.30.1.205","172.30.1.104","TCP","54","42836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16945","7.661749","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16946","7.662195","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16947","7.662201","172.30.1.205","172.30.1.104","TCP","54","42836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16948","7.664018","172.30.1.205","172.30.1.104","TCP","54","42836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16949","7.664127","172.30.1.205","172.30.1.104","TCP","74","35474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910890 TSecr=0 WS=128" +"16950","7.664290","172.30.1.104","172.30.1.205","TCP","54","135 > 42836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16951","7.664329","172.30.1.104","172.30.1.205","TCP","54","135 > 42836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16952","7.664335","172.30.1.205","172.30.1.104","TCP","54","42836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16953","7.664411","172.30.1.104","172.30.1.205","TCP","66","49671 > 35474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16954","7.664419","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16955","7.664758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16956","7.665118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16957","7.665127","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16958","7.666996","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16959","7.667397","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16960","7.667404","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16961","7.668751","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16962","7.670599","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16963","7.670608","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16964","7.671543","172.30.1.205","172.30.1.104","TCP","74","42840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910897 TSecr=0 WS=128" +"16965","7.671838","172.30.1.104","172.30.1.205","TCP","66","135 > 42840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16966","7.671848","172.30.1.205","172.30.1.104","TCP","54","42840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16967","7.672194","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16968","7.672479","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16969","7.672488","172.30.1.205","172.30.1.104","TCP","54","42840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16970","7.674682","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16971","7.675104","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16972","7.675110","172.30.1.205","172.30.1.104","TCP","54","42840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16973","7.676938","172.30.1.205","172.30.1.104","TCP","54","42840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16974","7.677048","172.30.1.205","172.30.1.104","TCP","74","35478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910903 TSecr=0 WS=128" +"16975","7.677225","172.30.1.104","172.30.1.205","TCP","54","135 > 42840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16976","7.677300","172.30.1.104","172.30.1.205","TCP","54","135 > 42840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"16977","7.677306","172.30.1.205","172.30.1.104","TCP","54","42840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"16978","7.677381","172.30.1.104","172.30.1.205","TCP","66","49671 > 35478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16979","7.677389","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16980","7.677731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"16981","7.678026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16982","7.678036","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16983","7.679908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"16984","7.680268","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"16985","7.680275","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"16986","7.681671","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"16987","7.683561","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"16988","7.683570","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"16989","7.684516","172.30.1.205","172.30.1.104","TCP","74","42844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910910 TSecr=0 WS=128" +"16990","7.684842","172.30.1.104","172.30.1.205","TCP","66","135 > 42844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"16991","7.684852","172.30.1.205","172.30.1.104","TCP","54","42844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"16992","7.685212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"16993","7.685513","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"16994","7.685521","172.30.1.205","172.30.1.104","TCP","54","42844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"16995","7.687703","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"16996","7.688132","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"16997","7.688139","172.30.1.205","172.30.1.104","TCP","54","42844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16998","7.689975","172.30.1.205","172.30.1.104","TCP","54","42844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"16999","7.690086","172.30.1.205","172.30.1.104","TCP","74","35482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910916 TSecr=0 WS=128" +"17000","7.690233","172.30.1.104","172.30.1.205","TCP","54","135 > 42844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17001","7.690254","172.30.1.104","172.30.1.205","TCP","54","135 > 42844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17002","7.690260","172.30.1.205","172.30.1.104","TCP","54","42844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17003","7.690357","172.30.1.104","172.30.1.205","TCP","66","49671 > 35482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17004","7.690365","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17005","7.690726","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17006","7.691039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17007","7.691049","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17008","7.692961","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17009","7.693343","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17010","7.693349","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17011","7.694688","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17012","7.696519","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17013","7.696528","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17014","7.697500","172.30.1.205","172.30.1.104","TCP","74","42848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910923 TSecr=0 WS=128" +"17015","7.697851","172.30.1.104","172.30.1.205","TCP","66","135 > 42848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17016","7.697861","172.30.1.205","172.30.1.104","TCP","54","42848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17017","7.698215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17018","7.698531","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17019","7.698540","172.30.1.205","172.30.1.104","TCP","54","42848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17020","7.700712","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17021","7.701136","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17022","7.701143","172.30.1.205","172.30.1.104","TCP","54","42848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17023","7.702947","172.30.1.205","172.30.1.104","TCP","54","42848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17024","7.703058","172.30.1.205","172.30.1.104","TCP","74","35486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910929 TSecr=0 WS=128" +"17025","7.703259","172.30.1.104","172.30.1.205","TCP","54","135 > 42848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17026","7.703285","172.30.1.104","172.30.1.205","TCP","54","135 > 42848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17027","7.703291","172.30.1.205","172.30.1.104","TCP","54","42848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17028","7.703389","172.30.1.104","172.30.1.205","TCP","66","49671 > 35486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17029","7.703397","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17030","7.703748","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17031","7.705221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17032","7.705229","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17033","7.707112","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17034","7.707528","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17035","7.707534","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17036","7.708896","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17037","7.710734","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17038","7.710745","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17039","7.711687","172.30.1.205","172.30.1.104","TCP","74","42852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910938 TSecr=0 WS=128" +"17040","7.712007","172.30.1.104","172.30.1.205","TCP","66","135 > 42852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17041","7.712018","172.30.1.205","172.30.1.104","TCP","54","42852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17042","7.712363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17043","7.712684","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17044","7.712693","172.30.1.205","172.30.1.104","TCP","54","42852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17045","7.714893","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17046","7.715344","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17047","7.715351","172.30.1.205","172.30.1.104","TCP","54","42852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17048","7.717195","172.30.1.205","172.30.1.104","TCP","54","42852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17049","7.717308","172.30.1.205","172.30.1.104","TCP","74","35490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910943 TSecr=0 WS=128" +"17050","7.717483","172.30.1.104","172.30.1.205","TCP","54","135 > 42852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17051","7.717509","172.30.1.104","172.30.1.205","TCP","54","135 > 42852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17052","7.717518","172.30.1.205","172.30.1.104","TCP","54","42852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17053","7.717617","172.30.1.104","172.30.1.205","TCP","66","49671 > 35490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17054","7.717628","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17055","7.718028","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17056","7.718350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17057","7.718360","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17058","7.720285","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17059","7.720693","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17060","7.720700","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17061","7.722083","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17062","7.723890","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17063","7.723900","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17064","7.724878","172.30.1.205","172.30.1.104","TCP","74","42856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910951 TSecr=0 WS=128" +"17065","7.725205","172.30.1.104","172.30.1.205","TCP","66","135 > 42856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17066","7.725216","172.30.1.205","172.30.1.104","TCP","54","42856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17067","7.725576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17068","7.725878","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17069","7.725886","172.30.1.205","172.30.1.104","TCP","54","42856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17070","7.728073","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17071","7.728488","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17072","7.728495","172.30.1.205","172.30.1.104","TCP","54","42856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17073","7.729377","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17074","7.729428","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17075","7.729461","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17076","7.729490","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17077","7.729513","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17078","7.729539","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17079","7.729567","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17080","7.729593","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17081","7.729616","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17082","7.729637","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17083","7.729667","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17084","7.729677","172.30.1.104","172.30.1.205","TCP","54","49671 > 35450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17085","7.729763","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17086","7.729868","172.30.1.104","172.30.1.205","TCP","54","49671 > 35454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17087","7.729878","172.30.1.104","172.30.1.205","TCP","54","49671 > 35450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17088","7.729885","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17089","7.729993","172.30.1.104","172.30.1.205","TCP","54","49671 > 35454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17090","7.729998","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17091","7.730000","172.30.1.104","172.30.1.205","TCP","54","49671 > 35458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17092","7.730006","172.30.1.104","172.30.1.205","TCP","54","49671 > 35462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17093","7.730009","172.30.1.104","172.30.1.205","TCP","54","49671 > 35466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17094","7.730060","172.30.1.104","172.30.1.205","TCP","54","49671 > 35458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17095","7.730065","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17096","7.730112","172.30.1.104","172.30.1.205","TCP","54","49671 > 35470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17097","7.730157","172.30.1.104","172.30.1.205","TCP","54","49671 > 35470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17098","7.730165","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17099","7.730187","172.30.1.104","172.30.1.205","TCP","54","49671 > 35462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17100","7.730191","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17101","7.730216","172.30.1.104","172.30.1.205","TCP","54","49671 > 35466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17102","7.730220","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17103","7.730247","172.30.1.104","172.30.1.205","TCP","54","49671 > 35474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17104","7.730277","172.30.1.104","172.30.1.205","TCP","54","49671 > 35482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17105","7.730307","172.30.1.104","172.30.1.205","TCP","54","49671 > 35486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17106","7.730336","172.30.1.104","172.30.1.205","TCP","54","49671 > 35478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17107","7.730367","172.30.1.104","172.30.1.205","TCP","54","49671 > 35486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17108","7.730372","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17109","7.730398","172.30.1.104","172.30.1.205","TCP","54","49671 > 35482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17110","7.730402","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17111","7.730428","172.30.1.104","172.30.1.205","TCP","54","49671 > 35474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17112","7.730432","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17113","7.730459","172.30.1.104","172.30.1.205","TCP","54","49671 > 35478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17114","7.730462","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17115","7.730876","172.30.1.104","172.30.1.205","TCP","54","49671 > 35490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17116","7.730903","172.30.1.104","172.30.1.205","TCP","54","49671 > 35446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17117","7.731013","172.30.1.104","172.30.1.205","TCP","54","49671 > 35490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17118","7.731019","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17119","7.731043","172.30.1.104","172.30.1.205","TCP","54","49671 > 35446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17120","7.731046","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17121","7.731359","172.30.1.205","172.30.1.104","TCP","54","42856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17122","7.731476","172.30.1.205","172.30.1.104","TCP","74","35494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910957 TSecr=0 WS=128" +"17123","7.731627","172.30.1.104","172.30.1.205","TCP","54","135 > 42856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17124","7.731656","172.30.1.104","172.30.1.205","TCP","54","135 > 42856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17125","7.731661","172.30.1.205","172.30.1.104","TCP","54","42856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17126","7.731767","172.30.1.104","172.30.1.205","TCP","66","49671 > 35494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17127","7.731775","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17128","7.732143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17129","7.732451","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17130","7.732459","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17131","7.734384","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17132","7.735727","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17133","7.735733","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17134","7.737132","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17135","7.738885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17136","7.738894","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17137","7.739849","172.30.1.205","172.30.1.104","TCP","74","42860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910966 TSecr=0 WS=128" +"17138","7.740157","172.30.1.104","172.30.1.205","TCP","66","135 > 42860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17139","7.740171","172.30.1.205","172.30.1.104","TCP","54","42860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17140","7.740535","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17141","7.740850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17142","7.740860","172.30.1.205","172.30.1.104","TCP","54","42860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17143","7.743061","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17144","7.743468","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17145","7.743475","172.30.1.205","172.30.1.104","TCP","54","42860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17146","7.745302","172.30.1.205","172.30.1.104","TCP","54","42860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17147","7.745416","172.30.1.205","172.30.1.104","TCP","74","35498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910971 TSecr=0 WS=128" +"17148","7.745603","172.30.1.104","172.30.1.205","TCP","54","135 > 42860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17149","7.745631","172.30.1.104","172.30.1.205","TCP","54","135 > 42860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17150","7.745637","172.30.1.205","172.30.1.104","TCP","54","42860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17151","7.745742","172.30.1.104","172.30.1.205","TCP","66","49671 > 35498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17152","7.745750","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17153","7.746097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17154","7.746424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17155","7.746438","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17156","7.748407","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17157","7.748816","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17158","7.748823","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17159","7.750185","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17160","7.751982","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17161","7.751994","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17162","7.752961","172.30.1.205","172.30.1.104","TCP","74","42864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910979 TSecr=0 WS=128" +"17163","7.753333","172.30.1.104","172.30.1.205","TCP","66","135 > 42864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17164","7.753344","172.30.1.205","172.30.1.104","TCP","54","42864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17165","7.753694","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17166","7.754032","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17167","7.754042","172.30.1.205","172.30.1.104","TCP","54","42864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17168","7.756235","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17169","7.756664","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17170","7.756671","172.30.1.205","172.30.1.104","TCP","54","42864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17171","7.758504","172.30.1.205","172.30.1.104","TCP","54","42864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17172","7.758616","172.30.1.205","172.30.1.104","TCP","74","35502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910985 TSecr=0 WS=128" +"17173","7.758794","172.30.1.104","172.30.1.205","TCP","54","135 > 42864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17174","7.758820","172.30.1.104","172.30.1.205","TCP","54","135 > 42864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17175","7.758826","172.30.1.205","172.30.1.104","TCP","54","42864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17176","7.758917","172.30.1.104","172.30.1.205","TCP","66","49671 > 35502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17177","7.758925","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17178","7.759275","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17179","7.759823","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17180","7.759832","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17181","7.761728","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17182","7.762277","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17183","7.762286","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17184","7.763751","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17185","7.767907","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17186","7.767916","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17187","7.768887","172.30.1.205","172.30.1.104","TCP","74","42868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910995 TSecr=0 WS=128" +"17188","7.769210","172.30.1.104","172.30.1.205","TCP","66","135 > 42868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17189","7.769222","172.30.1.205","172.30.1.104","TCP","54","42868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17190","7.769583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17191","7.769911","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17192","7.769920","172.30.1.205","172.30.1.104","TCP","54","42868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17193","7.772130","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17194","7.772559","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17195","7.772570","172.30.1.205","172.30.1.104","TCP","54","42868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17196","7.774492","172.30.1.205","172.30.1.104","TCP","54","42868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17197","7.774624","172.30.1.205","172.30.1.104","TCP","74","35506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911001 TSecr=0 WS=128" +"17198","7.775001","172.30.1.104","172.30.1.205","TCP","54","135 > 42868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17199","7.775011","172.30.1.104","172.30.1.205","TCP","54","135 > 42868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17200","7.775016","172.30.1.205","172.30.1.104","TCP","54","42868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17201","7.775022","172.30.1.104","172.30.1.205","TCP","66","49671 > 35506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17202","7.775030","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17203","7.775391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17204","7.775686","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17205","7.775695","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17206","7.777625","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17207","7.778011","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17208","7.778017","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17209","7.779365","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17210","7.781124","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17211","7.781135","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17212","7.782092","172.30.1.205","172.30.1.104","TCP","74","42872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911008 TSecr=0 WS=128" +"17213","7.782414","172.30.1.104","172.30.1.205","TCP","66","135 > 42872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17214","7.782425","172.30.1.205","172.30.1.104","TCP","54","42872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17215","7.782775","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17216","7.783148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17217","7.783157","172.30.1.205","172.30.1.104","TCP","54","42872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17218","7.785426","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17219","7.785857","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17220","7.785863","172.30.1.205","172.30.1.104","TCP","54","42872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17221","7.787668","172.30.1.205","172.30.1.104","TCP","54","42872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17222","7.787777","172.30.1.205","172.30.1.104","TCP","74","35510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911014 TSecr=0 WS=128" +"17223","7.787956","172.30.1.104","172.30.1.205","TCP","54","135 > 42872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17224","7.787986","172.30.1.104","172.30.1.205","TCP","54","135 > 42872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17225","7.787992","172.30.1.205","172.30.1.104","TCP","54","42872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17226","7.788125","172.30.1.104","172.30.1.205","TCP","66","49671 > 35510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17227","7.788133","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17228","7.788474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17229","7.788807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17230","7.788816","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17231","7.790695","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17232","7.791326","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17233","7.791332","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17234","7.792669","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17235","7.794440","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17236","7.794450","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17237","7.795378","172.30.1.205","172.30.1.104","TCP","74","42876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911021 TSecr=0 WS=128" +"17238","7.795714","172.30.1.104","172.30.1.205","TCP","66","135 > 42876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17239","7.795725","172.30.1.205","172.30.1.104","TCP","54","42876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17240","7.796069","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17241","7.796401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17242","7.796410","172.30.1.205","172.30.1.104","TCP","54","42876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17243","7.798604","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17244","7.799006","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17245","7.799013","172.30.1.205","172.30.1.104","TCP","54","42876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17246","7.800834","172.30.1.205","172.30.1.104","TCP","54","42876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17247","7.800945","172.30.1.205","172.30.1.104","TCP","74","35514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911027 TSecr=0 WS=128" +"17248","7.801130","172.30.1.104","172.30.1.205","TCP","54","135 > 42876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17249","7.801159","172.30.1.104","172.30.1.205","TCP","54","135 > 42876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17250","7.801165","172.30.1.205","172.30.1.104","TCP","54","42876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17251","7.801306","172.30.1.104","172.30.1.205","TCP","66","49671 > 35514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17252","7.801322","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17253","7.801933","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17254","7.802258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17255","7.802266","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17256","7.804137","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17257","7.804539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17258","7.804546","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17259","7.805927","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17260","7.807686","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17261","7.807704","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17262","7.808767","172.30.1.205","172.30.1.104","TCP","74","42880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911035 TSecr=0 WS=128" +"17263","7.809087","172.30.1.104","172.30.1.205","TCP","66","135 > 42880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17264","7.809098","172.30.1.205","172.30.1.104","TCP","54","42880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17265","7.809445","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17266","7.809771","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17267","7.809780","172.30.1.205","172.30.1.104","TCP","54","42880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17268","7.811961","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17269","7.812358","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17270","7.812365","172.30.1.205","172.30.1.104","TCP","54","42880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17271","7.814199","172.30.1.205","172.30.1.104","TCP","54","42880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17272","7.814309","172.30.1.205","172.30.1.104","TCP","74","35518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911040 TSecr=0 WS=128" +"17273","7.814478","172.30.1.104","172.30.1.205","TCP","54","135 > 42880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17274","7.814507","172.30.1.104","172.30.1.205","TCP","54","135 > 42880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17275","7.814519","172.30.1.205","172.30.1.104","TCP","54","42880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17276","7.814657","172.30.1.104","172.30.1.205","TCP","66","49671 > 35518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17277","7.814665","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17278","7.815006","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17279","7.816554","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17280","7.816561","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17281","7.818453","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17282","7.818853","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17283","7.818860","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17284","7.820229","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17285","7.822076","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17286","7.822087","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17287","7.823048","172.30.1.205","172.30.1.104","TCP","74","42884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911049 TSecr=0 WS=128" +"17288","7.823351","172.30.1.104","172.30.1.205","TCP","66","135 > 42884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17289","7.823362","172.30.1.205","172.30.1.104","TCP","54","42884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17290","7.823718","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17291","7.824025","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17292","7.824034","172.30.1.205","172.30.1.104","TCP","54","42884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17293","7.826257","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17294","7.826698","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17295","7.826705","172.30.1.205","172.30.1.104","TCP","54","42884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17296","7.828506","172.30.1.205","172.30.1.104","TCP","54","42884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17297","7.828616","172.30.1.205","172.30.1.104","TCP","74","35522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911055 TSecr=0 WS=128" +"17298","7.828795","172.30.1.104","172.30.1.205","TCP","54","135 > 42884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17299","7.828828","172.30.1.104","172.30.1.205","TCP","54","135 > 42884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17300","7.828835","172.30.1.205","172.30.1.104","TCP","54","42884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17301","7.828978","172.30.1.104","172.30.1.205","TCP","66","49671 > 35522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17302","7.828986","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17303","7.829338","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17304","7.829647","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17305","7.829655","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17306","7.831529","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17307","7.831907","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17308","7.831913","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17309","7.833299","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17310","7.835047","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17311","7.835058","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17312","7.836015","172.30.1.205","172.30.1.104","TCP","74","42888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911062 TSecr=0 WS=128" +"17313","7.836324","172.30.1.104","172.30.1.205","TCP","66","135 > 42888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17314","7.836334","172.30.1.205","172.30.1.104","TCP","54","42888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17315","7.836678","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17316","7.836979","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17317","7.836989","172.30.1.205","172.30.1.104","TCP","54","42888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17318","7.839169","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17319","7.839540","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17320","7.839547","172.30.1.205","172.30.1.104","TCP","54","42888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17321","7.841369","172.30.1.205","172.30.1.104","TCP","54","42888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17322","7.841477","172.30.1.205","172.30.1.104","TCP","74","35526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911067 TSecr=0 WS=128" +"17323","7.841621","172.30.1.104","172.30.1.205","TCP","54","135 > 42888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17324","7.841641","172.30.1.104","172.30.1.205","TCP","54","135 > 42888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17325","7.841646","172.30.1.205","172.30.1.104","TCP","54","42888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17326","7.841775","172.30.1.104","172.30.1.205","TCP","66","49671 > 35526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17327","7.841792","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17328","7.842137","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17329","7.842422","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17330","7.842430","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17331","7.844290","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17332","7.844647","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17333","7.844653","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17334","7.846016","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17335","7.847747","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17336","7.847756","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17337","7.848678","172.30.1.205","172.30.1.104","TCP","74","42892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911075 TSecr=0 WS=128" +"17338","7.848957","172.30.1.104","172.30.1.205","TCP","66","135 > 42892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17339","7.848968","172.30.1.205","172.30.1.104","TCP","54","42892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17340","7.849318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17341","7.849623","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17342","7.849631","172.30.1.205","172.30.1.104","TCP","54","42892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17343","7.851843","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17344","7.852228","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17345","7.852234","172.30.1.205","172.30.1.104","TCP","54","42892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17346","7.854055","172.30.1.205","172.30.1.104","TCP","54","42892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17347","7.854167","172.30.1.205","172.30.1.104","TCP","74","35530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911080 TSecr=0 WS=128" +"17348","7.854336","172.30.1.104","172.30.1.205","TCP","54","135 > 42892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17349","7.854360","172.30.1.104","172.30.1.205","TCP","54","135 > 42892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17350","7.854372","172.30.1.205","172.30.1.104","TCP","54","42892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17351","7.854469","172.30.1.104","172.30.1.205","TCP","66","49671 > 35530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17352","7.854478","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17353","7.854818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17354","7.855129","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17355","7.855141","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17356","7.857148","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17357","7.857555","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17358","7.857562","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17359","7.858942","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17360","7.860733","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17361","7.860743","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17362","7.861709","172.30.1.205","172.30.1.104","TCP","74","42896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911088 TSecr=0 WS=128" +"17363","7.862057","172.30.1.104","172.30.1.205","TCP","66","135 > 42896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17364","7.862068","172.30.1.205","172.30.1.104","TCP","54","42896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17365","7.862419","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17366","7.862758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17367","7.862771","172.30.1.205","172.30.1.104","TCP","54","42896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17368","7.865074","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17369","7.865487","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17370","7.865494","172.30.1.205","172.30.1.104","TCP","54","42896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17371","7.867301","172.30.1.205","172.30.1.104","TCP","54","42896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17372","7.867420","172.30.1.205","172.30.1.104","TCP","74","35534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911093 TSecr=0 WS=128" +"17373","7.867619","172.30.1.104","172.30.1.205","TCP","54","135 > 42896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17374","7.867645","172.30.1.104","172.30.1.205","TCP","54","135 > 42896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17375","7.867651","172.30.1.205","172.30.1.104","TCP","54","42896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17376","7.867694","172.30.1.104","172.30.1.205","TCP","66","49671 > 35534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17377","7.867703","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17378","7.868059","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17379","7.868341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17380","7.868350","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17381","7.870286","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17382","7.870636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17383","7.870643","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17384","7.871985","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17385","7.873763","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17386","7.873772","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17387","7.874727","172.30.1.205","172.30.1.104","TCP","74","42900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911101 TSecr=0 WS=128" +"17388","7.875034","172.30.1.104","172.30.1.205","TCP","66","135 > 42900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17389","7.875045","172.30.1.205","172.30.1.104","TCP","54","42900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17390","7.875393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17391","7.875700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17392","7.875708","172.30.1.205","172.30.1.104","TCP","54","42900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17393","7.877929","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17394","7.878339","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17395","7.878346","172.30.1.205","172.30.1.104","TCP","54","42900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17396","7.880151","172.30.1.205","172.30.1.104","TCP","54","42900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17397","7.880262","172.30.1.205","172.30.1.104","TCP","74","35538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911106 TSecr=0 WS=128" +"17398","7.880439","172.30.1.104","172.30.1.205","TCP","54","135 > 42900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17399","7.880462","172.30.1.104","172.30.1.205","TCP","54","135 > 42900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17400","7.880468","172.30.1.205","172.30.1.104","TCP","54","42900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17401","7.880546","172.30.1.104","172.30.1.205","TCP","66","49671 > 35538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17402","7.880554","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17403","7.880929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17404","7.881218","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17405","7.881226","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17406","7.883104","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17407","7.883473","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17408","7.883479","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17409","7.884846","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17410","7.886564","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17411","7.886575","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17412","7.887547","172.30.1.205","172.30.1.104","TCP","74","42904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911113 TSecr=0 WS=128" +"17413","7.887872","172.30.1.104","172.30.1.205","TCP","66","135 > 42904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17414","7.887882","172.30.1.205","172.30.1.104","TCP","54","42904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17415","7.888230","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17416","7.888514","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17417","7.888522","172.30.1.205","172.30.1.104","TCP","54","42904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17418","7.890720","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17419","7.891094","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17420","7.891100","172.30.1.205","172.30.1.104","TCP","54","42904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17421","7.891950","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17422","7.891998","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17423","7.892033","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17424","7.892066","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17425","7.892093","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17426","7.892120","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17427","7.892150","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17428","7.892177","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17429","7.892204","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17430","7.892232","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17431","7.892262","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17432","7.892331","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17433","7.892509","172.30.1.104","172.30.1.205","TCP","54","49671 > 35498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17434","7.892522","172.30.1.104","172.30.1.205","TCP","54","49671 > 35502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17435","7.892547","172.30.1.104","172.30.1.205","TCP","54","49671 > 35498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17436","7.892554","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17437","7.892567","172.30.1.104","172.30.1.205","TCP","54","49671 > 35506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17438","7.892590","172.30.1.104","172.30.1.205","TCP","54","49671 > 35510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17439","7.892609","172.30.1.104","172.30.1.205","TCP","54","49671 > 35514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17440","7.892628","172.30.1.104","172.30.1.205","TCP","54","49671 > 35510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17441","7.892633","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17442","7.892649","172.30.1.104","172.30.1.205","TCP","54","49671 > 35518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17443","7.892667","172.30.1.104","172.30.1.205","TCP","54","49671 > 35522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17444","7.892687","172.30.1.104","172.30.1.205","TCP","54","49671 > 35526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17445","7.892707","172.30.1.104","172.30.1.205","TCP","54","49671 > 35502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17446","7.892716","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17447","7.892740","172.30.1.104","172.30.1.205","TCP","54","49671 > 35530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17448","7.892758","172.30.1.104","172.30.1.205","TCP","54","49671 > 35530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17449","7.892761","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17450","7.892788","172.30.1.104","172.30.1.205","TCP","54","49671 > 35534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17451","7.892803","172.30.1.104","172.30.1.205","TCP","54","49671 > 35538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17452","7.892814","172.30.1.104","172.30.1.205","TCP","54","49671 > 35526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17453","7.892823","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17454","7.892846","172.30.1.104","172.30.1.205","TCP","54","49671 > 35522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17455","7.892850","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17456","7.892866","172.30.1.104","172.30.1.205","TCP","54","49671 > 35518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17457","7.892870","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17458","7.892885","172.30.1.104","172.30.1.205","TCP","54","49671 > 35514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17459","7.892888","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17460","7.892905","172.30.1.104","172.30.1.205","TCP","54","49671 > 35538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17461","7.892908","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17462","7.892924","172.30.1.104","172.30.1.205","TCP","54","49671 > 35534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17463","7.892927","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17464","7.892944","172.30.1.104","172.30.1.205","TCP","54","49671 > 35506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17465","7.892948","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17466","7.892964","172.30.1.104","172.30.1.205","TCP","54","49671 > 35494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17467","7.892985","172.30.1.104","172.30.1.205","TCP","54","49671 > 35494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17468","7.892989","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17469","7.893943","172.30.1.205","172.30.1.104","TCP","54","42904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17470","7.894053","172.30.1.205","172.30.1.104","TCP","74","35542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911120 TSecr=0 WS=128" +"17471","7.894206","172.30.1.104","172.30.1.205","TCP","54","135 > 42904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17472","7.894227","172.30.1.104","172.30.1.205","TCP","54","135 > 42904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17473","7.894235","172.30.1.205","172.30.1.104","TCP","54","42904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17474","7.894398","172.30.1.104","172.30.1.205","TCP","66","49671 > 35542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17475","7.894406","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17476","7.894755","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17477","7.895076","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17478","7.895085","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17479","7.896987","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17480","7.897457","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17481","7.897463","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17482","7.898817","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17483","7.900621","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17484","7.900635","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17485","7.901627","172.30.1.205","172.30.1.104","TCP","74","42908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911128 TSecr=0 WS=128" +"17486","7.901973","172.30.1.104","172.30.1.205","TCP","66","135 > 42908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17487","7.901984","172.30.1.205","172.30.1.104","TCP","54","42908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17488","7.902340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17489","7.902719","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17490","7.902727","172.30.1.205","172.30.1.104","TCP","54","42908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17491","7.904938","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17492","7.905370","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17493","7.905377","172.30.1.205","172.30.1.104","TCP","54","42908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17494","7.907192","172.30.1.205","172.30.1.104","TCP","54","42908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17495","7.907303","172.30.1.205","172.30.1.104","TCP","74","35546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911133 TSecr=0 WS=128" +"17496","7.907474","172.30.1.104","172.30.1.205","TCP","54","135 > 42908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17497","7.907501","172.30.1.104","172.30.1.205","TCP","54","135 > 42908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17498","7.907507","172.30.1.205","172.30.1.104","TCP","54","42908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17499","7.907662","172.30.1.104","172.30.1.205","TCP","66","49671 > 35546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17500","7.907670","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17501","7.908013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17502","7.908331","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17503","7.908341","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17504","7.910247","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17505","7.910646","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17506","7.910653","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17507","7.912002","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17508","7.913824","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17509","7.913837","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17510","7.914865","172.30.1.205","172.30.1.104","TCP","74","42912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911141 TSecr=0 WS=128" +"17511","7.915220","172.30.1.104","172.30.1.205","TCP","66","135 > 42912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17512","7.915232","172.30.1.205","172.30.1.104","TCP","54","42912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17513","7.915590","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17514","7.915904","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17515","7.915913","172.30.1.205","172.30.1.104","TCP","54","42912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17516","7.918147","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17517","7.918564","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17518","7.918571","172.30.1.205","172.30.1.104","TCP","54","42912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17519","7.920383","172.30.1.205","172.30.1.104","TCP","54","42912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17520","7.920501","172.30.1.205","172.30.1.104","TCP","74","35550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911146 TSecr=0 WS=128" +"17521","7.920716","172.30.1.104","172.30.1.205","TCP","54","135 > 42912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17522","7.920725","172.30.1.104","172.30.1.205","TCP","54","135 > 42912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17523","7.920731","172.30.1.205","172.30.1.104","TCP","54","42912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17524","7.920835","172.30.1.104","172.30.1.205","TCP","66","49671 > 35550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17525","7.920845","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17526","7.921199","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17527","7.921516","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17528","7.921526","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17529","7.923415","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17530","7.923817","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17531","7.923823","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17532","7.925204","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17533","7.927009","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17534","7.927019","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17535","7.927985","172.30.1.205","172.30.1.104","TCP","74","42916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911154 TSecr=0 WS=128" +"17536","7.928297","172.30.1.104","172.30.1.205","TCP","66","135 > 42916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17537","7.928308","172.30.1.205","172.30.1.104","TCP","54","42916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17538","7.928657","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17539","7.929007","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17540","7.929016","172.30.1.205","172.30.1.104","TCP","54","42916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17541","7.931204","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17542","7.931610","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17543","7.931617","172.30.1.205","172.30.1.104","TCP","54","42916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17544","7.933453","172.30.1.205","172.30.1.104","TCP","54","42916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17545","7.933563","172.30.1.205","172.30.1.104","TCP","74","35554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911159 TSecr=0 WS=128" +"17546","7.933739","172.30.1.104","172.30.1.205","TCP","54","135 > 42916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17547","7.933824","172.30.1.104","172.30.1.205","TCP","54","135 > 42916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17548","7.933830","172.30.1.205","172.30.1.104","TCP","54","42916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17549","7.933919","172.30.1.104","172.30.1.205","TCP","66","49671 > 35554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17550","7.933927","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17551","7.934277","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17552","7.934584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17553","7.934593","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17554","7.936479","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17555","7.936885","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17556","7.936892","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17557","7.938258","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17558","7.940088","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17559","7.940100","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17560","7.941094","172.30.1.205","172.30.1.104","TCP","74","42920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911167 TSecr=0 WS=128" +"17561","7.941418","172.30.1.104","172.30.1.205","TCP","66","135 > 42920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17562","7.941429","172.30.1.205","172.30.1.104","TCP","54","42920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17563","7.941776","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17564","7.942094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17565","7.942103","172.30.1.205","172.30.1.104","TCP","54","42920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17566","7.944273","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17567","7.944707","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17568","7.944713","172.30.1.205","172.30.1.104","TCP","54","42920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17569","7.946534","172.30.1.205","172.30.1.104","TCP","54","42920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17570","7.946645","172.30.1.205","172.30.1.104","TCP","74","35558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911173 TSecr=0 WS=128" +"17571","7.946848","172.30.1.104","172.30.1.205","TCP","54","135 > 42920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17572","7.946857","172.30.1.104","172.30.1.205","TCP","54","135 > 42920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17573","7.946863","172.30.1.205","172.30.1.104","TCP","54","42920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17574","7.946957","172.30.1.104","172.30.1.205","TCP","66","49671 > 35558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17575","7.946965","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17576","7.947306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17577","7.947671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17578","7.947680","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17579","7.949581","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17580","7.949962","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17581","7.949968","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17582","7.951309","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17583","7.953860","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17584","7.953869","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17585","7.954811","172.30.1.205","172.30.1.104","TCP","74","42924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911181 TSecr=0 WS=128" +"17586","7.955117","172.30.1.104","172.30.1.205","TCP","66","135 > 42924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17587","7.955128","172.30.1.205","172.30.1.104","TCP","54","42924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17588","7.955478","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17589","7.955801","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17590","7.955810","172.30.1.205","172.30.1.104","TCP","54","42924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17591","7.958016","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17592","7.958431","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17593","7.958438","172.30.1.205","172.30.1.104","TCP","54","42924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17594","7.960248","172.30.1.205","172.30.1.104","TCP","54","42924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17595","7.960359","172.30.1.205","172.30.1.104","TCP","74","35562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911186 TSecr=0 WS=128" +"17596","7.960574","172.30.1.104","172.30.1.205","TCP","54","135 > 42924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17597","7.960609","172.30.1.104","172.30.1.205","TCP","54","135 > 42924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17598","7.960615","172.30.1.205","172.30.1.104","TCP","54","42924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17599","7.960718","172.30.1.104","172.30.1.205","TCP","66","49671 > 35562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17600","7.960726","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17601","7.961091","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17602","7.961400","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17603","7.961416","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17604","7.963285","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17605","7.963659","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17606","7.963666","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17607","7.965044","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17608","7.966829","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17609","7.966838","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17610","7.967779","172.30.1.205","172.30.1.104","TCP","74","42928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911194 TSecr=0 WS=128" +"17611","7.968075","172.30.1.104","172.30.1.205","TCP","66","135 > 42928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17612","7.968085","172.30.1.205","172.30.1.104","TCP","54","42928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17613","7.968427","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17614","7.968852","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17615","7.968861","172.30.1.205","172.30.1.104","TCP","54","42928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17616","7.971043","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17617","7.971519","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17618","7.971525","172.30.1.205","172.30.1.104","TCP","54","42928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17619","7.973338","172.30.1.205","172.30.1.104","TCP","54","42928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17620","7.973448","172.30.1.205","172.30.1.104","TCP","74","35566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911199 TSecr=0 WS=128" +"17621","7.973621","172.30.1.104","172.30.1.205","TCP","54","135 > 42928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17622","7.973667","172.30.1.104","172.30.1.205","TCP","54","135 > 42928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17623","7.973672","172.30.1.205","172.30.1.104","TCP","54","42928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17624","7.973792","172.30.1.104","172.30.1.205","TCP","66","49671 > 35566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17625","7.973800","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17626","7.974146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17627","7.974495","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17628","7.974503","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17629","7.976378","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17630","7.976751","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17631","7.976757","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17632","7.978120","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17633","7.979889","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17634","7.979899","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17635","7.980858","172.30.1.205","172.30.1.104","TCP","74","42932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911207 TSecr=0 WS=128" +"17636","7.981175","172.30.1.104","172.30.1.205","TCP","66","135 > 42932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17637","7.981185","172.30.1.205","172.30.1.104","TCP","54","42932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17638","7.981531","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17639","7.981875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17640","7.981883","172.30.1.205","172.30.1.104","TCP","54","42932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17641","7.984056","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17642","7.984446","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17643","7.984452","172.30.1.205","172.30.1.104","TCP","54","42932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17644","7.986270","172.30.1.205","172.30.1.104","TCP","54","42932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17645","7.986377","172.30.1.205","172.30.1.104","TCP","74","35570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911212 TSecr=0 WS=128" +"17646","7.986570","172.30.1.104","172.30.1.205","TCP","54","135 > 42932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17647","7.986595","172.30.1.104","172.30.1.205","TCP","54","135 > 42932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17648","7.986600","172.30.1.205","172.30.1.104","TCP","54","42932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17649","7.986702","172.30.1.104","172.30.1.205","TCP","66","49671 > 35570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17650","7.986710","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17651","7.987062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17652","7.987384","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17653","7.987392","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17654","7.989261","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17655","7.989687","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17656","7.989695","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17657","7.991041","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17658","7.992846","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17659","7.992859","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17660","7.993799","172.30.1.205","172.30.1.104","TCP","74","42936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911220 TSecr=0 WS=128" +"17661","7.994103","172.30.1.104","172.30.1.205","TCP","66","135 > 42936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17662","7.994114","172.30.1.205","172.30.1.104","TCP","54","42936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17663","7.994462","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17664","7.994782","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17665","7.994791","172.30.1.205","172.30.1.104","TCP","54","42936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17666","7.996976","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17667","7.997392","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17668","7.997399","172.30.1.205","172.30.1.104","TCP","54","42936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17669","7.999185","172.30.1.205","172.30.1.104","TCP","54","42936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17670","7.999294","172.30.1.205","172.30.1.104","TCP","74","35574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911225 TSecr=0 WS=128" +"17671","7.999501","172.30.1.104","172.30.1.205","TCP","54","135 > 42936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17672","7.999544","172.30.1.104","172.30.1.205","TCP","54","135 > 42936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17673","7.999549","172.30.1.205","172.30.1.104","TCP","54","42936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17674","7.999643","172.30.1.104","172.30.1.205","TCP","66","49671 > 35574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17675","7.999651","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17676","7.999994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17677","8.002503","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17678","8.002511","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17679","8.004358","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17680","8.004762","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17681","8.004768","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17682","8.006126","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17683","8.007967","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17684","8.007976","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17685","8.008928","172.30.1.205","172.30.1.104","TCP","74","42940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911235 TSecr=0 WS=128" +"17686","8.009282","172.30.1.104","172.30.1.205","TCP","66","135 > 42940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17687","8.009292","172.30.1.205","172.30.1.104","TCP","54","42940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17688","8.009641","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17689","8.009957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17690","8.009966","172.30.1.205","172.30.1.104","TCP","54","42940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17691","8.012161","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17692","8.012615","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17693","8.012625","172.30.1.205","172.30.1.104","TCP","54","42940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17694","8.014576","172.30.1.205","172.30.1.104","TCP","54","42940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17695","8.014727","172.30.1.205","172.30.1.104","TCP","74","35578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911241 TSecr=0 WS=128" +"17696","8.014876","172.30.1.104","172.30.1.205","TCP","54","135 > 42940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17697","8.014906","172.30.1.104","172.30.1.205","TCP","54","135 > 42940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17698","8.014914","172.30.1.205","172.30.1.104","TCP","54","42940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17699","8.015070","172.30.1.104","172.30.1.205","TCP","66","49671 > 35578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17700","8.015079","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17701","8.015436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17702","8.015742","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17703","8.015751","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17704","8.017684","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17705","8.018145","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17706","8.018151","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17707","8.019514","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17708","8.021398","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17709","8.021408","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17710","8.022415","172.30.1.205","172.30.1.104","TCP","74","42944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911248 TSecr=0 WS=128" +"17711","8.022753","172.30.1.104","172.30.1.205","TCP","66","135 > 42944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17712","8.022765","172.30.1.205","172.30.1.104","TCP","54","42944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17713","8.023120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17714","8.026829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17715","8.026839","172.30.1.205","172.30.1.104","TCP","54","42944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17716","8.029122","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17717","8.029586","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17718","8.029593","172.30.1.205","172.30.1.104","TCP","54","42944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17719","8.031455","172.30.1.205","172.30.1.104","TCP","54","42944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17720","8.031607","172.30.1.205","172.30.1.104","TCP","74","35582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911258 TSecr=0 WS=128" +"17721","8.031747","172.30.1.104","172.30.1.205","TCP","54","135 > 42944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17722","8.031824","172.30.1.104","172.30.1.205","TCP","54","135 > 42944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17723","8.031831","172.30.1.205","172.30.1.104","TCP","54","42944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17724","8.031943","172.30.1.104","172.30.1.205","TCP","66","49671 > 35582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17725","8.031952","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17726","8.032303","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17727","8.032648","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17728","8.032657","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17729","8.034577","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17730","8.034953","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17731","8.034960","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17732","8.036324","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17733","8.038113","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17734","8.038123","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17735","8.039110","172.30.1.205","172.30.1.104","TCP","74","42948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911265 TSecr=0 WS=128" +"17736","8.039455","172.30.1.104","172.30.1.205","TCP","66","135 > 42948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17737","8.039467","172.30.1.205","172.30.1.104","TCP","54","42948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17738","8.039820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17739","8.040130","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17740","8.040139","172.30.1.205","172.30.1.104","TCP","54","42948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17741","8.042386","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17742","8.042783","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17743","8.042790","172.30.1.205","172.30.1.104","TCP","54","42948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17744","8.044607","172.30.1.205","172.30.1.104","TCP","54","42948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17745","8.044726","172.30.1.205","172.30.1.104","TCP","74","35586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911271 TSecr=0 WS=128" +"17746","8.044892","172.30.1.104","172.30.1.205","TCP","54","135 > 42948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17747","8.044936","172.30.1.104","172.30.1.205","TCP","54","135 > 42948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17748","8.044943","172.30.1.205","172.30.1.104","TCP","54","42948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17749","8.045040","172.30.1.104","172.30.1.205","TCP","66","49671 > 35586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17750","8.045048","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17751","8.045395","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17752","8.045694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17753","8.045703","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17754","8.047602","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17755","8.048004","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17756","8.048010","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17757","8.049414","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17758","8.051179","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17759","8.051189","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17760","8.052162","172.30.1.205","172.30.1.104","TCP","74","42952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911278 TSecr=0 WS=128" +"17761","8.052476","172.30.1.104","172.30.1.205","TCP","66","135 > 42952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17762","8.052487","172.30.1.205","172.30.1.104","TCP","54","42952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17763","8.052879","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17764","8.053194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17765","8.053203","172.30.1.205","172.30.1.104","TCP","54","42952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17766","8.055393","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17767","8.055818","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17768","8.055825","172.30.1.205","172.30.1.104","TCP","54","42952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17769","8.056677","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17770","8.056731","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17771","8.056763","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17772","8.056821","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17773","8.056857","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17774","8.056886","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17775","8.056910","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17776","8.056938","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17777","8.056960","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17778","8.056982","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17779","8.056991","172.30.1.104","172.30.1.205","TCP","54","49671 > 35546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17780","8.057025","172.30.1.104","172.30.1.205","TCP","54","49671 > 35550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17781","8.057040","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17782","8.057054","172.30.1.104","172.30.1.205","TCP","54","49671 > 35546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17783","8.057061","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17784","8.057086","172.30.1.104","172.30.1.205","TCP","54","49671 > 35550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17785","8.057089","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17786","8.057146","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17787","8.057340","172.30.1.104","172.30.1.205","TCP","54","49671 > 35554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17788","8.057371","172.30.1.104","172.30.1.205","TCP","54","49671 > 35558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17789","8.057402","172.30.1.104","172.30.1.205","TCP","54","49671 > 35562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17790","8.057434","172.30.1.104","172.30.1.205","TCP","54","49671 > 35566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17791","8.057465","172.30.1.104","172.30.1.205","TCP","54","49671 > 35566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17792","8.057471","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17793","8.057493","172.30.1.104","172.30.1.205","TCP","54","49671 > 35554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17794","8.057497","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17795","8.057522","172.30.1.104","172.30.1.205","TCP","54","49671 > 35558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17796","8.057526","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17797","8.057556","172.30.1.104","172.30.1.205","TCP","54","49671 > 35562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17798","8.057559","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17799","8.057587","172.30.1.104","172.30.1.205","TCP","54","49671 > 35570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17800","8.057633","172.30.1.104","172.30.1.205","TCP","54","49671 > 35574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17801","8.057668","172.30.1.104","172.30.1.205","TCP","54","49671 > 35578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17802","8.057709","172.30.1.104","172.30.1.205","TCP","54","49671 > 35582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17803","8.057749","172.30.1.104","172.30.1.205","TCP","54","49671 > 35586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17804","8.057774","172.30.1.104","172.30.1.205","TCP","54","49671 > 35586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17805","8.057778","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17806","8.057806","172.30.1.104","172.30.1.205","TCP","54","49671 > 35582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17807","8.057809","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17808","8.057837","172.30.1.104","172.30.1.205","TCP","54","49671 > 35570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17809","8.057840","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17810","8.057869","172.30.1.104","172.30.1.205","TCP","54","49671 > 35574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17811","8.057873","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17812","8.057901","172.30.1.104","172.30.1.205","TCP","54","49671 > 35578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17813","8.057904","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17814","8.058324","172.30.1.104","172.30.1.205","TCP","54","49671 > 35542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17815","8.058379","172.30.1.104","172.30.1.205","TCP","54","49671 > 35542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"17816","8.058385","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"17817","8.058829","172.30.1.205","172.30.1.104","TCP","54","42952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17818","8.058944","172.30.1.205","172.30.1.104","TCP","74","35590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911285 TSecr=0 WS=128" +"17819","8.059101","172.30.1.104","172.30.1.205","TCP","54","135 > 42952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17820","8.059128","172.30.1.104","172.30.1.205","TCP","54","135 > 42952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17821","8.059133","172.30.1.205","172.30.1.104","TCP","54","42952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17822","8.059270","172.30.1.104","172.30.1.205","TCP","66","49671 > 35590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17823","8.059279","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17824","8.059640","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17825","8.059954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17826","8.059963","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17827","8.061921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17828","8.062325","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17829","8.062331","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17830","8.063712","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17831","8.065499","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17832","8.065509","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17833","8.066512","172.30.1.205","172.30.1.104","TCP","74","42956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911292 TSecr=0 WS=128" +"17834","8.066854","172.30.1.104","172.30.1.205","TCP","66","135 > 42956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17835","8.066867","172.30.1.205","172.30.1.104","TCP","54","42956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17836","8.067230","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17837","8.067558","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17838","8.067567","172.30.1.205","172.30.1.104","TCP","54","42956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17839","8.069824","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17840","8.070241","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17841","8.070248","172.30.1.205","172.30.1.104","TCP","54","42956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17842","8.072075","172.30.1.205","172.30.1.104","TCP","54","42956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17843","8.072215","172.30.1.205","172.30.1.104","TCP","74","35594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911298 TSecr=0 WS=128" +"17844","8.072368","172.30.1.104","172.30.1.205","TCP","54","135 > 42956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17845","8.072401","172.30.1.104","172.30.1.205","TCP","54","135 > 42956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17846","8.072409","172.30.1.205","172.30.1.104","TCP","54","42956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17847","8.072585","172.30.1.104","172.30.1.205","TCP","66","49671 > 35594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17848","8.072594","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17849","8.072979","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17850","8.073307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17851","8.073316","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17852","8.075183","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17853","8.075560","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17854","8.075566","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17855","8.076980","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17856","8.078819","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17857","8.078830","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17858","8.079810","172.30.1.205","172.30.1.104","TCP","74","42960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911306 TSecr=0 WS=128" +"17859","8.080150","172.30.1.104","172.30.1.205","TCP","66","135 > 42960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17860","8.080162","172.30.1.205","172.30.1.104","TCP","54","42960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17861","8.080515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17862","8.080831","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17863","8.080841","172.30.1.205","172.30.1.104","TCP","54","42960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17864","8.083060","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17865","8.083501","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17866","8.083512","172.30.1.205","172.30.1.104","TCP","54","42960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17867","8.085439","172.30.1.205","172.30.1.104","TCP","54","42960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17868","8.085567","172.30.1.205","172.30.1.104","TCP","74","35598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911311 TSecr=0 WS=128" +"17869","8.085753","172.30.1.104","172.30.1.205","TCP","54","135 > 42960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17870","8.085779","172.30.1.104","172.30.1.205","TCP","54","135 > 42960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17871","8.085786","172.30.1.205","172.30.1.104","TCP","54","42960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17872","8.085919","172.30.1.104","172.30.1.205","TCP","66","49671 > 35598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17873","8.085928","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17874","8.086290","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17875","8.086589","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17876","8.086600","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17877","8.088471","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17878","8.088860","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17879","8.088867","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17880","8.090251","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17881","8.092276","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17882","8.092286","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17883","8.093258","172.30.1.205","172.30.1.104","TCP","74","42964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911319 TSecr=0 WS=128" +"17884","8.093604","172.30.1.104","172.30.1.205","TCP","66","135 > 42964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17885","8.093615","172.30.1.205","172.30.1.104","TCP","54","42964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17886","8.093966","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17887","8.094284","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17888","8.094299","172.30.1.205","172.30.1.104","TCP","54","42964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17889","8.096479","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17890","8.096920","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17891","8.096927","172.30.1.205","172.30.1.104","TCP","54","42964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17892","8.098745","172.30.1.205","172.30.1.104","TCP","54","42964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17893","8.098856","172.30.1.205","172.30.1.104","TCP","74","35602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911325 TSecr=0 WS=128" +"17894","8.099077","172.30.1.104","172.30.1.205","TCP","54","135 > 42964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17895","8.099103","172.30.1.104","172.30.1.205","TCP","54","135 > 42964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17896","8.099109","172.30.1.205","172.30.1.104","TCP","54","42964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17897","8.099238","172.30.1.104","172.30.1.205","TCP","66","49671 > 35602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17898","8.099248","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17899","8.099610","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17900","8.099995","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17901","8.100013","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17902","8.102182","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17903","8.103754","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17904","8.103760","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17905","8.105143","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17906","8.107081","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17907","8.107091","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17908","8.108030","172.30.1.205","172.30.1.104","TCP","74","42968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911334 TSecr=0 WS=128" +"17909","8.108447","172.30.1.104","172.30.1.205","TCP","66","135 > 42968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17910","8.108460","172.30.1.205","172.30.1.104","TCP","54","42968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17911","8.108853","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17912","8.109156","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17913","8.109165","172.30.1.205","172.30.1.104","TCP","54","42968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17914","8.111335","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17915","8.111772","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17916","8.111778","172.30.1.205","172.30.1.104","TCP","54","42968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17917","8.113602","172.30.1.205","172.30.1.104","TCP","54","42968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17918","8.113713","172.30.1.205","172.30.1.104","TCP","74","35606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911340 TSecr=0 WS=128" +"17919","8.113927","172.30.1.104","172.30.1.205","TCP","54","135 > 42968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17920","8.113972","172.30.1.104","172.30.1.205","TCP","54","135 > 42968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17921","8.113984","172.30.1.205","172.30.1.104","TCP","54","42968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17922","8.114028","172.30.1.104","172.30.1.205","TCP","66","49671 > 35606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17923","8.114040","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17924","8.114438","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17925","8.114780","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17926","8.114789","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17927","8.116704","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17928","8.117120","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17929","8.117127","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17930","8.118482","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17931","8.120309","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17932","8.120320","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17933","8.121299","172.30.1.205","172.30.1.104","TCP","74","42972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911347 TSecr=0 WS=128" +"17934","8.121608","172.30.1.104","172.30.1.205","TCP","66","135 > 42972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17935","8.121619","172.30.1.205","172.30.1.104","TCP","54","42972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17936","8.121965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17937","8.124383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17938","8.124392","172.30.1.205","172.30.1.104","TCP","54","42972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17939","8.126612","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17940","8.127035","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17941","8.127041","172.30.1.205","172.30.1.104","TCP","54","42972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17942","8.128876","172.30.1.205","172.30.1.104","TCP","54","42972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17943","8.128996","172.30.1.205","172.30.1.104","TCP","74","35610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911355 TSecr=0 WS=128" +"17944","8.129194","172.30.1.104","172.30.1.205","TCP","54","135 > 42972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17945","8.129288","172.30.1.104","172.30.1.205","TCP","66","49671 > 35610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17946","8.129298","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17947","8.129645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17948","8.129778","172.30.1.104","172.30.1.205","TCP","54","135 > 42972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17949","8.129784","172.30.1.205","172.30.1.104","TCP","54","42972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17950","8.129954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17951","8.129962","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17952","8.131842","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17953","8.132230","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17954","8.132236","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17955","8.133617","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17956","8.135477","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17957","8.135488","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17958","8.136432","172.30.1.205","172.30.1.104","TCP","74","42976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911362 TSecr=0 WS=128" +"17959","8.136750","172.30.1.104","172.30.1.205","TCP","66","135 > 42976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17960","8.136760","172.30.1.205","172.30.1.104","TCP","54","42976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17961","8.137123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17962","8.137458","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17963","8.137466","172.30.1.205","172.30.1.104","TCP","54","42976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17964","8.139661","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17965","8.140075","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17966","8.140081","172.30.1.205","172.30.1.104","TCP","54","42976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17967","8.141909","172.30.1.205","172.30.1.104","TCP","54","42976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17968","8.142026","172.30.1.205","172.30.1.104","TCP","74","35614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911368 TSecr=0 WS=128" +"17969","8.142240","172.30.1.104","172.30.1.205","TCP","54","135 > 42976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17970","8.142268","172.30.1.104","172.30.1.205","TCP","54","135 > 42976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17971","8.142273","172.30.1.205","172.30.1.104","TCP","54","42976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17972","8.142379","172.30.1.104","172.30.1.205","TCP","66","49671 > 35614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17973","8.142387","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17974","8.142732","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"17975","8.143072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17976","8.143080","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17977","8.144992","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"17978","8.145459","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"17979","8.145465","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"17980","8.146813","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"17981","8.148620","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"17982","8.148635","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"17983","8.149595","172.30.1.205","172.30.1.104","TCP","74","42980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911376 TSecr=0 WS=128" +"17984","8.149913","172.30.1.104","172.30.1.205","TCP","66","135 > 42980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17985","8.149923","172.30.1.205","172.30.1.104","TCP","54","42980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17986","8.150274","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"17987","8.150609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"17988","8.150618","172.30.1.205","172.30.1.104","TCP","54","42980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"17989","8.152833","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"17990","8.153261","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"17991","8.153267","172.30.1.205","172.30.1.104","TCP","54","42980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17992","8.155071","172.30.1.205","172.30.1.104","TCP","54","42980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"17993","8.155183","172.30.1.205","172.30.1.104","TCP","74","35618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911381 TSecr=0 WS=128" +"17994","8.155366","172.30.1.104","172.30.1.205","TCP","54","135 > 42980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17995","8.155395","172.30.1.104","172.30.1.205","TCP","54","135 > 42980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"17996","8.155400","172.30.1.205","172.30.1.104","TCP","54","42980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"17997","8.155502","172.30.1.104","172.30.1.205","TCP","66","49671 > 35618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"17998","8.155511","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"17999","8.155866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18000","8.156177","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18001","8.156185","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18002","8.158068","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18003","8.158479","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18004","8.158485","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18005","8.159834","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18006","8.161623","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18007","8.161632","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18008","8.162568","172.30.1.205","172.30.1.104","TCP","74","42984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911388 TSecr=0 WS=128" +"18009","8.162866","172.30.1.104","172.30.1.205","TCP","66","135 > 42984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18010","8.162877","172.30.1.205","172.30.1.104","TCP","54","42984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18011","8.163223","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18012","8.163533","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18013","8.163542","172.30.1.205","172.30.1.104","TCP","54","42984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18014","8.165760","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18015","8.166215","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18016","8.166225","172.30.1.205","172.30.1.104","TCP","54","42984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18017","8.168123","172.30.1.205","172.30.1.104","TCP","54","42984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18018","8.168246","172.30.1.205","172.30.1.104","TCP","74","35622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911394 TSecr=0 WS=128" +"18019","8.168445","172.30.1.104","172.30.1.205","TCP","54","135 > 42984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18020","8.168477","172.30.1.104","172.30.1.205","TCP","54","135 > 42984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18021","8.168484","172.30.1.205","172.30.1.104","TCP","54","42984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18022","8.168528","172.30.1.104","172.30.1.205","TCP","66","49671 > 35622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18023","8.168537","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18024","8.168920","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18025","8.169281","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18026","8.169288","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18027","8.171156","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18028","8.173250","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18029","8.173263","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18030","8.174626","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18031","8.176451","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18032","8.176463","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18033","8.177468","172.30.1.205","172.30.1.104","TCP","74","42988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911403 TSecr=0 WS=128" +"18034","8.177814","172.30.1.104","172.30.1.205","TCP","66","135 > 42988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18035","8.177825","172.30.1.205","172.30.1.104","TCP","54","42988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18036","8.178185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18037","8.178497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18038","8.178506","172.30.1.205","172.30.1.104","TCP","54","42988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18039","8.180720","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18040","8.181156","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18041","8.181162","172.30.1.205","172.30.1.104","TCP","54","42988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18042","8.183006","172.30.1.205","172.30.1.104","TCP","54","42988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18043","8.183120","172.30.1.205","172.30.1.104","TCP","74","35626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911409 TSecr=0 WS=128" +"18044","8.183299","172.30.1.104","172.30.1.205","TCP","54","135 > 42988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18045","8.183344","172.30.1.104","172.30.1.205","TCP","54","135 > 42988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18046","8.183349","172.30.1.205","172.30.1.104","TCP","54","42988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18047","8.183450","172.30.1.104","172.30.1.205","TCP","66","49671 > 35626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18048","8.183458","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18049","8.183807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18050","8.184125","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18051","8.184134","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18052","8.186062","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18053","8.186453","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18054","8.186460","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18055","8.187803","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18056","8.189604","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18057","8.189613","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18058","8.190555","172.30.1.205","172.30.1.104","TCP","74","42992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911416 TSecr=0 WS=128" +"18059","8.190904","172.30.1.104","172.30.1.205","TCP","66","135 > 42992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18060","8.190929","172.30.1.205","172.30.1.104","TCP","54","42992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18061","8.191472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18062","8.191786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18063","8.191795","172.30.1.205","172.30.1.104","TCP","54","42992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18064","8.194027","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18065","8.194462","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18066","8.194468","172.30.1.205","172.30.1.104","TCP","54","42992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18067","8.196292","172.30.1.205","172.30.1.104","TCP","54","42992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18068","8.196404","172.30.1.205","172.30.1.104","TCP","74","35630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911422 TSecr=0 WS=128" +"18069","8.196591","172.30.1.104","172.30.1.205","TCP","54","135 > 42992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18070","8.196618","172.30.1.104","172.30.1.205","TCP","54","135 > 42992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18071","8.196623","172.30.1.205","172.30.1.104","TCP","54","42992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18072","8.196732","172.30.1.104","172.30.1.205","TCP","66","49671 > 35630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18073","8.196740","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18074","8.197113","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18075","8.198122","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18076","8.198130","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18077","8.200022","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18078","8.200417","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18079","8.200423","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18080","8.201814","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18081","8.203597","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18082","8.203606","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18083","8.204528","172.30.1.205","172.30.1.104","TCP","74","42996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911430 TSecr=0 WS=128" +"18084","8.204846","172.30.1.104","172.30.1.205","TCP","66","135 > 42996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18085","8.204858","172.30.1.205","172.30.1.104","TCP","54","42996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18086","8.205215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18087","8.205529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18088","8.205538","172.30.1.205","172.30.1.104","TCP","54","42996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18089","8.207725","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18090","8.208128","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18091","8.208135","172.30.1.205","172.30.1.104","TCP","54","42996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18092","8.209956","172.30.1.205","172.30.1.104","TCP","54","42996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18093","8.210071","172.30.1.205","172.30.1.104","TCP","74","35634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911436 TSecr=0 WS=128" +"18094","8.210231","172.30.1.104","172.30.1.205","TCP","54","135 > 42996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18095","8.210261","172.30.1.104","172.30.1.205","TCP","54","135 > 42996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18096","8.210267","172.30.1.205","172.30.1.104","TCP","54","42996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18097","8.210374","172.30.1.104","172.30.1.205","TCP","66","49671 > 35634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18098","8.210389","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18099","8.210731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18100","8.211027","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18101","8.211036","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18102","8.212937","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18103","8.213370","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18104","8.213377","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18105","8.214720","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18106","8.216612","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18107","8.216624","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18108","8.217594","172.30.1.205","172.30.1.104","TCP","74","43000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911444 TSecr=0 WS=128" +"18109","8.217899","172.30.1.104","172.30.1.205","TCP","66","135 > 43000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18110","8.217909","172.30.1.205","172.30.1.104","TCP","54","43000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18111","8.218277","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18112","8.218582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18113","8.218591","172.30.1.205","172.30.1.104","TCP","54","43000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18114","8.220775","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18115","8.221226","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18116","8.221236","172.30.1.205","172.30.1.104","TCP","54","43000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18117","8.222152","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18118","8.222201","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18119","8.222233","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18120","8.222261","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18121","8.222284","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18122","8.222312","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18123","8.222339","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18124","8.222365","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18125","8.222388","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18126","8.222410","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18127","8.222430","172.30.1.104","172.30.1.205","TCP","54","49671 > 35594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18128","8.222450","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18129","8.222529","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18130","8.222584","172.30.1.104","172.30.1.205","TCP","54","49671 > 35598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18131","8.222614","172.30.1.104","172.30.1.205","TCP","54","49671 > 35594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18132","8.222621","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18133","8.222637","172.30.1.104","172.30.1.205","TCP","54","49671 > 35598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18134","8.222640","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18135","8.222667","172.30.1.104","172.30.1.205","TCP","54","49671 > 35602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18136","8.222694","172.30.1.104","172.30.1.205","TCP","54","49671 > 35606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18137","8.222723","172.30.1.104","172.30.1.205","TCP","54","49671 > 35610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18138","8.222752","172.30.1.104","172.30.1.205","TCP","54","49671 > 35602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18139","8.222756","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18140","8.222781","172.30.1.104","172.30.1.205","TCP","54","49671 > 35614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18141","8.222810","172.30.1.104","172.30.1.205","TCP","54","49671 > 35614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18142","8.222814","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18143","8.222847","172.30.1.104","172.30.1.205","TCP","54","49671 > 35606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18144","8.222851","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18145","8.222888","172.30.1.104","172.30.1.205","TCP","54","49671 > 35610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18146","8.222892","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18147","8.222910","172.30.1.104","172.30.1.205","TCP","54","49671 > 35618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18148","8.222939","172.30.1.104","172.30.1.205","TCP","54","49671 > 35622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18149","8.222969","172.30.1.104","172.30.1.205","TCP","54","49671 > 35626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18150","8.223003","172.30.1.104","172.30.1.205","TCP","54","49671 > 35630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18151","8.223034","172.30.1.104","172.30.1.205","TCP","54","49671 > 35618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18152","8.223039","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18153","8.223064","172.30.1.104","172.30.1.205","TCP","54","49671 > 35630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18154","8.223067","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18155","8.223094","172.30.1.104","172.30.1.205","TCP","54","49671 > 35622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18156","8.223097","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18157","8.223133","172.30.1.104","172.30.1.205","TCP","54","49671 > 35626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18158","8.223136","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18159","8.223522","172.30.1.104","172.30.1.205","TCP","54","49671 > 35634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18160","8.223548","172.30.1.104","172.30.1.205","TCP","54","49671 > 35590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18161","8.223576","172.30.1.104","172.30.1.205","TCP","54","49671 > 35634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18162","8.223581","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18163","8.223686","172.30.1.104","172.30.1.205","TCP","54","49671 > 35590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18164","8.223691","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18165","8.224148","172.30.1.205","172.30.1.104","TCP","54","43000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18166","8.224265","172.30.1.205","172.30.1.104","TCP","74","35638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911450 TSecr=0 WS=128" +"18167","8.224422","172.30.1.104","172.30.1.205","TCP","54","135 > 43000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18168","8.224454","172.30.1.104","172.30.1.205","TCP","54","135 > 43000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18169","8.224459","172.30.1.205","172.30.1.104","TCP","54","43000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18170","8.224598","172.30.1.104","172.30.1.205","TCP","66","49671 > 35638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18171","8.224609","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18172","8.225000","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18173","8.225301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18174","8.225308","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18175","8.227190","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18176","8.227601","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18177","8.227607","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18178","8.228981","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18179","8.230981","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18180","8.230990","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18181","8.231920","172.30.1.205","172.30.1.104","TCP","74","43004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911458 TSecr=0 WS=128" +"18182","8.232249","172.30.1.104","172.30.1.205","TCP","66","135 > 43004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18183","8.232259","172.30.1.205","172.30.1.104","TCP","54","43004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18184","8.232604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18185","8.232930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18186","8.232940","172.30.1.205","172.30.1.104","TCP","54","43004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18187","8.235116","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18188","8.235519","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18189","8.235526","172.30.1.205","172.30.1.104","TCP","54","43004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18190","8.237347","172.30.1.205","172.30.1.104","TCP","54","43004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18191","8.237455","172.30.1.205","172.30.1.104","TCP","74","35642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911463 TSecr=0 WS=128" +"18192","8.237675","172.30.1.104","172.30.1.205","TCP","54","135 > 43004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18193","8.237693","172.30.1.104","172.30.1.205","TCP","54","135 > 43004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18194","8.237700","172.30.1.205","172.30.1.104","TCP","54","43004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18195","8.237818","172.30.1.104","172.30.1.205","TCP","66","49671 > 35642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18196","8.237829","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18197","8.238233","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18198","8.238564","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18199","8.238574","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18200","8.240483","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18201","8.240890","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18202","8.240897","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18203","8.242256","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18204","8.244095","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18205","8.244104","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18206","8.245079","172.30.1.205","172.30.1.104","TCP","74","43008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911471 TSecr=0 WS=128" +"18207","8.245384","172.30.1.104","172.30.1.205","TCP","66","135 > 43008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18208","8.245395","172.30.1.205","172.30.1.104","TCP","54","43008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18209","8.245747","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18210","8.246084","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18211","8.246092","172.30.1.205","172.30.1.104","TCP","54","43008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18212","8.248288","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18213","8.248741","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18214","8.248749","172.30.1.205","172.30.1.104","TCP","54","43008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18215","8.250581","172.30.1.205","172.30.1.104","TCP","54","43008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18216","8.250694","172.30.1.205","172.30.1.104","TCP","74","35646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911477 TSecr=0 WS=128" +"18217","8.250860","172.30.1.104","172.30.1.205","TCP","54","135 > 43008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18218","8.250889","172.30.1.104","172.30.1.205","TCP","54","135 > 43008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18219","8.250895","172.30.1.205","172.30.1.104","TCP","54","43008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18220","8.250997","172.30.1.104","172.30.1.205","TCP","66","49671 > 35646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18221","8.251005","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18222","8.251360","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18223","8.251682","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18224","8.251691","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18225","8.253619","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18226","8.254001","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18227","8.254007","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18228","8.255356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18229","8.257184","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18230","8.257193","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18231","8.258152","172.30.1.205","172.30.1.104","TCP","74","43012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911484 TSecr=0 WS=128" +"18232","8.258457","172.30.1.104","172.30.1.205","TCP","66","135 > 43012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18233","8.258468","172.30.1.205","172.30.1.104","TCP","54","43012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18234","8.258819","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18235","8.259137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18236","8.259146","172.30.1.205","172.30.1.104","TCP","54","43012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18237","8.261364","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18238","8.261821","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18239","8.261828","172.30.1.205","172.30.1.104","TCP","54","43012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18240","8.263665","172.30.1.205","172.30.1.104","TCP","54","43012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18241","8.263777","172.30.1.205","172.30.1.104","TCP","74","35650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911490 TSecr=0 WS=128" +"18242","8.263996","172.30.1.104","172.30.1.205","TCP","54","135 > 43012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18243","8.264032","172.30.1.104","172.30.1.205","TCP","54","135 > 43012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18244","8.264037","172.30.1.205","172.30.1.104","TCP","54","43012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18245","8.264143","172.30.1.104","172.30.1.205","TCP","66","49671 > 35650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18246","8.264151","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18247","8.264505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18248","8.264853","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18249","8.264862","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18250","8.266741","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18251","8.268316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18252","8.268320","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18253","8.269724","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18254","8.271643","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18255","8.271654","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18256","8.272606","172.30.1.205","172.30.1.104","TCP","74","43016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911499 TSecr=0 WS=128" +"18257","8.272924","172.30.1.104","172.30.1.205","TCP","66","135 > 43016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18258","8.272935","172.30.1.205","172.30.1.104","TCP","54","43016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18259","8.273295","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18260","8.273605","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18261","8.273614","172.30.1.205","172.30.1.104","TCP","54","43016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18262","8.275824","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18263","8.276246","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18264","8.276252","172.30.1.205","172.30.1.104","TCP","54","43016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18265","8.278086","172.30.1.205","172.30.1.104","TCP","54","43016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18266","8.278196","172.30.1.205","172.30.1.104","TCP","74","35654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911504 TSecr=0 WS=128" +"18267","8.278356","172.30.1.104","172.30.1.205","TCP","54","135 > 43016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18268","8.278386","172.30.1.104","172.30.1.205","TCP","54","135 > 43016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18269","8.278392","172.30.1.205","172.30.1.104","TCP","54","43016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18270","8.278500","172.30.1.104","172.30.1.205","TCP","66","49671 > 35654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18271","8.278508","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18272","8.278858","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18273","8.279162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18274","8.279171","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18275","8.281094","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18276","8.281485","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18277","8.281491","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18278","8.282840","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18279","8.285941","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18280","8.285950","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18281","8.286907","172.30.1.205","172.30.1.104","TCP","74","43020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911513 TSecr=0 WS=128" +"18282","8.287263","172.30.1.104","172.30.1.205","TCP","66","135 > 43020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18283","8.287273","172.30.1.205","172.30.1.104","TCP","54","43020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18284","8.287636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18285","8.287964","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18286","8.287973","172.30.1.205","172.30.1.104","TCP","54","43020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18287","8.290219","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18288","8.290707","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18289","8.290714","172.30.1.205","172.30.1.104","TCP","54","43020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18290","8.292541","172.30.1.205","172.30.1.104","TCP","54","43020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18291","8.292652","172.30.1.205","172.30.1.104","TCP","74","35658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911519 TSecr=0 WS=128" +"18292","8.292887","172.30.1.104","172.30.1.205","TCP","54","135 > 43020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18293","8.292964","172.30.1.104","172.30.1.205","TCP","66","49671 > 35658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18294","8.292982","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18295","8.293002","172.30.1.104","172.30.1.205","TCP","54","135 > 43020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18296","8.293007","172.30.1.205","172.30.1.104","TCP","54","43020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18297","8.293358","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18298","8.293679","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18299","8.293688","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18300","8.295584","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18301","8.296007","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18302","8.296014","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18303","8.297399","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18304","8.299221","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18305","8.299231","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18306","8.300162","172.30.1.205","172.30.1.104","TCP","74","43024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911526 TSecr=0 WS=128" +"18307","8.300471","172.30.1.104","172.30.1.205","TCP","66","135 > 43024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18308","8.300484","172.30.1.205","172.30.1.104","TCP","54","43024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18309","8.300870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18310","8.301180","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18311","8.301189","172.30.1.205","172.30.1.104","TCP","54","43024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18312","8.303379","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18313","8.303772","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18314","8.303779","172.30.1.205","172.30.1.104","TCP","54","43024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18315","8.305607","172.30.1.205","172.30.1.104","TCP","54","43024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18316","8.305721","172.30.1.205","172.30.1.104","TCP","74","35662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911532 TSecr=0 WS=128" +"18317","8.305878","172.30.1.104","172.30.1.205","TCP","54","135 > 43024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18318","8.305890","172.30.1.104","172.30.1.205","TCP","54","135 > 43024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18319","8.305895","172.30.1.205","172.30.1.104","TCP","54","43024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18320","8.306022","172.30.1.104","172.30.1.205","TCP","66","49671 > 35662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18321","8.306032","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18322","8.306378","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18323","8.306667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18324","8.306675","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18325","8.308557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18326","8.308950","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18327","8.308957","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18328","8.310324","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18329","8.312119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18330","8.312129","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18331","8.313097","172.30.1.205","172.30.1.104","TCP","74","43028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911539 TSecr=0 WS=128" +"18332","8.313385","172.30.1.104","172.30.1.205","TCP","66","135 > 43028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18333","8.313396","172.30.1.205","172.30.1.104","TCP","54","43028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18334","8.313743","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18335","8.314100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18336","8.314110","172.30.1.205","172.30.1.104","TCP","54","43028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18337","8.316303","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18338","8.316710","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18339","8.316717","172.30.1.205","172.30.1.104","TCP","54","43028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18340","8.318551","172.30.1.205","172.30.1.104","TCP","54","43028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18341","8.318664","172.30.1.205","172.30.1.104","TCP","74","35666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911545 TSecr=0 WS=128" +"18342","8.318815","172.30.1.104","172.30.1.205","TCP","54","135 > 43028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18343","8.318823","172.30.1.104","172.30.1.205","TCP","54","135 > 43028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18344","8.318829","172.30.1.205","172.30.1.104","TCP","54","43028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18345","8.318931","172.30.1.104","172.30.1.205","TCP","66","49671 > 35666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18346","8.318940","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18347","8.319285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18348","8.319589","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18349","8.319598","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18350","8.321512","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18351","8.321876","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18352","8.321883","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18353","8.323230","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18354","8.325230","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18355","8.325240","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18356","8.326197","172.30.1.205","172.30.1.104","TCP","74","43032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911552 TSecr=0 WS=128" +"18357","8.326522","172.30.1.104","172.30.1.205","TCP","66","135 > 43032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18358","8.326533","172.30.1.205","172.30.1.104","TCP","54","43032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18359","8.326882","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18360","8.327188","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18361","8.327197","172.30.1.205","172.30.1.104","TCP","54","43032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18362","8.329400","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18363","8.329792","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18364","8.329802","172.30.1.205","172.30.1.104","TCP","54","43032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18365","8.331621","172.30.1.205","172.30.1.104","TCP","54","43032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18366","8.331734","172.30.1.205","172.30.1.104","TCP","74","35670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911558 TSecr=0 WS=128" +"18367","8.331910","172.30.1.104","172.30.1.205","TCP","54","135 > 43032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18368","8.331987","172.30.1.104","172.30.1.205","TCP","54","135 > 43032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18369","8.331992","172.30.1.205","172.30.1.104","TCP","54","43032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18370","8.332121","172.30.1.104","172.30.1.205","TCP","66","49671 > 35670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18371","8.332130","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18372","8.332473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18373","8.332828","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18374","8.332837","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18375","8.334700","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18376","8.335070","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18377","8.335076","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18378","8.336419","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18379","8.338193","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18380","8.338202","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18381","8.339150","172.30.1.205","172.30.1.104","TCP","74","43036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911565 TSecr=0 WS=128" +"18382","8.339614","172.30.1.104","172.30.1.205","TCP","66","135 > 43036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18383","8.339624","172.30.1.205","172.30.1.104","TCP","54","43036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18384","8.339972","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18385","8.340269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18386","8.340278","172.30.1.205","172.30.1.104","TCP","54","43036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18387","8.342491","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18388","8.342852","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18389","8.342859","172.30.1.205","172.30.1.104","TCP","54","43036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18390","8.344680","172.30.1.205","172.30.1.104","TCP","54","43036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18391","8.344821","172.30.1.205","172.30.1.104","TCP","74","35674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911571 TSecr=0 WS=128" +"18392","8.344943","172.30.1.104","172.30.1.205","TCP","54","135 > 43036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18393","8.344953","172.30.1.104","172.30.1.205","TCP","54","135 > 43036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18394","8.344958","172.30.1.205","172.30.1.104","TCP","54","43036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18395","8.345077","172.30.1.104","172.30.1.205","TCP","66","49671 > 35674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18396","8.345085","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18397","8.345430","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18398","8.345721","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18399","8.345728","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18400","8.347592","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18401","8.347962","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18402","8.347969","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18403","8.349355","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18404","8.351110","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18405","8.351119","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18406","8.352069","172.30.1.205","172.30.1.104","TCP","74","43040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911578 TSecr=0 WS=128" +"18407","8.352353","172.30.1.104","172.30.1.205","TCP","66","135 > 43040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18408","8.352363","172.30.1.205","172.30.1.104","TCP","54","43040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18409","8.352718","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18410","8.353044","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18411","8.353057","172.30.1.205","172.30.1.104","TCP","54","43040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18412","8.355441","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18413","8.355831","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18414","8.355840","172.30.1.205","172.30.1.104","TCP","54","43040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18415","8.357690","172.30.1.205","172.30.1.104","TCP","54","43040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18416","8.357804","172.30.1.205","172.30.1.104","TCP","74","35678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911584 TSecr=0 WS=128" +"18417","8.357963","172.30.1.104","172.30.1.205","TCP","54","135 > 43040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18418","8.357974","172.30.1.104","172.30.1.205","TCP","54","135 > 43040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18419","8.357980","172.30.1.205","172.30.1.104","TCP","54","43040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18420","8.358060","172.30.1.104","172.30.1.205","TCP","66","49671 > 35678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18421","8.358069","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18422","8.358419","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18423","8.359457","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18424","8.359465","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18425","8.361364","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18426","8.361744","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18427","8.361750","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18428","8.363121","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18429","8.364897","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18430","8.364907","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18431","8.365854","172.30.1.205","172.30.1.104","TCP","74","43044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911592 TSecr=0 WS=128" +"18432","8.366138","172.30.1.104","172.30.1.205","TCP","66","135 > 43044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18433","8.366149","172.30.1.205","172.30.1.104","TCP","54","43044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18434","8.366496","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18435","8.366779","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18436","8.366788","172.30.1.205","172.30.1.104","TCP","54","43044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18437","8.368997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18438","8.369365","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18439","8.369372","172.30.1.205","172.30.1.104","TCP","54","43044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18440","8.371170","172.30.1.205","172.30.1.104","TCP","54","43044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18441","8.371280","172.30.1.205","172.30.1.104","TCP","74","35682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911597 TSecr=0 WS=128" +"18442","8.371440","172.30.1.104","172.30.1.205","TCP","54","135 > 43044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18443","8.371486","172.30.1.104","172.30.1.205","TCP","54","135 > 43044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18444","8.371492","172.30.1.205","172.30.1.104","TCP","54","43044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18445","8.371592","172.30.1.104","172.30.1.205","TCP","66","49671 > 35682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18446","8.371601","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18447","8.371947","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18448","8.372221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18449","8.372230","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18450","8.374136","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18451","8.374528","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18452","8.374535","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18453","8.375880","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18454","8.377664","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18455","8.377677","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18456","8.378685","172.30.1.205","172.30.1.104","TCP","74","43048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911605 TSecr=0 WS=128" +"18457","8.378970","172.30.1.104","172.30.1.205","TCP","66","135 > 43048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18458","8.378981","172.30.1.205","172.30.1.104","TCP","54","43048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18459","8.379369","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18460","8.379671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18461","8.379680","172.30.1.205","172.30.1.104","TCP","54","43048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18462","8.381935","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18463","8.382318","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18464","8.382327","172.30.1.205","172.30.1.104","TCP","54","43048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18465","8.383269","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18466","8.383322","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18467","8.383360","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18468","8.383394","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18469","8.383434","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18470","8.383466","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18471","8.383493","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18472","8.383504","172.30.1.104","172.30.1.205","TCP","54","49671 > 35642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18473","8.383544","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18474","8.383571","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18475","8.383594","172.30.1.104","172.30.1.205","TCP","54","49671 > 35646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18476","8.383617","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18477","8.383622","172.30.1.104","172.30.1.205","TCP","54","49671 > 35642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18478","8.383628","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18479","8.383647","172.30.1.104","172.30.1.205","TCP","54","49671 > 35646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18480","8.383651","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18481","8.383675","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18482","8.383749","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18483","8.383768","172.30.1.104","172.30.1.205","TCP","54","49671 > 35650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18484","8.383787","172.30.1.104","172.30.1.205","TCP","54","49671 > 35654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18485","8.383808","172.30.1.104","172.30.1.205","TCP","54","49671 > 35650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18486","8.383812","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18487","8.383829","172.30.1.104","172.30.1.205","TCP","54","49671 > 35654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18488","8.383832","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18489","8.383854","172.30.1.104","172.30.1.205","TCP","54","49671 > 35658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18490","8.383984","172.30.1.104","172.30.1.205","TCP","54","49671 > 35662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18491","8.383996","172.30.1.104","172.30.1.205","TCP","54","49671 > 35658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18492","8.384000","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18493","8.384017","172.30.1.104","172.30.1.205","TCP","54","49671 > 35666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18494","8.384061","172.30.1.104","172.30.1.205","TCP","54","49671 > 35662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18495","8.384066","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18496","8.384078","172.30.1.104","172.30.1.205","TCP","54","49671 > 35666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18497","8.384081","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18498","8.384100","172.30.1.104","172.30.1.205","TCP","54","49671 > 35670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18499","8.384119","172.30.1.104","172.30.1.205","TCP","54","49671 > 35674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18500","8.384209","172.30.1.104","172.30.1.205","TCP","54","49671 > 35678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18501","8.384228","172.30.1.104","172.30.1.205","TCP","54","49671 > 35670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18502","8.384232","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18503","8.384250","172.30.1.104","172.30.1.205","TCP","54","49671 > 35674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18504","8.384252","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18505","8.384271","172.30.1.104","172.30.1.205","TCP","54","49671 > 35678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18506","8.384274","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18507","8.384292","172.30.1.104","172.30.1.205","TCP","54","49671 > 35682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18508","8.384313","172.30.1.104","172.30.1.205","TCP","54","49671 > 35638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18509","8.384398","172.30.1.104","172.30.1.205","TCP","54","49671 > 35682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18510","8.384402","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18511","8.384420","172.30.1.104","172.30.1.205","TCP","54","49671 > 35638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18512","8.384422","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18513","8.385304","172.30.1.205","172.30.1.104","TCP","54","43048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18514","8.385415","172.30.1.205","172.30.1.104","TCP","74","35686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911611 TSecr=0 WS=128" +"18515","8.385569","172.30.1.104","172.30.1.205","TCP","54","135 > 43048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18516","8.385598","172.30.1.104","172.30.1.205","TCP","54","135 > 43048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18517","8.385603","172.30.1.205","172.30.1.104","TCP","54","43048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18518","8.385690","172.30.1.104","172.30.1.205","TCP","66","49671 > 35686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18519","8.385698","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18520","8.386054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18521","8.386348","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18522","8.386357","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18523","8.388219","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18524","8.388599","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18525","8.388605","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18526","8.389978","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18527","8.391803","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18528","8.391813","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18529","8.392729","172.30.1.205","172.30.1.104","TCP","74","43052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911619 TSecr=0 WS=128" +"18530","8.393046","172.30.1.104","172.30.1.205","TCP","66","135 > 43052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18531","8.393057","172.30.1.205","172.30.1.104","TCP","54","43052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18532","8.393414","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18533","8.393708","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18534","8.393717","172.30.1.205","172.30.1.104","TCP","54","43052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18535","8.395874","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18536","8.396245","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18537","8.396252","172.30.1.205","172.30.1.104","TCP","54","43052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18538","8.398067","172.30.1.205","172.30.1.104","TCP","54","43052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18539","8.398175","172.30.1.205","172.30.1.104","TCP","74","35690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911624 TSecr=0 WS=128" +"18540","8.398346","172.30.1.104","172.30.1.205","TCP","54","135 > 43052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18541","8.398361","172.30.1.104","172.30.1.205","TCP","54","135 > 43052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18542","8.398367","172.30.1.205","172.30.1.104","TCP","54","43052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18543","8.398455","172.30.1.104","172.30.1.205","TCP","66","49671 > 35690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18544","8.398463","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18545","8.398802","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18546","8.399089","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18547","8.399097","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18548","8.400991","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18549","8.401339","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18550","8.401345","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18551","8.402679","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18552","8.405000","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18553","8.405010","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18554","8.405941","172.30.1.205","172.30.1.104","TCP","74","43056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911632 TSecr=0 WS=128" +"18555","8.406229","172.30.1.104","172.30.1.205","TCP","66","135 > 43056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18556","8.406240","172.30.1.205","172.30.1.104","TCP","54","43056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18557","8.406586","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18558","8.406877","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18559","8.406887","172.30.1.205","172.30.1.104","TCP","54","43056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18560","8.409111","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18561","8.409476","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18562","8.409483","172.30.1.205","172.30.1.104","TCP","54","43056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18563","8.411276","172.30.1.205","172.30.1.104","TCP","54","43056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18564","8.411389","172.30.1.205","172.30.1.104","TCP","74","35694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911637 TSecr=0 WS=128" +"18565","8.411538","172.30.1.104","172.30.1.205","TCP","54","135 > 43056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18566","8.411566","172.30.1.104","172.30.1.205","TCP","54","135 > 43056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18567","8.411571","172.30.1.205","172.30.1.104","TCP","54","43056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18568","8.411656","172.30.1.104","172.30.1.205","TCP","66","49671 > 35694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18569","8.411664","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18570","8.412007","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18571","8.412312","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18572","8.412321","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18573","8.414229","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18574","8.414572","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18575","8.414579","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18576","8.415913","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18577","8.417753","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18578","8.417762","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18579","8.418700","172.30.1.205","172.30.1.104","TCP","74","43060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911645 TSecr=0 WS=128" +"18580","8.418979","172.30.1.104","172.30.1.205","TCP","66","135 > 43060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18581","8.418989","172.30.1.205","172.30.1.104","TCP","54","43060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18582","8.419338","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18583","8.419657","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18584","8.419665","172.30.1.205","172.30.1.104","TCP","54","43060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18585","8.421875","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18586","8.422248","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18587","8.422255","172.30.1.205","172.30.1.104","TCP","54","43060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18588","8.424066","172.30.1.205","172.30.1.104","TCP","54","43060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18589","8.424174","172.30.1.205","172.30.1.104","TCP","74","35698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911650 TSecr=0 WS=128" +"18590","8.424334","172.30.1.104","172.30.1.205","TCP","54","135 > 43060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18591","8.424368","172.30.1.104","172.30.1.205","TCP","54","135 > 43060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18592","8.424373","172.30.1.205","172.30.1.104","TCP","54","43060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18593","8.424499","172.30.1.104","172.30.1.205","TCP","66","49671 > 35698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18594","8.424507","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18595","8.424882","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18596","8.425175","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18597","8.425183","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18598","8.427059","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18599","8.427410","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18600","8.427416","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18601","8.428752","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18602","8.430548","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18603","8.430557","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18604","8.431494","172.30.1.205","172.30.1.104","TCP","74","43064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911657 TSecr=0 WS=128" +"18605","8.431789","172.30.1.104","172.30.1.205","TCP","66","135 > 43064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18606","8.431799","172.30.1.205","172.30.1.104","TCP","54","43064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18607","8.432147","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18608","8.432419","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18609","8.432427","172.30.1.205","172.30.1.104","TCP","54","43064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18610","8.434610","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18611","8.434963","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18612","8.434970","172.30.1.205","172.30.1.104","TCP","54","43064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18613","8.436766","172.30.1.205","172.30.1.104","TCP","54","43064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18614","8.436891","172.30.1.205","172.30.1.104","TCP","74","35702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911663 TSecr=0 WS=128" +"18615","8.437018","172.30.1.104","172.30.1.205","TCP","54","135 > 43064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18616","8.437039","172.30.1.104","172.30.1.205","TCP","54","135 > 43064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18617","8.437044","172.30.1.205","172.30.1.104","TCP","54","43064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18618","8.437177","172.30.1.104","172.30.1.205","TCP","66","49671 > 35702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18619","8.437186","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18620","8.437527","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18621","8.437800","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18622","8.437809","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18623","8.439684","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18624","8.440091","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18625","8.440097","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18626","8.441469","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18627","8.443290","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18628","8.443301","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18629","8.444246","172.30.1.205","172.30.1.104","TCP","74","43068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911670 TSecr=0 WS=128" +"18630","8.444552","172.30.1.104","172.30.1.205","TCP","66","135 > 43068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18631","8.444562","172.30.1.205","172.30.1.104","TCP","54","43068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18632","8.444942","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18633","8.445222","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18634","8.445231","172.30.1.205","172.30.1.104","TCP","54","43068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18635","8.447413","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18636","8.447808","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18637","8.447814","172.30.1.205","172.30.1.104","TCP","54","43068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18638","8.449683","172.30.1.205","172.30.1.104","TCP","54","43068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18639","8.449792","172.30.1.205","172.30.1.104","TCP","74","35706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911676 TSecr=0 WS=128" +"18640","8.449932","172.30.1.104","172.30.1.205","TCP","54","135 > 43068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18641","8.449954","172.30.1.104","172.30.1.205","TCP","54","135 > 43068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18642","8.449959","172.30.1.205","172.30.1.104","TCP","54","43068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18643","8.450062","172.30.1.104","172.30.1.205","TCP","66","49671 > 35706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18644","8.450070","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18645","8.450414","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18646","8.450694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18647","8.450703","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18648","8.452569","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18649","8.452924","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18650","8.452933","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18651","8.454387","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18652","8.456205","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18653","8.456217","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18654","8.457243","172.30.1.205","172.30.1.104","TCP","74","43072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911683 TSecr=0 WS=128" +"18655","8.457576","172.30.1.104","172.30.1.205","TCP","66","135 > 43072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18656","8.457588","172.30.1.205","172.30.1.104","TCP","54","43072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18657","8.457944","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18658","8.458487","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18659","8.458501","172.30.1.205","172.30.1.104","TCP","54","43072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18660","8.460832","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18661","8.461228","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18662","8.461235","172.30.1.205","172.30.1.104","TCP","54","43072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18663","8.463082","172.30.1.205","172.30.1.104","TCP","54","43072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18664","8.463219","172.30.1.205","172.30.1.104","TCP","74","35710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911689 TSecr=0 WS=128" +"18665","8.463417","172.30.1.104","172.30.1.205","TCP","54","135 > 43072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18666","8.463487","172.30.1.104","172.30.1.205","TCP","54","135 > 43072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18667","8.463495","172.30.1.205","172.30.1.104","TCP","54","43072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18668","8.463537","172.30.1.104","172.30.1.205","TCP","66","49671 > 35710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18669","8.463546","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18670","8.463906","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18671","8.464197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18672","8.464206","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18673","8.466136","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18674","8.466525","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18675","8.466532","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18676","8.467898","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18677","8.469773","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18678","8.469786","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18679","8.470800","172.30.1.205","172.30.1.104","TCP","74","43076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911697 TSecr=0 WS=128" +"18680","8.471115","172.30.1.104","172.30.1.205","TCP","66","135 > 43076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18681","8.471127","172.30.1.205","172.30.1.104","TCP","54","43076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18682","8.471494","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18683","8.471869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18684","8.471878","172.30.1.205","172.30.1.104","TCP","54","43076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18685","8.474135","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18686","8.474507","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18687","8.474513","172.30.1.205","172.30.1.104","TCP","54","43076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18688","8.476337","172.30.1.205","172.30.1.104","TCP","54","43076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18689","8.476461","172.30.1.205","172.30.1.104","TCP","74","35714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911702 TSecr=0 WS=128" +"18690","8.476723","172.30.1.104","172.30.1.205","TCP","54","135 > 43076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18691","8.476732","172.30.1.104","172.30.1.205","TCP","54","135 > 43076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18692","8.476739","172.30.1.205","172.30.1.104","TCP","54","43076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18693","8.476772","172.30.1.104","172.30.1.205","TCP","66","49671 > 35714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18694","8.476791","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18695","8.477143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18696","8.477483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18697","8.477492","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18698","8.479382","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18699","8.479791","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18700","8.479797","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18701","8.481196","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18702","8.484268","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18703","8.484278","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18704","8.485251","172.30.1.205","172.30.1.104","TCP","74","43080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911711 TSecr=0 WS=128" +"18705","8.485571","172.30.1.104","172.30.1.205","TCP","66","135 > 43080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18706","8.485582","172.30.1.205","172.30.1.104","TCP","54","43080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18707","8.485941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18708","8.486251","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18709","8.486265","172.30.1.205","172.30.1.104","TCP","54","43080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18710","8.488545","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18711","8.488957","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18712","8.488964","172.30.1.205","172.30.1.104","TCP","54","43080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18713","8.490792","172.30.1.205","172.30.1.104","TCP","54","43080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18714","8.490909","172.30.1.205","172.30.1.104","TCP","74","35718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911717 TSecr=0 WS=128" +"18715","8.491127","172.30.1.104","172.30.1.205","TCP","54","135 > 43080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18716","8.491136","172.30.1.104","172.30.1.205","TCP","54","135 > 43080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18717","8.491142","172.30.1.205","172.30.1.104","TCP","54","43080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18718","8.491251","172.30.1.104","172.30.1.205","TCP","66","49671 > 35718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18719","8.491259","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18720","8.491616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18721","8.493833","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18722","8.493841","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18723","8.495724","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18724","8.496161","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18725","8.496168","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18726","8.497552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18727","8.499431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18728","8.499441","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18729","8.500382","172.30.1.205","172.30.1.104","TCP","74","43084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911726 TSecr=0 WS=128" +"18730","8.500705","172.30.1.104","172.30.1.205","TCP","66","135 > 43084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18731","8.500716","172.30.1.205","172.30.1.104","TCP","54","43084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18732","8.501090","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18733","8.501402","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18734","8.501412","172.30.1.205","172.30.1.104","TCP","54","43084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18735","8.503597","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18736","8.504003","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18737","8.504010","172.30.1.205","172.30.1.104","TCP","54","43084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18738","8.505863","172.30.1.205","172.30.1.104","TCP","54","43084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18739","8.505974","172.30.1.205","172.30.1.104","TCP","74","35722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911732 TSecr=0 WS=128" +"18740","8.506160","172.30.1.104","172.30.1.205","TCP","54","135 > 43084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18741","8.506182","172.30.1.104","172.30.1.205","TCP","54","135 > 43084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18742","8.506188","172.30.1.205","172.30.1.104","TCP","54","43084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18743","8.506267","172.30.1.104","172.30.1.205","TCP","66","49671 > 35722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18744","8.506276","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18745","8.506631","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18746","8.506955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18747","8.506964","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18748","8.508887","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18749","8.509233","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18750","8.509239","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18751","8.510591","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18752","8.512580","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18753","8.512594","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18754","8.513628","172.30.1.205","172.30.1.104","TCP","74","43088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911740 TSecr=0 WS=128" +"18755","8.513941","172.30.1.104","172.30.1.205","TCP","66","135 > 43088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18756","8.513952","172.30.1.205","172.30.1.104","TCP","54","43088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18757","8.514304","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18758","8.514600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18759","8.514609","172.30.1.205","172.30.1.104","TCP","54","43088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18760","8.516825","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18761","8.517337","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18762","8.517344","172.30.1.205","172.30.1.104","TCP","54","43088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18763","8.519149","172.30.1.205","172.30.1.104","TCP","54","43088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18764","8.519261","172.30.1.205","172.30.1.104","TCP","74","35726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911745 TSecr=0 WS=128" +"18765","8.519438","172.30.1.104","172.30.1.205","TCP","54","135 > 43088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18766","8.519450","172.30.1.104","172.30.1.205","TCP","54","135 > 43088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18767","8.519456","172.30.1.205","172.30.1.104","TCP","54","43088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18768","8.519547","172.30.1.104","172.30.1.205","TCP","66","49671 > 35726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18769","8.519555","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18770","8.519901","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18771","8.520200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18772","8.520210","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18773","8.522163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18774","8.522520","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18775","8.522526","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18776","8.523874","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18777","8.525725","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18778","8.525734","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18779","8.526669","172.30.1.205","172.30.1.104","TCP","74","43092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911753 TSecr=0 WS=128" +"18780","8.526979","172.30.1.104","172.30.1.205","TCP","66","135 > 43092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18781","8.526993","172.30.1.205","172.30.1.104","TCP","54","43092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18782","8.527372","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18783","8.527798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18784","8.527809","172.30.1.205","172.30.1.104","TCP","54","43092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18785","8.530062","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18786","8.530540","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18787","8.530548","172.30.1.205","172.30.1.104","TCP","54","43092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18788","8.532401","172.30.1.205","172.30.1.104","TCP","54","43092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18789","8.532514","172.30.1.205","172.30.1.104","TCP","74","35730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911758 TSecr=0 WS=128" +"18790","8.532713","172.30.1.104","172.30.1.205","TCP","54","135 > 43092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18791","8.532769","172.30.1.104","172.30.1.205","TCP","54","135 > 43092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18792","8.532785","172.30.1.205","172.30.1.104","TCP","54","43092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18793","8.532842","172.30.1.104","172.30.1.205","TCP","66","49671 > 35730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18794","8.532850","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18795","8.533202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18796","8.534722","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18797","8.534729","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18798","8.536591","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18799","8.536980","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18800","8.536987","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18801","8.538350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18802","8.540203","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18803","8.540212","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18804","8.541183","172.30.1.205","172.30.1.104","TCP","74","43096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911767 TSecr=0 WS=128" +"18805","8.541502","172.30.1.104","172.30.1.205","TCP","66","135 > 43096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18806","8.541513","172.30.1.205","172.30.1.104","TCP","54","43096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18807","8.541903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18808","8.542235","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18809","8.542245","172.30.1.205","172.30.1.104","TCP","54","43096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18810","8.544485","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18811","8.544897","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18812","8.544903","172.30.1.205","172.30.1.104","TCP","54","43096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18813","8.545791","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18814","8.545839","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18815","8.545884","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18816","8.545921","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18817","8.545959","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18818","8.545992","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18819","8.546025","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18820","8.546052","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18821","8.546070","172.30.1.104","172.30.1.205","TCP","54","49671 > 35690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18822","8.546101","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18823","8.546135","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18824","8.546167","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18825","8.546239","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18826","8.546256","172.30.1.104","172.30.1.205","TCP","54","49671 > 35694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18827","8.546273","172.30.1.104","172.30.1.205","TCP","54","49671 > 35690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18828","8.546279","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18829","8.546294","172.30.1.104","172.30.1.205","TCP","54","49671 > 35694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18830","8.546298","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18831","8.546315","172.30.1.104","172.30.1.205","TCP","54","49671 > 35698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18832","8.546342","172.30.1.104","172.30.1.205","TCP","54","49671 > 35702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18833","8.546366","172.30.1.104","172.30.1.205","TCP","54","49671 > 35698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18834","8.546370","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18835","8.546386","172.30.1.104","172.30.1.205","TCP","54","49671 > 35706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18836","8.546420","172.30.1.104","172.30.1.205","TCP","54","49671 > 35710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18837","8.546542","172.30.1.104","172.30.1.205","TCP","54","49671 > 35710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18838","8.546554","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18839","8.546561","172.30.1.104","172.30.1.205","TCP","54","49671 > 35714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18840","8.546581","172.30.1.104","172.30.1.205","TCP","54","49671 > 35714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18841","8.546585","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18842","8.546617","172.30.1.104","172.30.1.205","TCP","54","49671 > 35702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18843","8.546621","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18844","8.546642","172.30.1.104","172.30.1.205","TCP","54","49671 > 35706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18845","8.546645","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18846","8.546661","172.30.1.104","172.30.1.205","TCP","54","49671 > 35718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18847","8.546681","172.30.1.104","172.30.1.205","TCP","54","49671 > 35722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18848","8.547020","172.30.1.104","172.30.1.205","TCP","54","49671 > 35726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18849","8.547027","172.30.1.104","172.30.1.205","TCP","54","49671 > 35718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18850","8.547032","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18851","8.547038","172.30.1.104","172.30.1.205","TCP","54","49671 > 35730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18852","8.547042","172.30.1.104","172.30.1.205","TCP","54","49671 > 35730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18853","8.547044","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18854","8.547049","172.30.1.104","172.30.1.205","TCP","54","49671 > 35722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18855","8.547051","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18856","8.547052","172.30.1.104","172.30.1.205","TCP","54","49671 > 35726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18857","8.547054","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18858","8.547055","172.30.1.104","172.30.1.205","TCP","54","49671 > 35686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18859","8.547058","172.30.1.104","172.30.1.205","TCP","54","49671 > 35686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"18860","8.547060","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"18861","8.547896","172.30.1.205","172.30.1.104","TCP","54","43096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18862","8.548009","172.30.1.205","172.30.1.104","TCP","74","35734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911774 TSecr=0 WS=128" +"18863","8.548188","172.30.1.104","172.30.1.205","TCP","54","135 > 43096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18864","8.548199","172.30.1.104","172.30.1.205","TCP","54","135 > 43096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18865","8.548206","172.30.1.205","172.30.1.104","TCP","54","43096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18866","8.548316","172.30.1.104","172.30.1.205","TCP","66","49671 > 35734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18867","8.548327","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18868","8.548729","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18869","8.549040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18870","8.549049","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18871","8.550954","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18872","8.551304","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18873","8.551311","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18874","8.552675","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18875","8.554531","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18876","8.554543","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18877","8.555514","172.30.1.205","172.30.1.104","TCP","74","43100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911781 TSecr=0 WS=128" +"18878","8.555822","172.30.1.104","172.30.1.205","TCP","66","135 > 43100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18879","8.555833","172.30.1.205","172.30.1.104","TCP","54","43100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18880","8.556185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18881","8.556519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18882","8.556528","172.30.1.205","172.30.1.104","TCP","54","43100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18883","8.558751","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18884","8.559149","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18885","8.559156","172.30.1.205","172.30.1.104","TCP","54","43100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18886","8.561002","172.30.1.205","172.30.1.104","TCP","54","43100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18887","8.561113","172.30.1.205","172.30.1.104","TCP","74","35738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911787 TSecr=0 WS=128" +"18888","8.561332","172.30.1.104","172.30.1.205","TCP","54","135 > 43100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18889","8.561353","172.30.1.104","172.30.1.205","TCP","54","135 > 43100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18890","8.561358","172.30.1.205","172.30.1.104","TCP","54","43100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18891","8.561365","172.30.1.104","172.30.1.205","TCP","66","49671 > 35738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18892","8.561376","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18893","8.561724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18894","8.562027","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18895","8.562036","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18896","8.563924","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18897","8.564330","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18898","8.564340","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18899","8.565728","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18900","8.567566","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18901","8.567574","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18902","8.568495","172.30.1.205","172.30.1.104","TCP","74","43104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911794 TSecr=0 WS=128" +"18903","8.568799","172.30.1.104","172.30.1.205","TCP","66","135 > 43104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18904","8.568815","172.30.1.205","172.30.1.104","TCP","54","43104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18905","8.569176","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18906","8.569471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18907","8.569480","172.30.1.205","172.30.1.104","TCP","54","43104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18908","8.571677","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18909","8.572059","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18910","8.572065","172.30.1.205","172.30.1.104","TCP","54","43104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18911","8.573938","172.30.1.205","172.30.1.104","TCP","54","43104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18912","8.574052","172.30.1.205","172.30.1.104","TCP","74","35742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911800 TSecr=0 WS=128" +"18913","8.574221","172.30.1.104","172.30.1.205","TCP","54","135 > 43104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18914","8.574263","172.30.1.104","172.30.1.205","TCP","54","135 > 43104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18915","8.574269","172.30.1.205","172.30.1.104","TCP","54","43104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18916","8.574344","172.30.1.104","172.30.1.205","TCP","66","49671 > 35742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18917","8.574352","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18918","8.574697","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18919","8.576436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18920","8.576444","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18921","8.578367","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18922","8.579752","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18923","8.579758","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18924","8.581149","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18925","8.583038","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18926","8.583048","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18927","8.583981","172.30.1.205","172.30.1.104","TCP","74","43108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911810 TSecr=0 WS=128" +"18928","8.584305","172.30.1.104","172.30.1.205","TCP","66","135 > 43108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18929","8.584316","172.30.1.205","172.30.1.104","TCP","54","43108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18930","8.584673","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18931","8.584963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18932","8.584972","172.30.1.205","172.30.1.104","TCP","54","43108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18933","8.587219","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18934","8.587626","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18935","8.587632","172.30.1.205","172.30.1.104","TCP","54","43108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18936","8.589483","172.30.1.205","172.30.1.104","TCP","54","43108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18937","8.589594","172.30.1.205","172.30.1.104","TCP","74","35746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911816 TSecr=0 WS=128" +"18938","8.589868","172.30.1.104","172.30.1.205","TCP","54","135 > 43108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18939","8.589896","172.30.1.104","172.30.1.205","TCP","66","49671 > 35746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18940","8.589906","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18941","8.590253","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18942","8.593293","172.30.1.104","172.30.1.205","TCP","54","135 > 43108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18943","8.593301","172.30.1.205","172.30.1.104","TCP","54","43108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18944","8.593399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18945","8.593407","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18946","8.595350","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18947","8.595726","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18948","8.595733","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18949","8.597122","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18950","8.598986","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18951","8.598995","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18952","8.599927","172.30.1.205","172.30.1.104","TCP","74","43112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911826 TSecr=0 WS=128" +"18953","8.600320","172.30.1.104","172.30.1.205","TCP","66","135 > 43112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18954","8.600330","172.30.1.205","172.30.1.104","TCP","54","43112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18955","8.600685","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18956","8.601026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18957","8.601036","172.30.1.205","172.30.1.104","TCP","54","43112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18958","8.603232","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18959","8.603677","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18960","8.603683","172.30.1.205","172.30.1.104","TCP","54","43112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18961","8.605524","172.30.1.205","172.30.1.104","TCP","54","43112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18962","8.605641","172.30.1.205","172.30.1.104","TCP","74","35750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911832 TSecr=0 WS=128" +"18963","8.605944","172.30.1.104","172.30.1.205","TCP","54","135 > 43112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18964","8.605953","172.30.1.104","172.30.1.205","TCP","54","135 > 43112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18965","8.605959","172.30.1.205","172.30.1.104","TCP","54","43112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18966","8.605965","172.30.1.104","172.30.1.205","TCP","66","49671 > 35750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18967","8.605972","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18968","8.606322","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18969","8.606783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18970","8.606792","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18971","8.608677","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18972","8.609654","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18973","8.609661","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18974","8.611032","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"18975","8.612995","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"18976","8.613005","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"18977","8.613957","172.30.1.205","172.30.1.104","TCP","74","43116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911840 TSecr=0 WS=128" +"18978","8.614260","172.30.1.104","172.30.1.205","TCP","66","135 > 43116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18979","8.614270","172.30.1.205","172.30.1.104","TCP","54","43116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18980","8.614617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"18981","8.614917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18982","8.614925","172.30.1.205","172.30.1.104","TCP","54","43116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18983","8.617147","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"18984","8.617621","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"18985","8.617628","172.30.1.205","172.30.1.104","TCP","54","43116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18986","8.619445","172.30.1.205","172.30.1.104","TCP","54","43116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"18987","8.619557","172.30.1.205","172.30.1.104","TCP","74","35754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911845 TSecr=0 WS=128" +"18988","8.619744","172.30.1.104","172.30.1.205","TCP","54","135 > 43116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18989","8.619787","172.30.1.104","172.30.1.205","TCP","54","135 > 43116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"18990","8.619793","172.30.1.205","172.30.1.104","TCP","54","43116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"18991","8.619873","172.30.1.104","172.30.1.205","TCP","66","49671 > 35754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"18992","8.619882","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"18993","8.620228","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"18994","8.620535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"18995","8.620544","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"18996","8.622456","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"18997","8.622871","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"18998","8.622877","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"18999","8.624224","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19000","8.626154","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19001","8.626163","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19002","8.627103","172.30.1.205","172.30.1.104","TCP","74","43120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911853 TSecr=0 WS=128" +"19003","8.627392","172.30.1.104","172.30.1.205","TCP","66","135 > 43120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19004","8.627403","172.30.1.205","172.30.1.104","TCP","54","43120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19005","8.627749","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19006","8.628012","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19007","8.628021","172.30.1.205","172.30.1.104","TCP","54","43120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19008","8.630242","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19009","8.630666","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19010","8.630673","172.30.1.205","172.30.1.104","TCP","54","43120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19011","8.632527","172.30.1.205","172.30.1.104","TCP","54","43120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19012","8.632644","172.30.1.205","172.30.1.104","TCP","74","35758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911859 TSecr=0 WS=128" +"19013","8.632816","172.30.1.104","172.30.1.205","TCP","54","135 > 43120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19014","8.632825","172.30.1.104","172.30.1.205","TCP","54","135 > 43120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19015","8.632831","172.30.1.205","172.30.1.104","TCP","54","43120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19016","8.632980","172.30.1.104","172.30.1.205","TCP","66","49671 > 35758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19017","8.632989","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19018","8.633343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19019","8.633704","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19020","8.633713","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19021","8.635604","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19022","8.635966","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19023","8.635972","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19024","8.637371","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19025","8.640147","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19026","8.640156","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19027","8.641133","172.30.1.205","172.30.1.104","TCP","74","43124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911867 TSecr=0 WS=128" +"19028","8.641436","172.30.1.104","172.30.1.205","TCP","66","135 > 43124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19029","8.641446","172.30.1.205","172.30.1.104","TCP","54","43124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19030","8.641799","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19031","8.642114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19032","8.642124","172.30.1.205","172.30.1.104","TCP","54","43124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19033","8.644312","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19034","8.644700","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19035","8.644706","172.30.1.205","172.30.1.104","TCP","54","43124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19036","8.646530","172.30.1.205","172.30.1.104","TCP","54","43124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19037","8.646643","172.30.1.205","172.30.1.104","TCP","74","35762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911873 TSecr=0 WS=128" +"19038","8.646835","172.30.1.104","172.30.1.205","TCP","54","135 > 43124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19039","8.646865","172.30.1.104","172.30.1.205","TCP","54","135 > 43124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19040","8.646871","172.30.1.205","172.30.1.104","TCP","54","43124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19041","8.646905","172.30.1.104","172.30.1.205","TCP","66","49671 > 35762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19042","8.646914","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19043","8.647260","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19044","8.647575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19045","8.647584","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19046","8.649491","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19047","8.649878","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19048","8.649885","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19049","8.651237","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19050","8.654035","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19051","8.654046","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19052","8.654997","172.30.1.205","172.30.1.104","TCP","74","43128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911881 TSecr=0 WS=128" +"19053","8.655334","172.30.1.104","172.30.1.205","TCP","66","135 > 43128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19054","8.655345","172.30.1.205","172.30.1.104","TCP","54","43128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19055","8.655691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19056","8.655992","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19057","8.656000","172.30.1.205","172.30.1.104","TCP","54","43128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19058","8.658206","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19059","8.658906","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19060","8.658913","172.30.1.205","172.30.1.104","TCP","54","43128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19061","8.660722","172.30.1.205","172.30.1.104","TCP","54","43128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19062","8.660856","172.30.1.205","172.30.1.104","TCP","74","35766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911887 TSecr=0 WS=128" +"19063","8.661039","172.30.1.104","172.30.1.205","TCP","54","135 > 43128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19064","8.661060","172.30.1.104","172.30.1.205","TCP","54","135 > 43128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19065","8.661066","172.30.1.205","172.30.1.104","TCP","54","43128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19066","8.661154","172.30.1.104","172.30.1.205","TCP","66","49671 > 35766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19067","8.661163","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19068","8.661505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19069","8.661857","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19070","8.661866","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19071","8.663716","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19072","8.664101","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19073","8.664105","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19074","8.665501","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19075","8.667346","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19076","8.667355","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19077","8.668273","172.30.1.205","172.30.1.104","TCP","74","43132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911894 TSecr=0 WS=128" +"19078","8.668615","172.30.1.104","172.30.1.205","TCP","66","135 > 43132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19079","8.668626","172.30.1.205","172.30.1.104","TCP","54","43132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19080","8.669004","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19081","8.669334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19082","8.669344","172.30.1.205","172.30.1.104","TCP","54","43132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19083","8.671511","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19084","8.671948","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19085","8.671955","172.30.1.205","172.30.1.104","TCP","54","43132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19086","8.673782","172.30.1.205","172.30.1.104","TCP","54","43132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19087","8.673892","172.30.1.205","172.30.1.104","TCP","74","35770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911900 TSecr=0 WS=128" +"19088","8.674041","172.30.1.104","172.30.1.205","TCP","54","135 > 43132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19089","8.674052","172.30.1.104","172.30.1.205","TCP","54","135 > 43132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19090","8.674057","172.30.1.205","172.30.1.104","TCP","54","43132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19091","8.674220","172.30.1.104","172.30.1.205","TCP","66","49671 > 35770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19092","8.674228","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19093","8.674572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19094","8.674876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19095","8.674885","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19096","8.676759","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19097","8.677131","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19098","8.677138","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19099","8.678485","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19100","8.680335","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19101","8.680344","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19102","8.681299","172.30.1.205","172.30.1.104","TCP","74","43136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911907 TSecr=0 WS=128" +"19103","8.681594","172.30.1.104","172.30.1.205","TCP","66","135 > 43136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19104","8.681605","172.30.1.205","172.30.1.104","TCP","54","43136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19105","8.681960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19106","8.682253","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19107","8.682261","172.30.1.205","172.30.1.104","TCP","54","43136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19108","8.684441","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19109","8.684857","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19110","8.684864","172.30.1.205","172.30.1.104","TCP","54","43136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19111","8.686681","172.30.1.205","172.30.1.104","TCP","54","43136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19112","8.686792","172.30.1.205","172.30.1.104","TCP","74","35774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911913 TSecr=0 WS=128" +"19113","8.686960","172.30.1.104","172.30.1.205","TCP","54","135 > 43136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19114","8.686999","172.30.1.104","172.30.1.205","TCP","54","135 > 43136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19115","8.687004","172.30.1.205","172.30.1.104","TCP","54","43136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19116","8.687095","172.30.1.104","172.30.1.205","TCP","66","49671 > 35774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19117","8.687103","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19118","8.687457","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19119","8.688435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19120","8.688444","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19121","8.690345","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19122","8.690732","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19123","8.690738","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19124","8.692092","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19125","8.693901","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19126","8.693910","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19127","8.694849","172.30.1.205","172.30.1.104","TCP","74","43140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911921 TSecr=0 WS=128" +"19128","8.695161","172.30.1.104","172.30.1.205","TCP","66","135 > 43140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19129","8.695172","172.30.1.205","172.30.1.104","TCP","54","43140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19130","8.695520","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19131","8.695829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19132","8.695838","172.30.1.205","172.30.1.104","TCP","54","43140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19133","8.698044","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19134","8.698411","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19135","8.698417","172.30.1.205","172.30.1.104","TCP","54","43140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19136","8.700230","172.30.1.205","172.30.1.104","TCP","54","43140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19137","8.700341","172.30.1.205","172.30.1.104","TCP","74","35778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911926 TSecr=0 WS=128" +"19138","8.700865","172.30.1.104","172.30.1.205","TCP","54","135 > 43140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19139","8.700876","172.30.1.104","172.30.1.205","TCP","54","135 > 43140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19140","8.700882","172.30.1.205","172.30.1.104","TCP","54","43140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19141","8.701082","172.30.1.104","172.30.1.205","TCP","66","49671 > 35778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19142","8.701091","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19143","8.701437","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19144","8.701733","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19145","8.701742","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19146","8.703601","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19147","8.704017","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19148","8.704021","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19149","8.705410","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19150","8.707341","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19151","8.707351","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19152","8.708286","172.30.1.205","172.30.1.104","TCP","74","43144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911934 TSecr=0 WS=128" +"19153","8.708643","172.30.1.104","172.30.1.205","TCP","66","135 > 43144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19154","8.708654","172.30.1.205","172.30.1.104","TCP","54","43144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19155","8.709038","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19156","8.709356","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19157","8.709365","172.30.1.205","172.30.1.104","TCP","54","43144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19158","8.711560","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19159","8.711969","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19160","8.711976","172.30.1.205","172.30.1.104","TCP","54","43144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19161","8.712852","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19162","8.712900","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19163","8.712938","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19164","8.712967","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19165","8.712996","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19166","8.713025","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19167","8.713053","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19168","8.713081","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19169","8.713112","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19170","8.713144","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19171","8.713171","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19172","8.713241","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19173","8.713309","172.30.1.104","172.30.1.205","TCP","54","49671 > 35738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19174","8.713318","172.30.1.104","172.30.1.205","TCP","54","49671 > 35742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19175","8.713322","172.30.1.104","172.30.1.205","TCP","54","49671 > 35738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19176","8.713328","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19177","8.713345","172.30.1.104","172.30.1.205","TCP","54","49671 > 35746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19178","8.713361","172.30.1.104","172.30.1.205","TCP","54","49671 > 35750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19179","8.713381","172.30.1.104","172.30.1.205","TCP","54","49671 > 35754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19180","8.713401","172.30.1.104","172.30.1.205","TCP","54","49671 > 35758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19181","8.713421","172.30.1.104","172.30.1.205","TCP","54","49671 > 35762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19182","8.713442","172.30.1.104","172.30.1.205","TCP","54","49671 > 35754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19183","8.713447","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19184","8.713514","172.30.1.104","172.30.1.205","TCP","54","49671 > 35766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19185","8.713567","172.30.1.104","172.30.1.205","TCP","54","49671 > 35750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19186","8.713572","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19187","8.713574","172.30.1.104","172.30.1.205","TCP","54","49671 > 35766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19188","8.713576","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19189","8.713577","172.30.1.104","172.30.1.205","TCP","54","49671 > 35762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19190","8.713579","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19191","8.713589","172.30.1.104","172.30.1.205","TCP","54","49671 > 35758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19192","8.713590","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19193","8.713609","172.30.1.104","172.30.1.205","TCP","54","49671 > 35742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19194","8.713612","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19195","8.713633","172.30.1.104","172.30.1.205","TCP","54","49671 > 35746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19196","8.713636","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19197","8.713789","172.30.1.104","172.30.1.205","TCP","54","49671 > 35770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19198","8.713808","172.30.1.104","172.30.1.205","TCP","54","49671 > 35774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19199","8.713827","172.30.1.104","172.30.1.205","TCP","54","49671 > 35778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19200","8.713856","172.30.1.104","172.30.1.205","TCP","54","49671 > 35770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19201","8.713860","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19202","8.713863","172.30.1.104","172.30.1.205","TCP","54","49671 > 35774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19203","8.713865","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19204","8.713887","172.30.1.104","172.30.1.205","TCP","54","49671 > 35778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19205","8.713889","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19206","8.713973","172.30.1.104","172.30.1.205","TCP","54","49671 > 35734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19207","8.713992","172.30.1.104","172.30.1.205","TCP","54","49671 > 35734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19208","8.713996","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19209","8.714776","172.30.1.205","172.30.1.104","TCP","54","43144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19210","8.714891","172.30.1.205","172.30.1.104","TCP","74","35782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911941 TSecr=0 WS=128" +"19211","8.715095","172.30.1.104","172.30.1.205","TCP","54","135 > 43144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19212","8.715103","172.30.1.104","172.30.1.205","TCP","54","135 > 43144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19213","8.715108","172.30.1.205","172.30.1.104","TCP","54","43144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19214","8.715174","172.30.1.104","172.30.1.205","TCP","66","49671 > 35782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19215","8.715182","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19216","8.715533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19217","8.715829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19218","8.715838","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19219","8.717765","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19220","8.718131","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19221","8.718138","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19222","8.719502","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19223","8.721385","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19224","8.721395","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19225","8.722363","172.30.1.205","172.30.1.104","TCP","74","43148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911948 TSecr=0 WS=128" +"19226","8.722679","172.30.1.104","172.30.1.205","TCP","66","135 > 43148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19227","8.722690","172.30.1.205","172.30.1.104","TCP","54","43148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19228","8.723037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19229","8.723339","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19230","8.723348","172.30.1.205","172.30.1.104","TCP","54","43148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19231","8.725564","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19232","8.725951","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19233","8.725958","172.30.1.205","172.30.1.104","TCP","54","43148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19234","8.727759","172.30.1.205","172.30.1.104","TCP","54","43148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19235","8.727869","172.30.1.205","172.30.1.104","TCP","74","35786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911954 TSecr=0 WS=128" +"19236","8.728029","172.30.1.104","172.30.1.205","TCP","54","135 > 43148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19237","8.728061","172.30.1.104","172.30.1.205","TCP","54","135 > 43148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19238","8.728067","172.30.1.205","172.30.1.104","TCP","54","43148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19239","8.728140","172.30.1.104","172.30.1.205","TCP","66","49671 > 35786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19240","8.728148","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19241","8.728492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19242","8.728810","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19243","8.728819","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19244","8.730700","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19245","8.731164","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19246","8.731170","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19247","8.732507","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19248","8.734446","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19249","8.734455","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19250","8.735411","172.30.1.205","172.30.1.104","TCP","74","43152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911961 TSecr=0 WS=128" +"19251","8.735697","172.30.1.104","172.30.1.205","TCP","66","135 > 43152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19252","8.735715","172.30.1.205","172.30.1.104","TCP","54","43152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19253","8.736064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19254","8.736347","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19255","8.736356","172.30.1.205","172.30.1.104","TCP","54","43152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19256","8.738591","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19257","8.738995","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19258","8.739001","172.30.1.205","172.30.1.104","TCP","54","43152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19259","8.740828","172.30.1.205","172.30.1.104","TCP","54","43152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19260","8.740942","172.30.1.205","172.30.1.104","TCP","74","35790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911967 TSecr=0 WS=128" +"19261","8.741105","172.30.1.104","172.30.1.205","TCP","54","135 > 43152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19262","8.741139","172.30.1.104","172.30.1.205","TCP","54","135 > 43152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19263","8.741145","172.30.1.205","172.30.1.104","TCP","54","43152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19264","8.741223","172.30.1.104","172.30.1.205","TCP","66","49671 > 35790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19265","8.741231","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19266","8.741582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19267","8.743917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19268","8.743924","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19269","8.745822","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19270","8.746253","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19271","8.746260","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19272","8.747612","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19273","8.749495","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19274","8.749504","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19275","8.750456","172.30.1.205","172.30.1.104","TCP","74","43156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911976 TSecr=0 WS=128" +"19276","8.750773","172.30.1.104","172.30.1.205","TCP","66","135 > 43156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19277","8.750790","172.30.1.205","172.30.1.104","TCP","54","43156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19278","8.751198","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19279","8.751550","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19280","8.751560","172.30.1.205","172.30.1.104","TCP","54","43156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19281","8.753817","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19282","8.754216","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19283","8.754222","172.30.1.205","172.30.1.104","TCP","54","43156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19284","8.756053","172.30.1.205","172.30.1.104","TCP","54","43156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19285","8.756170","172.30.1.205","172.30.1.104","TCP","74","35794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911982 TSecr=0 WS=128" +"19286","8.756387","172.30.1.104","172.30.1.205","TCP","54","135 > 43156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19287","8.756427","172.30.1.104","172.30.1.205","TCP","54","135 > 43156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19288","8.756432","172.30.1.205","172.30.1.104","TCP","54","43156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19289","8.756479","172.30.1.104","172.30.1.205","TCP","66","49671 > 35794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19290","8.756487","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19291","8.756862","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19292","8.757216","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19293","8.757224","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19294","8.759093","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19295","8.760401","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19296","8.760407","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19297","8.761775","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19298","8.763664","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19299","8.763673","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19300","8.764611","172.30.1.205","172.30.1.104","TCP","74","43160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911991 TSecr=0 WS=128" +"19301","8.764970","172.30.1.104","172.30.1.205","TCP","66","135 > 43160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19302","8.764980","172.30.1.205","172.30.1.104","TCP","54","43160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19303","8.765334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19304","8.765672","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19305","8.765681","172.30.1.205","172.30.1.104","TCP","54","43160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19306","8.767848","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19307","8.768241","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19308","8.768247","172.30.1.205","172.30.1.104","TCP","54","43160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19309","8.770081","172.30.1.205","172.30.1.104","TCP","54","43160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19310","8.770190","172.30.1.205","172.30.1.104","TCP","74","35798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911996 TSecr=0 WS=128" +"19311","8.770355","172.30.1.104","172.30.1.205","TCP","54","135 > 43160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19312","8.770384","172.30.1.104","172.30.1.205","TCP","54","135 > 43160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19313","8.770390","172.30.1.205","172.30.1.104","TCP","54","43160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19314","8.770465","172.30.1.104","172.30.1.205","TCP","66","49671 > 35798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19315","8.770472","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19316","8.770817","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19317","8.771142","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19318","8.771150","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19319","8.773032","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19320","8.773405","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19321","8.773411","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19322","8.774748","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19323","8.776611","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19324","8.776622","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19325","8.777597","172.30.1.205","172.30.1.104","TCP","74","43164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912004 TSecr=0 WS=128" +"19326","8.777922","172.30.1.104","172.30.1.205","TCP","66","135 > 43164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19327","8.777932","172.30.1.205","172.30.1.104","TCP","54","43164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19328","8.778288","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19329","8.778582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19330","8.778591","172.30.1.205","172.30.1.104","TCP","54","43164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19331","8.780772","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19332","8.781203","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19333","8.781209","172.30.1.205","172.30.1.104","TCP","54","43164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19334","8.783094","172.30.1.205","172.30.1.104","TCP","54","43164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19335","8.783203","172.30.1.205","172.30.1.104","TCP","74","35802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912009 TSecr=0 WS=128" +"19336","8.783364","172.30.1.104","172.30.1.205","TCP","54","135 > 43164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19337","8.783403","172.30.1.104","172.30.1.205","TCP","54","135 > 43164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19338","8.783419","172.30.1.205","172.30.1.104","TCP","54","43164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19339","8.783466","172.30.1.104","172.30.1.205","TCP","66","49671 > 35802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19340","8.783473","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19341","8.783838","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19342","8.784133","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19343","8.784140","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19344","8.786110","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19345","8.787155","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19346","8.787161","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19347","8.788593","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19348","8.790500","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19349","8.790515","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19350","8.791539","172.30.1.205","172.30.1.104","TCP","74","43168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912017 TSecr=0 WS=128" +"19351","8.792713","172.30.1.104","172.30.1.205","TCP","66","135 > 43168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19352","8.792727","172.30.1.205","172.30.1.104","TCP","54","43168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19353","8.793120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19354","8.793413","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19355","8.793422","172.30.1.205","172.30.1.104","TCP","54","43168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19356","8.795656","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19357","8.796049","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19358","8.796056","172.30.1.205","172.30.1.104","TCP","54","43168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19359","8.797917","172.30.1.205","172.30.1.104","TCP","54","43168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19360","8.798041","172.30.1.205","172.30.1.104","TCP","74","35806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912024 TSecr=0 WS=128" +"19361","8.798221","172.30.1.104","172.30.1.205","TCP","54","135 > 43168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19362","8.798234","172.30.1.104","172.30.1.205","TCP","54","135 > 43168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19363","8.798243","172.30.1.205","172.30.1.104","TCP","54","43168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19364","8.798360","172.30.1.104","172.30.1.205","TCP","66","49671 > 35806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19365","8.798377","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19366","8.799014","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19367","8.799327","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19368","8.799337","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19369","8.801270","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19370","8.801651","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19371","8.801660","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19372","8.803114","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19373","8.804997","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19374","8.805008","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19375","8.806000","172.30.1.205","172.30.1.104","TCP","74","43172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912032 TSecr=0 WS=128" +"19376","8.806298","172.30.1.104","172.30.1.205","TCP","66","135 > 43172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19377","8.806308","172.30.1.205","172.30.1.104","TCP","54","43172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19378","8.806665","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19379","8.806943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19380","8.806952","172.30.1.205","172.30.1.104","TCP","54","43172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19381","8.809218","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19382","8.809593","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19383","8.809600","172.30.1.205","172.30.1.104","TCP","54","43172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19384","8.811423","172.30.1.205","172.30.1.104","TCP","54","43172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19385","8.811535","172.30.1.205","172.30.1.104","TCP","74","35810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912037 TSecr=0 WS=128" +"19386","8.811685","172.30.1.104","172.30.1.205","TCP","54","135 > 43172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19387","8.811710","172.30.1.104","172.30.1.205","TCP","54","135 > 43172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19388","8.811716","172.30.1.205","172.30.1.104","TCP","54","43172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19389","8.811820","172.30.1.104","172.30.1.205","TCP","66","49671 > 35810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19390","8.811829","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19391","8.812179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19392","8.812702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19393","8.812711","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19394","8.814631","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19395","8.815006","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19396","8.815012","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19397","8.816381","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19398","8.818321","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19399","8.818332","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19400","8.819292","172.30.1.205","172.30.1.104","TCP","74","43176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912045 TSecr=0 WS=128" +"19401","8.819596","172.30.1.104","172.30.1.205","TCP","66","135 > 43176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19402","8.819607","172.30.1.205","172.30.1.104","TCP","54","43176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19403","8.819960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19404","8.820246","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19405","8.820255","172.30.1.205","172.30.1.104","TCP","54","43176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19406","8.822488","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19407","8.822880","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19408","8.822887","172.30.1.205","172.30.1.104","TCP","54","43176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19409","8.824721","172.30.1.205","172.30.1.104","TCP","54","43176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19410","8.824856","172.30.1.205","172.30.1.104","TCP","74","35814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912051 TSecr=0 WS=128" +"19411","8.825023","172.30.1.104","172.30.1.205","TCP","54","135 > 43176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19412","8.825055","172.30.1.104","172.30.1.205","TCP","54","135 > 43176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19413","8.825061","172.30.1.205","172.30.1.104","TCP","54","43176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19414","8.825155","172.30.1.104","172.30.1.205","TCP","66","49671 > 35814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19415","8.825167","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19416","8.825514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19417","8.825846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19418","8.825855","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19419","8.827742","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19420","8.828143","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19421","8.828149","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19422","8.829552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19423","8.832438","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19424","8.832449","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19425","8.833425","172.30.1.205","172.30.1.104","TCP","74","43180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912059 TSecr=0 WS=128" +"19426","8.833725","172.30.1.104","172.30.1.205","TCP","66","135 > 43180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19427","8.833736","172.30.1.205","172.30.1.104","TCP","54","43180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19428","8.834096","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19429","8.834400","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19430","8.834411","172.30.1.205","172.30.1.104","TCP","54","43180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19431","8.836625","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19432","8.837041","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19433","8.837048","172.30.1.205","172.30.1.104","TCP","54","43180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19434","8.838863","172.30.1.205","172.30.1.104","TCP","54","43180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19435","8.838975","172.30.1.205","172.30.1.104","TCP","74","35818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912065 TSecr=0 WS=128" +"19436","8.839161","172.30.1.104","172.30.1.205","TCP","54","135 > 43180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19437","8.839305","172.30.1.104","172.30.1.205","TCP","54","135 > 43180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19438","8.839310","172.30.1.205","172.30.1.104","TCP","54","43180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19439","8.839331","172.30.1.104","172.30.1.205","TCP","66","49671 > 35818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19440","8.839339","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19441","8.839684","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19442","8.839986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19443","8.839995","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19444","8.841924","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19445","8.842329","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19446","8.842336","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19447","8.843694","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19448","8.845678","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19449","8.845688","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19450","8.846646","172.30.1.205","172.30.1.104","TCP","74","43184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912073 TSecr=0 WS=128" +"19451","8.846973","172.30.1.104","172.30.1.205","TCP","66","135 > 43184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19452","8.846984","172.30.1.205","172.30.1.104","TCP","54","43184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19453","8.847343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19454","8.847635","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19455","8.847645","172.30.1.205","172.30.1.104","TCP","54","43184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19456","8.849886","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19457","8.850320","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19458","8.850327","172.30.1.205","172.30.1.104","TCP","54","43184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19459","8.852142","172.30.1.205","172.30.1.104","TCP","54","43184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19460","8.852255","172.30.1.205","172.30.1.104","TCP","74","35822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912078 TSecr=0 WS=128" +"19461","8.852439","172.30.1.104","172.30.1.205","TCP","54","135 > 43184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19462","8.852463","172.30.1.104","172.30.1.205","TCP","54","135 > 43184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19463","8.852469","172.30.1.205","172.30.1.104","TCP","54","43184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19464","8.852570","172.30.1.104","172.30.1.205","TCP","66","49671 > 35822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19465","8.852579","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19466","8.852958","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19467","8.853235","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19468","8.853244","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19469","8.855153","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19470","8.855595","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19471","8.855602","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19472","8.856988","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19473","8.858971","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19474","8.858981","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19475","8.859951","172.30.1.205","172.30.1.104","TCP","74","43188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912086 TSecr=0 WS=128" +"19476","8.860266","172.30.1.104","172.30.1.205","TCP","66","135 > 43188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19477","8.860277","172.30.1.205","172.30.1.104","TCP","54","43188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19478","8.860634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19479","8.860943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19480","8.860952","172.30.1.205","172.30.1.104","TCP","54","43188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19481","8.863156","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19482","8.863565","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19483","8.863572","172.30.1.205","172.30.1.104","TCP","54","43188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19484","8.865410","172.30.1.205","172.30.1.104","TCP","54","43188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19485","8.865530","172.30.1.205","172.30.1.104","TCP","74","35826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912091 TSecr=0 WS=128" +"19486","8.865693","172.30.1.104","172.30.1.205","TCP","54","135 > 43188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19487","8.865754","172.30.1.104","172.30.1.205","TCP","54","135 > 43188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19488","8.865761","172.30.1.205","172.30.1.104","TCP","54","43188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19489","8.865879","172.30.1.104","172.30.1.205","TCP","66","49671 > 35826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19490","8.865887","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19491","8.866233","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19492","8.867750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19493","8.867757","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19494","8.869662","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19495","8.870027","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19496","8.870034","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19497","8.871413","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19498","8.873447","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19499","8.873457","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19500","8.874427","172.30.1.205","172.30.1.104","TCP","74","43192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912100 TSecr=0 WS=128" +"19501","8.874721","172.30.1.104","172.30.1.205","TCP","66","135 > 43192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19502","8.874743","172.30.1.205","172.30.1.104","TCP","54","43192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19503","8.875103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19504","8.875404","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19505","8.875413","172.30.1.205","172.30.1.104","TCP","54","43192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19506","8.877710","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19507","8.878138","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19508","8.878144","172.30.1.205","172.30.1.104","TCP","54","43192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19509","8.878993","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19510","8.879043","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19511","8.879081","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19512","8.879112","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19513","8.879145","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19514","8.879181","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19515","8.879215","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19516","8.879241","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19517","8.879268","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19518","8.879294","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19519","8.879315","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19520","8.879337","172.30.1.104","172.30.1.205","TCP","54","49671 > 35786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19521","8.879355","172.30.1.104","172.30.1.205","TCP","54","49671 > 35790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19522","8.879384","172.30.1.104","172.30.1.205","TCP","54","49671 > 35786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19523","8.879390","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19524","8.879407","172.30.1.104","172.30.1.205","TCP","54","49671 > 35794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19525","8.879426","172.30.1.104","172.30.1.205","TCP","54","49671 > 35798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19526","8.879454","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19527","8.879552","172.30.1.104","172.30.1.205","TCP","54","49671 > 35802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19528","8.879579","172.30.1.104","172.30.1.205","TCP","54","49671 > 35802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19529","8.879584","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19530","8.879601","172.30.1.104","172.30.1.205","TCP","54","49671 > 35798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19531","8.879604","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19532","8.879658","172.30.1.104","172.30.1.205","TCP","54","49671 > 35794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19533","8.879662","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19534","8.879682","172.30.1.104","172.30.1.205","TCP","54","49671 > 35790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19535","8.879685","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19536","8.879703","172.30.1.104","172.30.1.205","TCP","54","49671 > 35806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19537","8.879767","172.30.1.104","172.30.1.205","TCP","54","49671 > 35810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19538","8.879772","172.30.1.104","172.30.1.205","TCP","54","49671 > 35814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19539","8.879860","172.30.1.104","172.30.1.205","TCP","54","49671 > 35806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19540","8.879866","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19541","8.879880","172.30.1.104","172.30.1.205","TCP","54","49671 > 35818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19542","8.879903","172.30.1.104","172.30.1.205","TCP","54","49671 > 35818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19543","8.879907","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19544","8.879922","172.30.1.104","172.30.1.205","TCP","54","49671 > 35810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19545","8.879925","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19546","8.879943","172.30.1.104","172.30.1.205","TCP","54","49671 > 35814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19547","8.879947","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19548","8.879962","172.30.1.104","172.30.1.205","TCP","54","49671 > 35822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19549","8.879984","172.30.1.104","172.30.1.205","TCP","54","49671 > 35826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19550","8.880089","172.30.1.104","172.30.1.205","TCP","54","49671 > 35782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19551","8.880109","172.30.1.104","172.30.1.205","TCP","54","49671 > 35822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19552","8.880114","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19553","8.880130","172.30.1.104","172.30.1.205","TCP","54","49671 > 35826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19554","8.880133","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19555","8.880153","172.30.1.104","172.30.1.205","TCP","54","49671 > 35782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19556","8.880156","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19557","8.881027","172.30.1.205","172.30.1.104","TCP","54","43192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19558","8.881146","172.30.1.205","172.30.1.104","TCP","74","35830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912107 TSecr=0 WS=128" +"19559","8.881297","172.30.1.104","172.30.1.205","TCP","54","135 > 43192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19560","8.881311","172.30.1.104","172.30.1.205","TCP","54","135 > 43192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19561","8.881316","172.30.1.205","172.30.1.104","TCP","54","43192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19562","8.881409","172.30.1.104","172.30.1.205","TCP","66","49671 > 35830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19563","8.881418","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19564","8.881769","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19565","8.882048","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19566","8.882058","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19567","8.883927","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19568","8.884301","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19569","8.884308","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19570","8.885693","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19571","8.887765","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19572","8.887775","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19573","8.888748","172.30.1.205","172.30.1.104","TCP","74","43196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912115 TSecr=0 WS=128" +"19574","8.889045","172.30.1.104","172.30.1.205","TCP","66","135 > 43196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19575","8.889057","172.30.1.205","172.30.1.104","TCP","54","43196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19576","8.889423","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19577","8.889724","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19578","8.889738","172.30.1.205","172.30.1.104","TCP","54","43196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19579","8.892019","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19580","8.892420","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19581","8.892427","172.30.1.205","172.30.1.104","TCP","54","43196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19582","8.894279","172.30.1.205","172.30.1.104","TCP","54","43196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19583","8.894404","172.30.1.205","172.30.1.104","TCP","74","35834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912120 TSecr=0 WS=128" +"19584","8.894528","172.30.1.104","172.30.1.205","TCP","54","135 > 43196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19585","8.894545","172.30.1.104","172.30.1.205","TCP","54","135 > 43196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19586","8.894552","172.30.1.205","172.30.1.104","TCP","54","43196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19587","8.894700","172.30.1.104","172.30.1.205","TCP","66","49671 > 35834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19588","8.894712","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19589","8.895068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19590","8.895354","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19591","8.895363","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19592","8.897297","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19593","8.897653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19594","8.897660","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19595","8.899032","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19596","8.900920","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19597","8.900930","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19598","8.901897","172.30.1.205","172.30.1.104","TCP","74","43200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912128 TSecr=0 WS=128" +"19599","8.902204","172.30.1.104","172.30.1.205","TCP","66","135 > 43200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19600","8.902220","172.30.1.205","172.30.1.104","TCP","54","43200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19601","8.902579","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19602","8.902867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19603","8.902876","172.30.1.205","172.30.1.104","TCP","54","43200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19604","8.905139","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19605","8.905790","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19606","8.905797","172.30.1.205","172.30.1.104","TCP","54","43200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19607","8.907634","172.30.1.205","172.30.1.104","TCP","54","43200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19608","8.907759","172.30.1.205","172.30.1.104","TCP","74","35838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912134 TSecr=0 WS=128" +"19609","8.907946","172.30.1.104","172.30.1.205","TCP","54","135 > 43200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19610","8.907969","172.30.1.104","172.30.1.205","TCP","54","135 > 43200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19611","8.907975","172.30.1.205","172.30.1.104","TCP","54","43200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19612","8.908067","172.30.1.104","172.30.1.205","TCP","66","49671 > 35838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19613","8.908075","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19614","8.908429","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19615","8.908718","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19616","8.908726","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19617","8.910619","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19618","8.910985","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19619","8.910992","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19620","8.912342","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19621","8.914224","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19622","8.914233","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19623","8.915194","172.30.1.205","172.30.1.104","TCP","74","43204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912141 TSecr=0 WS=128" +"19624","8.915609","172.30.1.104","172.30.1.205","TCP","66","135 > 43204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19625","8.915626","172.30.1.205","172.30.1.104","TCP","54","43204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19626","8.916036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19627","8.916334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19628","8.916346","172.30.1.205","172.30.1.104","TCP","54","43204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19629","8.918657","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19630","8.919061","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19631","8.919068","172.30.1.205","172.30.1.104","TCP","54","43204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19632","8.920912","172.30.1.205","172.30.1.104","TCP","54","43204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19633","8.921030","172.30.1.205","172.30.1.104","TCP","74","35842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912147 TSecr=0 WS=128" +"19634","8.921176","172.30.1.104","172.30.1.205","TCP","54","135 > 43204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19635","8.921187","172.30.1.104","172.30.1.205","TCP","54","135 > 43204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19636","8.921193","172.30.1.205","172.30.1.104","TCP","54","43204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19637","8.921365","172.30.1.104","172.30.1.205","TCP","66","49671 > 35842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19638","8.921374","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19639","8.921724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19640","8.923076","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19641","8.923085","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19642","8.924996","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19643","8.925350","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19644","8.925356","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19645","8.926725","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19646","8.928642","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19647","8.928651","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19648","8.929621","172.30.1.205","172.30.1.104","TCP","74","43208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912156 TSecr=0 WS=128" +"19649","8.929939","172.30.1.104","172.30.1.205","TCP","66","135 > 43208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19650","8.929950","172.30.1.205","172.30.1.104","TCP","54","43208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19651","8.930309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19652","8.930671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19653","8.930679","172.30.1.205","172.30.1.104","TCP","54","43208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19654","8.932885","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19655","8.933269","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19656","8.933275","172.30.1.205","172.30.1.104","TCP","54","43208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19657","8.935079","172.30.1.205","172.30.1.104","TCP","54","43208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19658","8.935190","172.30.1.205","172.30.1.104","TCP","74","35846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912161 TSecr=0 WS=128" +"19659","8.935331","172.30.1.104","172.30.1.205","TCP","54","135 > 43208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19660","8.935361","172.30.1.104","172.30.1.205","TCP","54","135 > 43208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19661","8.935367","172.30.1.205","172.30.1.104","TCP","54","43208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19662","8.935449","172.30.1.104","172.30.1.205","TCP","66","49671 > 35846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19663","8.935458","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19664","8.935799","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19665","8.936100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19666","8.936108","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19667","8.938021","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19668","8.938396","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19669","8.938402","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19670","8.939747","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19671","8.941652","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19672","8.941661","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19673","8.942599","172.30.1.205","172.30.1.104","TCP","74","43212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912169 TSecr=0 WS=128" +"19674","8.942942","172.30.1.104","172.30.1.205","TCP","66","135 > 43212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19675","8.942958","172.30.1.205","172.30.1.104","TCP","54","43212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19676","8.943348","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19677","8.943681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19678","8.943690","172.30.1.205","172.30.1.104","TCP","54","43212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19679","8.945936","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19680","8.946376","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19681","8.946383","172.30.1.205","172.30.1.104","TCP","54","43212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19682","8.948219","172.30.1.205","172.30.1.104","TCP","54","43212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19683","8.948338","172.30.1.205","172.30.1.104","TCP","74","35850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912174 TSecr=0 WS=128" +"19684","8.948492","172.30.1.104","172.30.1.205","TCP","54","135 > 43212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19685","8.948504","172.30.1.104","172.30.1.205","TCP","54","135 > 43212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19686","8.948509","172.30.1.205","172.30.1.104","TCP","54","43212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19687","8.948610","172.30.1.104","172.30.1.205","TCP","66","49671 > 35850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19688","8.948618","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19689","8.948999","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19690","8.949305","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19691","8.949315","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19692","8.951216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19693","8.951584","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19694","8.951590","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19695","8.952988","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19696","8.954964","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19697","8.954976","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19698","8.955951","172.30.1.205","172.30.1.104","TCP","74","43216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912182 TSecr=0 WS=128" +"19699","8.956286","172.30.1.104","172.30.1.205","TCP","66","135 > 43216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19700","8.956297","172.30.1.205","172.30.1.104","TCP","54","43216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19701","8.956654","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19702","8.956955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19703","8.956965","172.30.1.205","172.30.1.104","TCP","54","43216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19704","8.959208","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19705","8.959603","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19706","8.959609","172.30.1.205","172.30.1.104","TCP","54","43216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19707","8.961447","172.30.1.205","172.30.1.104","TCP","54","43216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19708","8.961564","172.30.1.205","172.30.1.104","TCP","74","35854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912187 TSecr=0 WS=128" +"19709","8.961724","172.30.1.104","172.30.1.205","TCP","54","135 > 43216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19710","8.961733","172.30.1.104","172.30.1.205","TCP","54","135 > 43216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19711","8.961743","172.30.1.205","172.30.1.104","TCP","54","43216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19712","8.961835","172.30.1.104","172.30.1.205","TCP","66","49671 > 35854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19713","8.961852","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19714","8.962198","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19715","8.962503","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19716","8.962512","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19717","8.964383","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19718","8.964792","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19719","8.964799","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19720","8.966194","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19721","8.968136","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19722","8.968145","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19723","8.969144","172.30.1.205","172.30.1.104","TCP","74","43220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912195 TSecr=0 WS=128" +"19724","8.969454","172.30.1.104","172.30.1.205","TCP","66","135 > 43220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19725","8.969464","172.30.1.205","172.30.1.104","TCP","54","43220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19726","8.969818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19727","8.970159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19728","8.970168","172.30.1.205","172.30.1.104","TCP","54","43220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19729","8.972368","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19730","8.972755","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19731","8.972761","172.30.1.205","172.30.1.104","TCP","54","43220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19732","8.974592","172.30.1.205","172.30.1.104","TCP","54","43220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19733","8.974709","172.30.1.205","172.30.1.104","TCP","74","35858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912201 TSecr=0 WS=128" +"19734","8.974864","172.30.1.104","172.30.1.205","TCP","54","135 > 43220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19735","8.974888","172.30.1.104","172.30.1.205","TCP","54","135 > 43220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19736","8.974895","172.30.1.205","172.30.1.104","TCP","54","43220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19737","8.974982","172.30.1.104","172.30.1.205","TCP","66","49671 > 35858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19738","8.974991","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19739","8.975343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19740","8.976821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19741","8.976831","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19742","8.978737","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19743","8.979120","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19744","8.979127","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19745","8.980482","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19746","8.982361","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19747","8.982371","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19748","8.983340","172.30.1.205","172.30.1.104","TCP","74","43224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912209 TSecr=0 WS=128" +"19749","8.983656","172.30.1.104","172.30.1.205","TCP","66","135 > 43224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19750","8.983666","172.30.1.205","172.30.1.104","TCP","54","43224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19751","8.984013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19752","8.984390","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19753","8.984399","172.30.1.205","172.30.1.104","TCP","54","43224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19754","8.986608","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19755","8.987028","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19756","8.987035","172.30.1.205","172.30.1.104","TCP","54","43224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19757","8.988867","172.30.1.205","172.30.1.104","TCP","54","43224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19758","8.988979","172.30.1.205","172.30.1.104","TCP","74","35862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912215 TSecr=0 WS=128" +"19759","8.989168","172.30.1.104","172.30.1.205","TCP","54","135 > 43224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19760","8.989193","172.30.1.104","172.30.1.205","TCP","54","135 > 43224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19761","8.989199","172.30.1.205","172.30.1.104","TCP","54","43224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19762","8.989273","172.30.1.104","172.30.1.205","TCP","66","49671 > 35862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19763","8.989282","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19764","8.989634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19765","8.989961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19766","8.989969","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19767","8.991847","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19768","8.992233","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19769","8.992239","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19770","8.993610","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19771","8.995488","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19772","8.995497","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19773","8.996424","172.30.1.205","172.30.1.104","TCP","74","43228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912222 TSecr=0 WS=128" +"19774","8.996718","172.30.1.104","172.30.1.205","TCP","66","135 > 43228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19775","8.996728","172.30.1.205","172.30.1.104","TCP","54","43228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19776","8.997101","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19777","8.997404","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19778","8.997413","172.30.1.205","172.30.1.104","TCP","54","43228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19779","8.999628","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19780","9.000009","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19781","9.000016","172.30.1.205","172.30.1.104","TCP","54","43228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19782","9.001871","172.30.1.205","172.30.1.104","TCP","54","43228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19783","9.002004","172.30.1.205","172.30.1.104","TCP","74","35866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912228 TSecr=0 WS=128" +"19784","9.002146","172.30.1.104","172.30.1.205","TCP","54","135 > 43228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19785","9.002154","172.30.1.104","172.30.1.205","TCP","54","135 > 43228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19786","9.002159","172.30.1.205","172.30.1.104","TCP","54","43228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19787","9.002310","172.30.1.104","172.30.1.205","TCP","66","49671 > 35866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19788","9.002330","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19789","9.002685","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19790","9.004846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19791","9.004854","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19792","9.006720","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19793","9.007132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19794","9.007139","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19795","9.008503","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19796","9.011991","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19797","9.012002","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19798","9.013035","172.30.1.205","172.30.1.104","TCP","74","43232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912239 TSecr=0 WS=128" +"19799","9.013351","172.30.1.104","172.30.1.205","TCP","66","135 > 43232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19800","9.013363","172.30.1.205","172.30.1.104","TCP","54","43232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19801","9.013724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19802","9.013999","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19803","9.014009","172.30.1.205","172.30.1.104","TCP","54","43232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19804","9.016227","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19805","9.016613","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19806","9.016620","172.30.1.205","172.30.1.104","TCP","54","43232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19807","9.018461","172.30.1.205","172.30.1.104","TCP","54","43232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19808","9.018582","172.30.1.205","172.30.1.104","TCP","74","35870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912245 TSecr=0 WS=128" +"19809","9.018784","172.30.1.104","172.30.1.205","TCP","54","135 > 43232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19810","9.018885","172.30.1.104","172.30.1.205","TCP","54","135 > 43232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19811","9.018893","172.30.1.205","172.30.1.104","TCP","54","43232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19812","9.018898","172.30.1.104","172.30.1.205","TCP","66","49671 > 35870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19813","9.018909","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19814","9.019266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19815","9.019545","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19816","9.019554","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19817","9.021492","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19818","9.021839","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19819","9.021845","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19820","9.023198","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19821","9.025073","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19822","9.025082","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19823","9.026040","172.30.1.205","172.30.1.104","TCP","74","43236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912252 TSecr=0 WS=128" +"19824","9.026334","172.30.1.104","172.30.1.205","TCP","66","135 > 43236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19825","9.026344","172.30.1.205","172.30.1.104","TCP","54","43236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19826","9.026695","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19827","9.026950","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19828","9.026958","172.30.1.205","172.30.1.104","TCP","54","43236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19829","9.029172","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19830","9.029517","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19831","9.029523","172.30.1.205","172.30.1.104","TCP","54","43236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19832","9.031339","172.30.1.205","172.30.1.104","TCP","54","43236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19833","9.031451","172.30.1.205","172.30.1.104","TCP","74","35874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912257 TSecr=0 WS=128" +"19834","9.031638","172.30.1.104","172.30.1.205","TCP","54","135 > 43236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19835","9.031647","172.30.1.104","172.30.1.205","TCP","54","135 > 43236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19836","9.031652","172.30.1.205","172.30.1.104","TCP","54","43236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19837","9.031729","172.30.1.104","172.30.1.205","TCP","66","49671 > 35874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19838","9.031737","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19839","9.032085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19840","9.032383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19841","9.032391","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19842","9.034316","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19843","9.034657","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19844","9.034664","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19845","9.036016","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19846","9.039194","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19847","9.039203","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19848","9.040149","172.30.1.205","172.30.1.104","TCP","74","43240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912266 TSecr=0 WS=128" +"19849","9.040460","172.30.1.104","172.30.1.205","TCP","66","135 > 43240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19850","9.040473","172.30.1.205","172.30.1.104","TCP","54","43240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19851","9.040860","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19852","9.041126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19853","9.041135","172.30.1.205","172.30.1.104","TCP","54","43240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19854","9.043331","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19855","9.043704","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19856","9.043710","172.30.1.205","172.30.1.104","TCP","54","43240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19857","9.044573","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19858","9.044621","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19859","9.044654","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19860","9.044682","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19861","9.044711","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19862","9.044739","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19863","9.044766","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19864","9.044822","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19865","9.044847","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19866","9.044869","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19867","9.044902","172.30.1.104","172.30.1.205","TCP","54","49671 > 35830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19868","9.044929","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19869","9.044948","172.30.1.104","172.30.1.205","TCP","54","49671 > 35830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19870","9.044957","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19871","9.044983","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19872","9.045084","172.30.1.104","172.30.1.205","TCP","54","49671 > 35834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19873","9.045106","172.30.1.104","172.30.1.205","TCP","54","49671 > 35838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19874","9.045127","172.30.1.104","172.30.1.205","TCP","54","49671 > 35842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19875","9.045196","172.30.1.104","172.30.1.205","TCP","54","49671 > 35846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19876","9.045215","172.30.1.104","172.30.1.205","TCP","54","49671 > 35850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19877","9.045236","172.30.1.104","172.30.1.205","TCP","54","49671 > 35854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19878","9.045256","172.30.1.104","172.30.1.205","TCP","54","49671 > 35854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19879","9.045262","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19880","9.045277","172.30.1.104","172.30.1.205","TCP","54","49671 > 35850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19881","9.045279","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19882","9.045300","172.30.1.104","172.30.1.205","TCP","54","49671 > 35846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19883","9.045304","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19884","9.045322","172.30.1.104","172.30.1.205","TCP","54","49671 > 35834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19885","9.045324","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19886","9.045341","172.30.1.104","172.30.1.205","TCP","54","49671 > 35838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19887","9.045344","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19888","9.045370","172.30.1.104","172.30.1.205","TCP","54","49671 > 35842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19889","9.045374","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19890","9.045500","172.30.1.104","172.30.1.205","TCP","54","49671 > 35858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19891","9.045520","172.30.1.104","172.30.1.205","TCP","54","49671 > 35862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19892","9.045540","172.30.1.104","172.30.1.205","TCP","54","49671 > 35866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19893","9.045559","172.30.1.104","172.30.1.205","TCP","54","49671 > 35870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19894","9.045721","172.30.1.104","172.30.1.205","TCP","54","49671 > 35874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19895","9.045741","172.30.1.104","172.30.1.205","TCP","54","49671 > 35874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19896","9.045746","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19897","9.045760","172.30.1.104","172.30.1.205","TCP","54","49671 > 35870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19898","9.045762","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19899","9.045784","172.30.1.104","172.30.1.205","TCP","54","49671 > 35858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19900","9.045787","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19901","9.045805","172.30.1.104","172.30.1.205","TCP","54","49671 > 35862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19902","9.045807","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19903","9.045825","172.30.1.104","172.30.1.205","TCP","54","49671 > 35866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"19904","9.045827","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"19905","9.046559","172.30.1.205","172.30.1.104","TCP","54","43240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19906","9.046670","172.30.1.205","172.30.1.104","TCP","74","35878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912273 TSecr=0 WS=128" +"19907","9.046798","172.30.1.104","172.30.1.205","TCP","54","135 > 43240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19908","9.046827","172.30.1.104","172.30.1.205","TCP","54","135 > 43240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19909","9.046832","172.30.1.205","172.30.1.104","TCP","54","43240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19910","9.046955","172.30.1.104","172.30.1.205","TCP","66","49671 > 35878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19911","9.046963","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19912","9.047323","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19913","9.047594","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19914","9.047602","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19915","9.049512","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19916","9.049846","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19917","9.049853","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19918","9.051230","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19919","9.053095","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19920","9.053105","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19921","9.054050","172.30.1.205","172.30.1.104","TCP","74","43244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912280 TSecr=0 WS=128" +"19922","9.054351","172.30.1.104","172.30.1.205","TCP","66","135 > 43244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19923","9.054361","172.30.1.205","172.30.1.104","TCP","54","43244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19924","9.054715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19925","9.055003","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19926","9.055013","172.30.1.205","172.30.1.104","TCP","54","43244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19927","9.057231","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19928","9.057616","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19929","9.057623","172.30.1.205","172.30.1.104","TCP","54","43244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19930","9.059434","172.30.1.205","172.30.1.104","TCP","54","43244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19931","9.059543","172.30.1.205","172.30.1.104","TCP","74","35882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912285 TSecr=0 WS=128" +"19932","9.059688","172.30.1.104","172.30.1.205","TCP","54","135 > 43244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19933","9.059747","172.30.1.104","172.30.1.205","TCP","54","135 > 43244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19934","9.059753","172.30.1.205","172.30.1.104","TCP","54","43244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19935","9.059841","172.30.1.104","172.30.1.205","TCP","66","49671 > 35882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19936","9.059849","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19937","9.060189","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19938","9.060458","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19939","9.060467","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19940","9.062371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19941","9.062737","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19942","9.062743","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19943","9.064086","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19944","9.065964","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19945","9.065973","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19946","9.066916","172.30.1.205","172.30.1.104","TCP","74","43248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912293 TSecr=0 WS=128" +"19947","9.067205","172.30.1.104","172.30.1.205","TCP","66","135 > 43248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19948","9.067215","172.30.1.205","172.30.1.104","TCP","54","43248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19949","9.067567","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19950","9.067855","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19951","9.067864","172.30.1.205","172.30.1.104","TCP","54","43248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19952","9.070084","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19953","9.070495","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19954","9.070502","172.30.1.205","172.30.1.104","TCP","54","43248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19955","9.072311","172.30.1.205","172.30.1.104","TCP","54","43248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19956","9.072424","172.30.1.205","172.30.1.104","TCP","74","35886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912298 TSecr=0 WS=128" +"19957","9.072587","172.30.1.104","172.30.1.205","TCP","54","135 > 43248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19958","9.072610","172.30.1.104","172.30.1.205","TCP","54","135 > 43248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19959","9.072616","172.30.1.205","172.30.1.104","TCP","54","43248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19960","9.072728","172.30.1.104","172.30.1.205","TCP","66","49671 > 35886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19961","9.072740","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19962","9.073133","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19963","9.073418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19964","9.073426","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19965","9.075295","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19966","9.075652","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19967","9.075658","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19968","9.077039","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19969","9.078959","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19970","9.078968","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19971","9.079915","172.30.1.205","172.30.1.104","TCP","74","43252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912306 TSecr=0 WS=128" +"19972","9.080204","172.30.1.104","172.30.1.205","TCP","66","135 > 43252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19973","9.080215","172.30.1.205","172.30.1.104","TCP","54","43252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19974","9.080581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"19975","9.080885","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19976","9.080894","172.30.1.205","172.30.1.104","TCP","54","43252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19977","9.083091","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"19978","9.083454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"19979","9.083462","172.30.1.205","172.30.1.104","TCP","54","43252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19980","9.085303","172.30.1.205","172.30.1.104","TCP","54","43252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"19981","9.085414","172.30.1.205","172.30.1.104","TCP","74","35890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912311 TSecr=0 WS=128" +"19982","9.085572","172.30.1.104","172.30.1.205","TCP","54","135 > 43252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19983","9.085583","172.30.1.104","172.30.1.205","TCP","54","135 > 43252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"19984","9.085588","172.30.1.205","172.30.1.104","TCP","54","43252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"19985","9.085725","172.30.1.104","172.30.1.205","TCP","66","49671 > 35890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19986","9.085733","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19987","9.086085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"19988","9.086395","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"19989","9.086403","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"19990","9.088291","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"19991","9.088666","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"19992","9.088673","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"19993","9.090072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"19994","9.091976","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"19995","9.091988","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"19996","9.092961","172.30.1.205","172.30.1.104","TCP","74","43256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912319 TSecr=0 WS=128" +"19997","9.093257","172.30.1.104","172.30.1.205","TCP","66","135 > 43256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"19998","9.093270","172.30.1.205","172.30.1.104","TCP","54","43256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"19999","9.093628","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20000","9.093938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20001","9.093949","172.30.1.205","172.30.1.104","TCP","54","43256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20002","9.096128","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20003","9.096493","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20004","9.096499","172.30.1.205","172.30.1.104","TCP","54","43256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20005","9.098334","172.30.1.205","172.30.1.104","TCP","54","43256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20006","9.098446","172.30.1.205","172.30.1.104","TCP","74","35894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912324 TSecr=0 WS=128" +"20007","9.098602","172.30.1.104","172.30.1.205","TCP","54","135 > 43256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20008","9.098617","172.30.1.104","172.30.1.205","TCP","54","135 > 43256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20009","9.098623","172.30.1.205","172.30.1.104","TCP","54","43256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20010","9.098760","172.30.1.104","172.30.1.205","TCP","66","49671 > 35894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20011","9.098768","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20012","9.099118","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20013","9.100081","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20014","9.100088","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20015","9.102014","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20016","9.102376","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20017","9.102383","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20018","9.103733","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20019","9.105769","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20020","9.105778","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20021","9.106722","172.30.1.205","172.30.1.104","TCP","74","43260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912333 TSecr=0 WS=128" +"20022","9.106999","172.30.1.104","172.30.1.205","TCP","66","135 > 43260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20023","9.107010","172.30.1.205","172.30.1.104","TCP","54","43260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20024","9.107364","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20025","9.107654","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20026","9.107663","172.30.1.205","172.30.1.104","TCP","54","43260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20027","9.109885","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20028","9.110262","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20029","9.110269","172.30.1.205","172.30.1.104","TCP","54","43260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20030","9.112097","172.30.1.205","172.30.1.104","TCP","54","43260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20031","9.112209","172.30.1.205","172.30.1.104","TCP","74","35898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912338 TSecr=0 WS=128" +"20032","9.112359","172.30.1.104","172.30.1.205","TCP","54","135 > 43260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20033","9.112374","172.30.1.104","172.30.1.205","TCP","54","135 > 43260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20034","9.112379","172.30.1.205","172.30.1.104","TCP","54","43260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20035","9.112458","172.30.1.104","172.30.1.205","TCP","66","49671 > 35898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20036","9.112466","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20037","9.112838","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20038","9.114176","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20039","9.114183","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20040","9.116056","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20041","9.116440","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20042","9.116446","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20043","9.117833","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20044","9.119832","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20045","9.119844","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20046","9.120847","172.30.1.205","172.30.1.104","TCP","74","43264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912347 TSecr=0 WS=128" +"20047","9.121191","172.30.1.104","172.30.1.205","TCP","66","135 > 43264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20048","9.121202","172.30.1.205","172.30.1.104","TCP","54","43264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20049","9.121554","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20050","9.121849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20051","9.121858","172.30.1.205","172.30.1.104","TCP","54","43264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20052","9.124047","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20053","9.124438","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20054","9.124451","172.30.1.205","172.30.1.104","TCP","54","43264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20055","9.126283","172.30.1.205","172.30.1.104","TCP","54","43264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20056","9.126395","172.30.1.205","172.30.1.104","TCP","74","35902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912352 TSecr=0 WS=128" +"20057","9.126575","172.30.1.104","172.30.1.205","TCP","54","135 > 43264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20058","9.126583","172.30.1.104","172.30.1.205","TCP","54","135 > 43264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20059","9.126588","172.30.1.205","172.30.1.104","TCP","54","43264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20060","9.126687","172.30.1.104","172.30.1.205","TCP","66","49671 > 35902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20061","9.126696","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20062","9.127040","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20063","9.127369","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20064","9.127377","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20065","9.129280","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20066","9.129646","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20067","9.129653","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20068","9.131024","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20069","9.132950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20070","9.132959","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20071","9.133910","172.30.1.205","172.30.1.104","TCP","74","43268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912360 TSecr=0 WS=128" +"20072","9.134226","172.30.1.104","172.30.1.205","TCP","66","135 > 43268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20073","9.134237","172.30.1.205","172.30.1.104","TCP","54","43268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20074","9.134584","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20075","9.134971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20076","9.134981","172.30.1.205","172.30.1.104","TCP","54","43268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20077","9.137203","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20078","9.137610","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20079","9.137616","172.30.1.205","172.30.1.104","TCP","54","43268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20080","9.139429","172.30.1.205","172.30.1.104","TCP","54","43268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20081","9.139540","172.30.1.205","172.30.1.104","TCP","74","35906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912365 TSecr=0 WS=128" +"20082","9.139741","172.30.1.104","172.30.1.205","TCP","54","135 > 43268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20083","9.139773","172.30.1.104","172.30.1.205","TCP","54","135 > 43268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20084","9.139778","172.30.1.205","172.30.1.104","TCP","54","43268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20085","9.139815","172.30.1.104","172.30.1.205","TCP","66","49671 > 35906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20086","9.139823","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20087","9.140164","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20088","9.140484","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20089","9.140493","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20090","9.142400","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20091","9.144053","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20092","9.144063","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20093","9.145539","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20094","9.147546","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20095","9.147557","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20096","9.148529","172.30.1.205","172.30.1.104","TCP","74","43272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912374 TSecr=0 WS=128" +"20097","9.148875","172.30.1.104","172.30.1.205","TCP","66","135 > 43272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20098","9.148886","172.30.1.205","172.30.1.104","TCP","54","43272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20099","9.149247","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20100","9.149546","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20101","9.149556","172.30.1.205","172.30.1.104","TCP","54","43272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20102","9.151749","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20103","9.152139","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20104","9.152146","172.30.1.205","172.30.1.104","TCP","54","43272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20105","9.153977","172.30.1.205","172.30.1.104","TCP","54","43272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20106","9.154087","172.30.1.205","172.30.1.104","TCP","74","35910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912380 TSecr=0 WS=128" +"20107","9.154288","172.30.1.104","172.30.1.205","TCP","54","135 > 43272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20108","9.154300","172.30.1.104","172.30.1.205","TCP","54","135 > 43272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20109","9.154306","172.30.1.205","172.30.1.104","TCP","54","43272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20110","9.154401","172.30.1.104","172.30.1.205","TCP","66","49671 > 35910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20111","9.154410","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20112","9.154764","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20113","9.155075","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20114","9.155089","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20115","9.157094","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20116","9.157465","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20117","9.157471","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20118","9.158826","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20119","9.161718","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20120","9.161728","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20121","9.162685","172.30.1.205","172.30.1.104","TCP","74","43276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912389 TSecr=0 WS=128" +"20122","9.163002","172.30.1.104","172.30.1.205","TCP","66","135 > 43276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20123","9.163015","172.30.1.205","172.30.1.104","TCP","54","43276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20124","9.163371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20125","9.163683","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20126","9.163696","172.30.1.205","172.30.1.104","TCP","54","43276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20127","9.166009","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20128","9.166454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20129","9.166461","172.30.1.205","172.30.1.104","TCP","54","43276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20130","9.168297","172.30.1.205","172.30.1.104","TCP","54","43276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20131","9.168416","172.30.1.205","172.30.1.104","TCP","74","35914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912394 TSecr=0 WS=128" +"20132","9.168623","172.30.1.104","172.30.1.205","TCP","54","135 > 43276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20133","9.168634","172.30.1.104","172.30.1.205","TCP","54","135 > 43276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20134","9.168640","172.30.1.205","172.30.1.104","TCP","54","43276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20135","9.168726","172.30.1.104","172.30.1.205","TCP","66","49671 > 35914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20136","9.168734","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20137","9.169099","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20138","9.169447","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20139","9.169456","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20140","9.171336","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20141","9.171748","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20142","9.171754","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20143","9.173131","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20144","9.175036","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20145","9.175045","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20146","9.175971","172.30.1.205","172.30.1.104","TCP","74","43280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912402 TSecr=0 WS=128" +"20147","9.176278","172.30.1.104","172.30.1.205","TCP","66","135 > 43280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20148","9.176289","172.30.1.205","172.30.1.104","TCP","54","43280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20149","9.176649","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20150","9.176940","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20151","9.176950","172.30.1.205","172.30.1.104","TCP","54","43280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20152","9.179165","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20153","9.179592","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20154","9.179599","172.30.1.205","172.30.1.104","TCP","54","43280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20155","9.181427","172.30.1.205","172.30.1.104","TCP","54","43280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20156","9.181538","172.30.1.205","172.30.1.104","TCP","74","35918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912407 TSecr=0 WS=128" +"20157","9.181697","172.30.1.104","172.30.1.205","TCP","54","135 > 43280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20158","9.181705","172.30.1.104","172.30.1.205","TCP","54","135 > 43280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20159","9.181711","172.30.1.205","172.30.1.104","TCP","54","43280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20160","9.181813","172.30.1.104","172.30.1.205","TCP","66","49671 > 35918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20161","9.181821","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20162","9.182167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20163","9.182475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20164","9.182484","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20165","9.184377","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20166","9.184832","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20167","9.184839","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20168","9.186193","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20169","9.188087","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20170","9.188098","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20171","9.189072","172.30.1.205","172.30.1.104","TCP","74","43284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912415 TSecr=0 WS=128" +"20172","9.189390","172.30.1.104","172.30.1.205","TCP","66","135 > 43284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20173","9.189401","172.30.1.205","172.30.1.104","TCP","54","43284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20174","9.189761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20175","9.190049","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20176","9.190058","172.30.1.205","172.30.1.104","TCP","54","43284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20177","9.192230","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20178","9.192638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20179","9.192645","172.30.1.205","172.30.1.104","TCP","54","43284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20180","9.194469","172.30.1.205","172.30.1.104","TCP","54","43284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20181","9.194577","172.30.1.205","172.30.1.104","TCP","74","35922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912421 TSecr=0 WS=128" +"20182","9.194788","172.30.1.104","172.30.1.205","TCP","54","135 > 43284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20183","9.194797","172.30.1.104","172.30.1.205","TCP","54","135 > 43284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20184","9.194802","172.30.1.205","172.30.1.104","TCP","54","43284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20185","9.194878","172.30.1.104","172.30.1.205","TCP","66","49671 > 35922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20186","9.194886","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20187","9.195228","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20188","9.196250","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20189","9.196259","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20190","9.198159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20191","9.198540","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20192","9.198546","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20193","9.199877","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20194","9.201810","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20195","9.201819","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20196","9.202746","172.30.1.205","172.30.1.104","TCP","74","43288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912429 TSecr=0 WS=128" +"20197","9.203038","172.30.1.104","172.30.1.205","TCP","66","135 > 43288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20198","9.203049","172.30.1.205","172.30.1.104","TCP","54","43288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20199","9.203410","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20200","9.203717","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20201","9.203726","172.30.1.205","172.30.1.104","TCP","54","43288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20202","9.205925","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20203","9.206352","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20204","9.206359","172.30.1.205","172.30.1.104","TCP","54","43288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20205","9.207199","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20206","9.207246","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20207","9.207284","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20208","9.207313","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20209","9.207342","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20210","9.207369","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20211","9.207397","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20212","9.207428","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20213","9.207451","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20214","9.207472","172.30.1.104","172.30.1.205","TCP","54","49671 > 35882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20215","9.207486","172.30.1.104","172.30.1.205","TCP","54","49671 > 35886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20216","9.207497","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20217","9.207531","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20218","9.207599","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20219","9.207615","172.30.1.104","172.30.1.205","TCP","54","49671 > 35890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20220","9.207638","172.30.1.104","172.30.1.205","TCP","54","49671 > 35882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20221","9.207644","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20222","9.207661","172.30.1.104","172.30.1.205","TCP","54","49671 > 35886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20223","9.207664","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20224","9.207682","172.30.1.104","172.30.1.205","TCP","54","49671 > 35890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20225","9.207685","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20226","9.207703","172.30.1.104","172.30.1.205","TCP","54","49671 > 35894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20227","9.207723","172.30.1.104","172.30.1.205","TCP","54","49671 > 35898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20228","9.207747","172.30.1.104","172.30.1.205","TCP","54","49671 > 35902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20229","9.207864","172.30.1.104","172.30.1.205","TCP","54","49671 > 35894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20230","9.207869","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20231","9.207884","172.30.1.104","172.30.1.205","TCP","54","49671 > 35906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20232","9.207908","172.30.1.104","172.30.1.205","TCP","54","49671 > 35906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20233","9.207912","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20234","9.207928","172.30.1.104","172.30.1.205","TCP","54","49671 > 35898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20235","9.207931","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20236","9.207949","172.30.1.104","172.30.1.205","TCP","54","49671 > 35902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20237","9.207952","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20238","9.207968","172.30.1.104","172.30.1.205","TCP","54","49671 > 35910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20239","9.207990","172.30.1.104","172.30.1.205","TCP","54","49671 > 35914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20240","9.208012","172.30.1.104","172.30.1.205","TCP","54","49671 > 35918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20241","9.208116","172.30.1.104","172.30.1.205","TCP","54","49671 > 35910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20242","9.208121","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20243","9.208134","172.30.1.104","172.30.1.205","TCP","54","49671 > 35922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20244","9.208158","172.30.1.104","172.30.1.205","TCP","54","49671 > 35922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20245","9.208161","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20246","9.208180","172.30.1.104","172.30.1.205","TCP","54","49671 > 35914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20247","9.208182","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20248","9.208199","172.30.1.104","172.30.1.205","TCP","54","49671 > 35918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20249","9.208201","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20250","9.208219","172.30.1.104","172.30.1.205","TCP","54","49671 > 35878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20251","9.208350","172.30.1.104","172.30.1.205","TCP","54","49671 > 35878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20252","9.208354","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20253","9.209175","172.30.1.205","172.30.1.104","TCP","54","43288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20254","9.209283","172.30.1.205","172.30.1.104","TCP","74","35926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912435 TSecr=0 WS=128" +"20255","9.209429","172.30.1.104","172.30.1.205","TCP","54","135 > 43288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20256","9.209450","172.30.1.104","172.30.1.205","TCP","54","135 > 43288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20257","9.209455","172.30.1.205","172.30.1.104","TCP","54","43288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20258","9.209553","172.30.1.104","172.30.1.205","TCP","66","49671 > 35926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20259","9.209561","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20260","9.209917","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20261","9.210190","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20262","9.210199","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20263","9.212083","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20264","9.212521","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20265","9.212527","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20266","9.213901","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20267","9.215969","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20268","9.215978","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20269","9.216933","172.30.1.205","172.30.1.104","TCP","74","43292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912443 TSecr=0 WS=128" +"20270","9.217275","172.30.1.104","172.30.1.205","TCP","66","135 > 43292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20271","9.217285","172.30.1.205","172.30.1.104","TCP","54","43292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20272","9.217635","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20273","9.217935","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20274","9.217944","172.30.1.205","172.30.1.104","TCP","54","43292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20275","9.220109","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20276","9.220489","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20277","9.220496","172.30.1.205","172.30.1.104","TCP","54","43292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20278","9.222308","172.30.1.205","172.30.1.104","TCP","54","43292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20279","9.222418","172.30.1.205","172.30.1.104","TCP","74","35930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912448 TSecr=0 WS=128" +"20280","9.222601","172.30.1.104","172.30.1.205","TCP","54","135 > 43292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20281","9.222623","172.30.1.104","172.30.1.205","TCP","54","135 > 43292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20282","9.222628","172.30.1.205","172.30.1.104","TCP","54","43292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20283","9.222722","172.30.1.104","172.30.1.205","TCP","66","49671 > 35930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20284","9.222730","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20285","9.223071","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20286","9.223401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20287","9.223409","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20288","9.225307","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20289","9.225695","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20290","9.225700","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20291","9.227035","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20292","9.228959","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20293","9.228968","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20294","9.229902","172.30.1.205","172.30.1.104","TCP","74","43296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912456 TSecr=0 WS=128" +"20295","9.230222","172.30.1.104","172.30.1.205","TCP","66","135 > 43296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20296","9.230233","172.30.1.205","172.30.1.104","TCP","54","43296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20297","9.230581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20298","9.230895","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20299","9.230903","172.30.1.205","172.30.1.104","TCP","54","43296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20300","9.233117","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20301","9.233497","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20302","9.233503","172.30.1.205","172.30.1.104","TCP","54","43296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20303","9.235314","172.30.1.205","172.30.1.104","TCP","54","43296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20304","9.235422","172.30.1.205","172.30.1.104","TCP","74","35934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912461 TSecr=0 WS=128" +"20305","9.235588","172.30.1.104","172.30.1.205","TCP","54","135 > 43296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20306","9.235609","172.30.1.104","172.30.1.205","TCP","54","135 > 43296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20307","9.235615","172.30.1.205","172.30.1.104","TCP","54","43296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20308","9.235710","172.30.1.104","172.30.1.205","TCP","66","49671 > 35934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20309","9.235718","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20310","9.236062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20311","9.236337","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20312","9.236345","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20313","9.238244","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20314","9.238601","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20315","9.238605","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20316","9.239953","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20317","9.241877","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20318","9.241891","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20319","9.242926","172.30.1.205","172.30.1.104","TCP","74","43300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912469 TSecr=0 WS=128" +"20320","9.243243","172.30.1.104","172.30.1.205","TCP","66","135 > 43300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20321","9.243256","172.30.1.205","172.30.1.104","TCP","54","43300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20322","9.243620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20323","9.243950","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20324","9.243959","172.30.1.205","172.30.1.104","TCP","54","43300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20325","9.246205","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20326","9.246628","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20327","9.246635","172.30.1.205","172.30.1.104","TCP","54","43300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20328","9.248469","172.30.1.205","172.30.1.104","TCP","54","43300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20329","9.248587","172.30.1.205","172.30.1.104","TCP","74","35938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912475 TSecr=0 WS=128" +"20330","9.248771","172.30.1.104","172.30.1.205","TCP","54","135 > 43300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20331","9.248790","172.30.1.104","172.30.1.205","TCP","54","135 > 43300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20332","9.248795","172.30.1.205","172.30.1.104","TCP","54","43300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20333","9.248889","172.30.1.104","172.30.1.205","TCP","66","49671 > 35938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20334","9.248903","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20335","9.249259","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20336","9.250774","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20337","9.250782","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20338","9.252668","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20339","9.253019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20340","9.253026","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20341","9.254393","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20342","9.257665","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20343","9.257676","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20344","9.258652","172.30.1.205","172.30.1.104","TCP","74","43304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912485 TSecr=0 WS=128" +"20345","9.258936","172.30.1.104","172.30.1.205","TCP","66","135 > 43304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20346","9.258947","172.30.1.205","172.30.1.104","TCP","54","43304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20347","9.259309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20348","9.259575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20349","9.259584","172.30.1.205","172.30.1.104","TCP","54","43304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20350","9.261802","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20351","9.262205","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20352","9.262212","172.30.1.205","172.30.1.104","TCP","54","43304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20353","9.264027","172.30.1.205","172.30.1.104","TCP","54","43304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20354","9.264138","172.30.1.205","172.30.1.104","TCP","74","35942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912490 TSecr=0 WS=128" +"20355","9.264311","172.30.1.104","172.30.1.205","TCP","54","135 > 43304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20356","9.264336","172.30.1.104","172.30.1.205","TCP","54","135 > 43304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20357","9.264342","172.30.1.205","172.30.1.104","TCP","54","43304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20358","9.264453","172.30.1.104","172.30.1.205","TCP","66","49671 > 35942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20359","9.264462","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20360","9.264835","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20361","9.265233","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20362","9.265242","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20363","9.267109","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20364","9.267513","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20365","9.267520","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20366","9.268919","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20367","9.270840","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20368","9.270850","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20369","9.271789","172.30.1.205","172.30.1.104","TCP","74","43308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912498 TSecr=0 WS=128" +"20370","9.272088","172.30.1.104","172.30.1.205","TCP","66","135 > 43308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20371","9.272099","172.30.1.205","172.30.1.104","TCP","54","43308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20372","9.272452","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20373","9.272765","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20374","9.272784","172.30.1.205","172.30.1.104","TCP","54","43308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20375","9.274985","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20376","9.275396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20377","9.275403","172.30.1.205","172.30.1.104","TCP","54","43308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20378","9.277261","172.30.1.205","172.30.1.104","TCP","54","43308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20379","9.277406","172.30.1.205","172.30.1.104","TCP","74","35946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912503 TSecr=0 WS=128" +"20380","9.277558","172.30.1.104","172.30.1.205","TCP","54","135 > 43308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20381","9.277568","172.30.1.104","172.30.1.205","TCP","54","135 > 43308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20382","9.277580","172.30.1.205","172.30.1.104","TCP","54","43308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20383","9.277731","172.30.1.104","172.30.1.205","TCP","66","49671 > 35946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20384","9.277739","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20385","9.278089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20386","9.278380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20387","9.278389","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20388","9.280285","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20389","9.280644","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20390","9.280650","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20391","9.282047","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20392","9.284023","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20393","9.284032","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20394","9.285015","172.30.1.205","172.30.1.104","TCP","74","43312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912511 TSecr=0 WS=128" +"20395","9.285332","172.30.1.104","172.30.1.205","TCP","66","135 > 43312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20396","9.285342","172.30.1.205","172.30.1.104","TCP","54","43312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20397","9.285691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20398","9.285986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20399","9.285994","172.30.1.205","172.30.1.104","TCP","54","43312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20400","9.288185","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20401","9.288590","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20402","9.288597","172.30.1.205","172.30.1.104","TCP","54","43312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20403","9.290439","172.30.1.205","172.30.1.104","TCP","54","43312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20404","9.290552","172.30.1.205","172.30.1.104","TCP","74","35950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912516 TSecr=0 WS=128" +"20405","9.290697","172.30.1.104","172.30.1.205","TCP","54","135 > 43312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20406","9.290727","172.30.1.104","172.30.1.205","TCP","54","135 > 43312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20407","9.290732","172.30.1.205","172.30.1.104","TCP","54","43312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20408","9.290836","172.30.1.104","172.30.1.205","TCP","66","49671 > 35950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20409","9.290844","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20410","9.291198","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20411","9.291602","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20412","9.291609","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20413","9.293509","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20414","9.294002","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20415","9.294009","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20416","9.295386","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20417","9.297339","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20418","9.297349","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20419","9.298304","172.30.1.205","172.30.1.104","TCP","74","43316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912524 TSecr=0 WS=128" +"20420","9.298619","172.30.1.104","172.30.1.205","TCP","66","135 > 43316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20421","9.298629","172.30.1.205","172.30.1.104","TCP","54","43316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20422","9.298980","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20423","9.299266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20424","9.299274","172.30.1.205","172.30.1.104","TCP","54","43316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20425","9.301490","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20426","9.301951","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20427","9.301958","172.30.1.205","172.30.1.104","TCP","54","43316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20428","9.303766","172.30.1.205","172.30.1.104","TCP","54","43316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20429","9.303877","172.30.1.205","172.30.1.104","TCP","74","35954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912530 TSecr=0 WS=128" +"20430","9.304088","172.30.1.104","172.30.1.205","TCP","54","135 > 43316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20431","9.304097","172.30.1.104","172.30.1.205","TCP","54","135 > 43316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20432","9.304103","172.30.1.205","172.30.1.104","TCP","54","43316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20433","9.304180","172.30.1.104","172.30.1.205","TCP","66","49671 > 35954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20434","9.304189","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20435","9.304539","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20436","9.304833","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20437","9.304842","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20438","9.306730","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20439","9.307143","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20440","9.307149","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20441","9.308501","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20442","9.310448","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20443","9.310458","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20444","9.311401","172.30.1.205","172.30.1.104","TCP","74","43320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912537 TSecr=0 WS=128" +"20445","9.311701","172.30.1.104","172.30.1.205","TCP","66","135 > 43320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20446","9.311711","172.30.1.205","172.30.1.104","TCP","54","43320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20447","9.312056","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20448","9.312364","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20449","9.312372","172.30.1.205","172.30.1.104","TCP","54","43320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20450","9.314572","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20451","9.314965","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20452","9.314972","172.30.1.205","172.30.1.104","TCP","54","43320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20453","9.316795","172.30.1.205","172.30.1.104","TCP","54","43320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20454","9.316904","172.30.1.205","172.30.1.104","TCP","74","35958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912543 TSecr=0 WS=128" +"20455","9.317066","172.30.1.104","172.30.1.205","TCP","54","135 > 43320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20456","9.317088","172.30.1.104","172.30.1.205","TCP","54","135 > 43320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20457","9.317093","172.30.1.205","172.30.1.104","TCP","54","43320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20458","9.317188","172.30.1.104","172.30.1.205","TCP","66","49671 > 35958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20459","9.317197","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20460","9.317540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20461","9.317849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20462","9.317860","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20463","9.319720","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20464","9.320096","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20465","9.320103","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20466","9.321503","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20467","9.323465","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20468","9.323476","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20469","9.324416","172.30.1.205","172.30.1.104","TCP","74","43324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912550 TSecr=0 WS=128" +"20470","9.324730","172.30.1.104","172.30.1.205","TCP","66","135 > 43324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20471","9.324741","172.30.1.205","172.30.1.104","TCP","54","43324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20472","9.325109","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20473","9.325461","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20474","9.325469","172.30.1.205","172.30.1.104","TCP","54","43324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20475","9.327650","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20476","9.328052","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20477","9.328058","172.30.1.205","172.30.1.104","TCP","54","43324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20478","9.329901","172.30.1.205","172.30.1.104","TCP","54","43324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20479","9.330012","172.30.1.205","172.30.1.104","TCP","74","35962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912556 TSecr=0 WS=128" +"20480","9.330190","172.30.1.104","172.30.1.205","TCP","54","135 > 43324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20481","9.330199","172.30.1.104","172.30.1.205","TCP","54","135 > 43324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20482","9.330204","172.30.1.205","172.30.1.104","TCP","54","43324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20483","9.330327","172.30.1.104","172.30.1.205","TCP","66","49671 > 35962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20484","9.330335","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20485","9.330681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20486","9.331022","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20487","9.331029","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20488","9.332932","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20489","9.333317","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20490","9.333326","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20491","9.334747","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20492","9.337683","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20493","9.337694","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20494","9.338632","172.30.1.205","172.30.1.104","TCP","74","43328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912565 TSecr=0 WS=128" +"20495","9.338944","172.30.1.104","172.30.1.205","TCP","66","135 > 43328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20496","9.338954","172.30.1.205","172.30.1.104","TCP","54","43328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20497","9.339314","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20498","9.339616","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20499","9.339625","172.30.1.205","172.30.1.104","TCP","54","43328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20500","9.341837","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20501","9.342245","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20502","9.342257","172.30.1.205","172.30.1.104","TCP","54","43328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20503","9.344061","172.30.1.205","172.30.1.104","TCP","54","43328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20504","9.344171","172.30.1.205","172.30.1.104","TCP","74","35966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912570 TSecr=0 WS=128" +"20505","9.344338","172.30.1.104","172.30.1.205","TCP","54","135 > 43328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20506","9.344362","172.30.1.104","172.30.1.205","TCP","54","135 > 43328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20507","9.344368","172.30.1.205","172.30.1.104","TCP","54","43328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20508","9.344487","172.30.1.104","172.30.1.205","TCP","66","49671 > 35966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20509","9.344498","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20510","9.344870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20511","9.345176","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20512","9.345185","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20513","9.347040","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20514","9.347427","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20515","9.347433","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20516","9.348805","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20517","9.350695","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20518","9.350704","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20519","9.351638","172.30.1.205","172.30.1.104","TCP","74","43332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912578 TSecr=0 WS=128" +"20520","9.351929","172.30.1.104","172.30.1.205","TCP","66","135 > 43332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20521","9.351946","172.30.1.205","172.30.1.104","TCP","54","43332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20522","9.352291","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20523","9.352574","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20524","9.352582","172.30.1.205","172.30.1.104","TCP","54","43332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20525","9.354763","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20526","9.355157","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20527","9.355164","172.30.1.205","172.30.1.104","TCP","54","43332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20528","9.356988","172.30.1.205","172.30.1.104","TCP","54","43332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20529","9.357104","172.30.1.205","172.30.1.104","TCP","74","35970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912583 TSecr=0 WS=128" +"20530","9.357271","172.30.1.104","172.30.1.205","TCP","54","135 > 43332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20531","9.357292","172.30.1.104","172.30.1.205","TCP","54","135 > 43332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20532","9.357297","172.30.1.205","172.30.1.104","TCP","54","43332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20533","9.357375","172.30.1.104","172.30.1.205","TCP","66","49671 > 35970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20534","9.357383","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20535","9.357729","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20536","9.358015","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20537","9.358023","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20538","9.359883","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20539","9.360240","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20540","9.360246","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20541","9.361621","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20542","9.363552","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20543","9.363561","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20544","9.364486","172.30.1.205","172.30.1.104","TCP","74","43336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912590 TSecr=0 WS=128" +"20545","9.364821","172.30.1.104","172.30.1.205","TCP","66","135 > 43336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20546","9.364832","172.30.1.205","172.30.1.104","TCP","54","43336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20547","9.365178","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20548","9.365488","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20549","9.365498","172.30.1.205","172.30.1.104","TCP","54","43336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20550","9.367660","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20551","9.368086","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20552","9.368093","172.30.1.205","172.30.1.104","TCP","54","43336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20553","9.368958","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20554","9.369005","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20555","9.369036","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20556","9.369064","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20557","9.369087","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20558","9.369113","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20559","9.369141","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20560","9.369167","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20561","9.369190","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20562","9.369216","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20563","9.369237","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20564","9.369272","172.30.1.104","172.30.1.205","TCP","54","49671 > 35930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20565","9.369327","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20566","9.369452","172.30.1.104","172.30.1.205","TCP","54","49671 > 35934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20567","9.369482","172.30.1.104","172.30.1.205","TCP","54","49671 > 35938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20568","9.369511","172.30.1.104","172.30.1.205","TCP","54","49671 > 35930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20569","9.369517","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20570","9.369542","172.30.1.104","172.30.1.205","TCP","54","49671 > 35934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20571","9.369545","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20572","9.369584","172.30.1.104","172.30.1.205","TCP","54","49671 > 35938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20573","9.369589","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20574","9.369617","172.30.1.104","172.30.1.205","TCP","54","49671 > 35942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20575","9.369649","172.30.1.104","172.30.1.205","TCP","54","49671 > 35946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20576","9.369680","172.30.1.104","172.30.1.205","TCP","54","49671 > 35950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20577","9.369711","172.30.1.104","172.30.1.205","TCP","54","49671 > 35942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20578","9.369716","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20579","9.369744","172.30.1.104","172.30.1.205","TCP","54","49671 > 35954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20580","9.369776","172.30.1.104","172.30.1.205","TCP","54","49671 > 35954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20581","9.369781","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20582","9.369807","172.30.1.104","172.30.1.205","TCP","54","49671 > 35946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20583","9.369811","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20584","9.369838","172.30.1.104","172.30.1.205","TCP","54","49671 > 35950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20585","9.369841","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20586","9.369868","172.30.1.104","172.30.1.205","TCP","54","49671 > 35958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20587","9.369899","172.30.1.104","172.30.1.205","TCP","54","49671 > 35962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20588","9.369929","172.30.1.104","172.30.1.205","TCP","54","49671 > 35958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20589","9.369934","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20590","9.369959","172.30.1.104","172.30.1.205","TCP","54","49671 > 35966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20591","9.369990","172.30.1.104","172.30.1.205","TCP","54","49671 > 35970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20592","9.370020","172.30.1.104","172.30.1.205","TCP","54","49671 > 35970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20593","9.370024","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20594","9.370051","172.30.1.104","172.30.1.205","TCP","54","49671 > 35962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20595","9.370055","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20596","9.370081","172.30.1.104","172.30.1.205","TCP","54","49671 > 35966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20597","9.370084","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20598","9.370625","172.30.1.104","172.30.1.205","TCP","54","49671 > 35926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20599","9.370656","172.30.1.104","172.30.1.205","TCP","54","49671 > 35926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20600","9.370661","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20601","9.370955","172.30.1.205","172.30.1.104","TCP","54","43336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20602","9.371064","172.30.1.205","172.30.1.104","TCP","74","35974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912597 TSecr=0 WS=128" +"20603","9.371249","172.30.1.104","172.30.1.205","TCP","54","135 > 43336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20604","9.371277","172.30.1.104","172.30.1.205","TCP","54","135 > 43336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20605","9.371282","172.30.1.205","172.30.1.104","TCP","54","43336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20606","9.371394","172.30.1.104","172.30.1.205","TCP","66","49671 > 35974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20607","9.371402","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20608","9.371751","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20609","9.372065","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20610","9.372074","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20611","9.373970","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20612","9.374356","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20613","9.374362","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20614","9.375730","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20615","9.377691","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20616","9.377700","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20617","9.378627","172.30.1.205","172.30.1.104","TCP","74","43340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912605 TSecr=0 WS=128" +"20618","9.378941","172.30.1.104","172.30.1.205","TCP","66","135 > 43340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20619","9.378951","172.30.1.205","172.30.1.104","TCP","54","43340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20620","9.379302","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20621","9.379622","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20622","9.379631","172.30.1.205","172.30.1.104","TCP","54","43340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20623","9.381824","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20624","9.382208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20625","9.382215","172.30.1.205","172.30.1.104","TCP","54","43340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20626","9.384025","172.30.1.205","172.30.1.104","TCP","54","43340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20627","9.384133","172.30.1.205","172.30.1.104","TCP","74","35978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912610 TSecr=0 WS=128" +"20628","9.384332","172.30.1.104","172.30.1.205","TCP","54","135 > 43340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20629","9.384343","172.30.1.104","172.30.1.205","TCP","54","135 > 43340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20630","9.384351","172.30.1.205","172.30.1.104","TCP","54","43340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20631","9.384420","172.30.1.104","172.30.1.205","TCP","66","49671 > 35978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20632","9.384431","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20633","9.384846","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20634","9.385169","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20635","9.385178","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20636","9.387078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20637","9.387461","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20638","9.387466","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20639","9.388835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20640","9.390773","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20641","9.390783","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20642","9.391724","172.30.1.205","172.30.1.104","TCP","74","43344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912618 TSecr=0 WS=128" +"20643","9.392063","172.30.1.104","172.30.1.205","TCP","66","135 > 43344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20644","9.392077","172.30.1.205","172.30.1.104","TCP","54","43344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20645","9.392471","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20646","9.392892","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20647","9.392902","172.30.1.205","172.30.1.104","TCP","54","43344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20648","9.395133","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20649","9.395532","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20650","9.395539","172.30.1.205","172.30.1.104","TCP","54","43344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20651","9.397381","172.30.1.205","172.30.1.104","TCP","54","43344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20652","9.397498","172.30.1.205","172.30.1.104","TCP","74","35982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912623 TSecr=0 WS=128" +"20653","9.397679","172.30.1.104","172.30.1.205","TCP","54","135 > 43344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20654","9.397745","172.30.1.104","172.30.1.205","TCP","54","135 > 43344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20655","9.397751","172.30.1.205","172.30.1.104","TCP","54","43344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20656","9.397770","172.30.1.104","172.30.1.205","TCP","66","49671 > 35982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20657","9.397778","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20658","9.398120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20659","9.398397","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20660","9.398406","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20661","9.400261","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20662","9.400695","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20663","9.400699","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20664","9.402066","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20665","9.404042","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20666","9.404051","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20667","9.405013","172.30.1.205","172.30.1.104","TCP","74","43348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912631 TSecr=0 WS=128" +"20668","9.405302","172.30.1.104","172.30.1.205","TCP","66","135 > 43348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20669","9.405312","172.30.1.205","172.30.1.104","TCP","54","43348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20670","9.405662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20671","9.405933","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20672","9.405942","172.30.1.205","172.30.1.104","TCP","54","43348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20673","9.408140","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20674","9.408580","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20675","9.408587","172.30.1.205","172.30.1.104","TCP","54","43348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20676","9.410425","172.30.1.205","172.30.1.104","TCP","54","43348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20677","9.410539","172.30.1.205","172.30.1.104","TCP","74","35986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912636 TSecr=0 WS=128" +"20678","9.410806","172.30.1.104","172.30.1.205","TCP","54","135 > 43348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20679","9.410815","172.30.1.104","172.30.1.205","TCP","66","49671 > 35986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20680","9.410824","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20681","9.410837","172.30.1.104","172.30.1.205","TCP","54","135 > 43348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20682","9.410845","172.30.1.205","172.30.1.104","TCP","54","43348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20683","9.411191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20684","9.411520","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20685","9.411528","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20686","9.413422","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20687","9.413788","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20688","9.413795","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20689","9.415153","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20690","9.417099","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20691","9.417108","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20692","9.418065","172.30.1.205","172.30.1.104","TCP","74","43352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912644 TSecr=0 WS=128" +"20693","9.418429","172.30.1.104","172.30.1.205","TCP","66","135 > 43352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20694","9.418439","172.30.1.205","172.30.1.104","TCP","54","43352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20695","9.418785","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20696","9.419106","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20697","9.419115","172.30.1.205","172.30.1.104","TCP","54","43352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20698","9.421310","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20699","9.421698","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20700","9.421705","172.30.1.205","172.30.1.104","TCP","54","43352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20701","9.423501","172.30.1.205","172.30.1.104","TCP","54","43352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20702","9.423610","172.30.1.205","172.30.1.104","TCP","74","35990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912650 TSecr=0 WS=128" +"20703","9.423789","172.30.1.104","172.30.1.205","TCP","54","135 > 43352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20704","9.423811","172.30.1.104","172.30.1.205","TCP","54","135 > 43352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20705","9.423817","172.30.1.205","172.30.1.104","TCP","54","43352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20706","9.423928","172.30.1.104","172.30.1.205","TCP","66","49671 > 35990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20707","9.423937","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20708","9.424279","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20709","9.425828","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20710","9.425835","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20711","9.427697","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20712","9.428066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20713","9.428072","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20714","9.429440","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20715","9.431460","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20716","9.431469","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20717","9.432396","172.30.1.205","172.30.1.104","TCP","74","43356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912658 TSecr=0 WS=128" +"20718","9.432692","172.30.1.104","172.30.1.205","TCP","66","135 > 43356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20719","9.432703","172.30.1.205","172.30.1.104","TCP","54","43356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20720","9.433074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20721","9.433358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20722","9.433366","172.30.1.205","172.30.1.104","TCP","54","43356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20723","9.435550","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20724","9.435969","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20725","9.435975","172.30.1.205","172.30.1.104","TCP","54","43356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20726","9.437813","172.30.1.205","172.30.1.104","TCP","54","43356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20727","9.437923","172.30.1.205","172.30.1.104","TCP","74","35994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912664 TSecr=0 WS=128" +"20728","9.438080","172.30.1.104","172.30.1.205","TCP","54","135 > 43356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20729","9.438115","172.30.1.104","172.30.1.205","TCP","54","135 > 43356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20730","9.438121","172.30.1.205","172.30.1.104","TCP","54","43356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20731","9.438216","172.30.1.104","172.30.1.205","TCP","66","49671 > 35994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20732","9.438233","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20733","9.438640","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20734","9.438917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20735","9.438927","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20736","9.440868","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20737","9.441228","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20738","9.441236","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20739","9.442668","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20740","9.444677","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20741","9.444688","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20742","9.445677","172.30.1.205","172.30.1.104","TCP","74","43360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912672 TSecr=0 WS=128" +"20743","9.445965","172.30.1.104","172.30.1.205","TCP","66","135 > 43360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20744","9.445976","172.30.1.205","172.30.1.104","TCP","54","43360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20745","9.446328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20746","9.446576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20747","9.446584","172.30.1.205","172.30.1.104","TCP","54","43360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20748","9.448829","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20749","9.449308","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20750","9.449315","172.30.1.205","172.30.1.104","TCP","54","43360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20751","9.451155","172.30.1.205","172.30.1.104","TCP","54","43360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20752","9.451269","172.30.1.205","172.30.1.104","TCP","74","35998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912677 TSecr=0 WS=128" +"20753","9.451423","172.30.1.104","172.30.1.205","TCP","54","135 > 43360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20754","9.451432","172.30.1.104","172.30.1.205","TCP","54","135 > 43360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20755","9.451437","172.30.1.205","172.30.1.104","TCP","54","43360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20756","9.451567","172.30.1.104","172.30.1.205","TCP","66","49671 > 35998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20757","9.451575","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20758","9.451927","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20759","9.452219","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20760","9.452228","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20761","9.454146","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20762","9.454520","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20763","9.454527","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20764","9.455935","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20765","9.457983","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20766","9.457992","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20767","9.458938","172.30.1.205","172.30.1.104","TCP","74","43364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912685 TSecr=0 WS=128" +"20768","9.459242","172.30.1.104","172.30.1.205","TCP","66","135 > 43364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20769","9.459253","172.30.1.205","172.30.1.104","TCP","54","43364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20770","9.459611","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20771","9.459903","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20772","9.459913","172.30.1.205","172.30.1.104","TCP","54","43364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20773","9.462145","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20774","9.462522","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20775","9.462528","172.30.1.205","172.30.1.104","TCP","54","43364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20776","9.464338","172.30.1.205","172.30.1.104","TCP","54","43364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20777","9.464453","172.30.1.205","172.30.1.104","TCP","74","36002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912690 TSecr=0 WS=128" +"20778","9.464591","172.30.1.104","172.30.1.205","TCP","54","135 > 43364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20779","9.464615","172.30.1.104","172.30.1.205","TCP","54","135 > 43364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20780","9.464621","172.30.1.205","172.30.1.104","TCP","54","43364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20781","9.464717","172.30.1.104","172.30.1.205","TCP","66","49671 > 36002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20782","9.464725","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20783","9.465102","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20784","9.465401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20785","9.465410","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20786","9.467298","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20787","9.467661","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20788","9.467667","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20789","9.469082","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20790","9.471032","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20791","9.471041","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20792","9.471987","172.30.1.205","172.30.1.104","TCP","74","43368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912698 TSecr=0 WS=128" +"20793","9.472294","172.30.1.104","172.30.1.205","TCP","66","135 > 43368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20794","9.472304","172.30.1.205","172.30.1.104","TCP","54","43368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20795","9.472657","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20796","9.472938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20797","9.472947","172.30.1.205","172.30.1.104","TCP","54","43368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20798","9.475174","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20799","9.475571","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20800","9.475578","172.30.1.205","172.30.1.104","TCP","54","43368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20801","9.477413","172.30.1.205","172.30.1.104","TCP","54","43368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20802","9.477525","172.30.1.205","172.30.1.104","TCP","74","36006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912703 TSecr=0 WS=128" +"20803","9.477692","172.30.1.104","172.30.1.205","TCP","54","135 > 43368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20804","9.477757","172.30.1.104","172.30.1.205","TCP","54","135 > 43368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20805","9.477762","172.30.1.205","172.30.1.104","TCP","54","43368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20806","9.477836","172.30.1.104","172.30.1.205","TCP","66","49671 > 36006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20807","9.477848","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20808","9.478197","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20809","9.478477","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20810","9.478485","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20811","9.480367","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20812","9.480709","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20813","9.480715","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20814","9.482100","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20815","9.484043","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20816","9.484053","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20817","9.485012","172.30.1.205","172.30.1.104","TCP","74","43372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912711 TSecr=0 WS=128" +"20818","9.485299","172.30.1.104","172.30.1.205","TCP","66","135 > 43372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20819","9.485309","172.30.1.205","172.30.1.104","TCP","54","43372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20820","9.485658","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20821","9.485954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20822","9.485963","172.30.1.205","172.30.1.104","TCP","54","43372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20823","9.488139","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20824","9.488532","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20825","9.488538","172.30.1.205","172.30.1.104","TCP","54","43372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20826","9.490390","172.30.1.205","172.30.1.104","TCP","54","43372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20827","9.490502","172.30.1.205","172.30.1.104","TCP","74","36010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912716 TSecr=0 WS=128" +"20828","9.490634","172.30.1.104","172.30.1.205","TCP","54","135 > 43372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20829","9.490662","172.30.1.104","172.30.1.205","TCP","54","135 > 43372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20830","9.490668","172.30.1.205","172.30.1.104","TCP","54","43372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20831","9.490749","172.30.1.104","172.30.1.205","TCP","66","49671 > 36010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20832","9.490757","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20833","9.491108","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20834","9.491373","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20835","9.491384","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20836","9.493581","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20837","9.493932","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20838","9.493938","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20839","9.495297","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20840","9.497347","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20841","9.497356","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20842","9.498302","172.30.1.205","172.30.1.104","TCP","74","43376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912724 TSecr=0 WS=128" +"20843","9.498587","172.30.1.104","172.30.1.205","TCP","66","135 > 43376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20844","9.498598","172.30.1.205","172.30.1.104","TCP","54","43376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20845","9.498949","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20846","9.501544","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20847","9.501553","172.30.1.205","172.30.1.104","TCP","54","43376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20848","9.503764","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20849","9.504593","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20850","9.504600","172.30.1.205","172.30.1.104","TCP","54","43376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20851","9.506453","172.30.1.205","172.30.1.104","TCP","54","43376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20852","9.506565","172.30.1.205","172.30.1.104","TCP","74","36014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912732 TSecr=0 WS=128" +"20853","9.506720","172.30.1.104","172.30.1.205","TCP","54","135 > 43376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20854","9.506731","172.30.1.104","172.30.1.205","TCP","54","135 > 43376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20855","9.506736","172.30.1.205","172.30.1.104","TCP","54","43376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20856","9.506816","172.30.1.104","172.30.1.205","TCP","66","49671 > 36014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20857","9.506824","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20858","9.507179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20859","9.507477","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20860","9.507486","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20861","9.509390","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20862","9.509736","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20863","9.509743","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20864","9.511105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20865","9.513225","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20866","9.513235","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20867","9.514184","172.30.1.205","172.30.1.104","TCP","74","43380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912740 TSecr=0 WS=128" +"20868","9.514490","172.30.1.104","172.30.1.205","TCP","66","135 > 43380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20869","9.514508","172.30.1.205","172.30.1.104","TCP","54","43380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20870","9.514908","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20871","9.515196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20872","9.515205","172.30.1.205","172.30.1.104","TCP","54","43380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20873","9.517438","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20874","9.517926","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20875","9.517933","172.30.1.205","172.30.1.104","TCP","54","43380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20876","9.519735","172.30.1.205","172.30.1.104","TCP","54","43380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20877","9.519851","172.30.1.205","172.30.1.104","TCP","74","36018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912746 TSecr=0 WS=128" +"20878","9.520021","172.30.1.104","172.30.1.205","TCP","54","135 > 43380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20879","9.520032","172.30.1.104","172.30.1.205","TCP","54","135 > 43380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20880","9.520037","172.30.1.205","172.30.1.104","TCP","54","43380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20881","9.520148","172.30.1.104","172.30.1.205","TCP","66","49671 > 36018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20882","9.520156","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20883","9.520502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20884","9.520807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20885","9.520818","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20886","9.522712","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20887","9.523088","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20888","9.523096","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20889","9.524458","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20890","9.526464","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20891","9.526473","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20892","9.527417","172.30.1.205","172.30.1.104","TCP","74","43384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912753 TSecr=0 WS=128" +"20893","9.527717","172.30.1.104","172.30.1.205","TCP","66","135 > 43384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20894","9.527728","172.30.1.205","172.30.1.104","TCP","54","43384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20895","9.528082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20896","9.528368","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20897","9.528376","172.30.1.205","172.30.1.104","TCP","54","43384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20898","9.530570","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20899","9.530954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20900","9.530960","172.30.1.205","172.30.1.104","TCP","54","43384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20901","9.531807","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20902","9.531855","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20903","9.531890","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20904","9.531918","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20905","9.531946","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20906","9.531973","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20907","9.532000","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20908","9.532026","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20909","9.532053","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20910","9.532085","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20911","9.532118","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20912","9.532155","172.30.1.104","172.30.1.205","TCP","54","49671 > 35978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20913","9.532173","172.30.1.104","172.30.1.205","TCP","54","49671 > 35978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20914","9.532179","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20915","9.532194","172.30.1.104","172.30.1.205","TCP","54","49671 > 35982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20916","9.532217","172.30.1.104","172.30.1.205","TCP","54","49671 > 35986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20917","9.532238","172.30.1.104","172.30.1.205","TCP","54","49671 > 35990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20918","9.532245","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20919","9.532258","172.30.1.104","172.30.1.205","TCP","54","49671 > 35994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20920","9.532378","172.30.1.104","172.30.1.205","TCP","54","49671 > 35998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20921","9.532394","172.30.1.104","172.30.1.205","TCP","54","49671 > 35998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20922","9.532399","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20923","9.532415","172.30.1.104","172.30.1.205","TCP","54","49671 > 35994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20924","9.532419","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20925","9.532438","172.30.1.104","172.30.1.205","TCP","54","49671 > 35990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20926","9.532441","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20927","9.532458","172.30.1.104","172.30.1.205","TCP","54","49671 > 35982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20928","9.532461","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20929","9.532479","172.30.1.104","172.30.1.205","TCP","54","49671 > 35986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20930","9.532482","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20931","9.532499","172.30.1.104","172.30.1.205","TCP","54","49671 > 36002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20932","9.532519","172.30.1.104","172.30.1.205","TCP","54","49671 > 36006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20933","9.532543","172.30.1.104","172.30.1.205","TCP","54","49671 > 36010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20934","9.532669","172.30.1.104","172.30.1.205","TCP","54","49671 > 36002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20935","9.532674","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20936","9.532689","172.30.1.104","172.30.1.205","TCP","54","49671 > 36014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20937","9.532713","172.30.1.104","172.30.1.205","TCP","54","49671 > 36014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20938","9.532717","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20939","9.532732","172.30.1.104","172.30.1.205","TCP","54","49671 > 36006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20940","9.532735","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20941","9.532753","172.30.1.104","172.30.1.205","TCP","54","49671 > 36010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20942","9.532756","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20943","9.532786","172.30.1.104","172.30.1.205","TCP","54","49671 > 36018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20944","9.532881","172.30.1.104","172.30.1.205","TCP","54","49671 > 35974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20945","9.532900","172.30.1.104","172.30.1.205","TCP","54","49671 > 36018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20946","9.532905","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20947","9.533000","172.30.1.104","172.30.1.205","TCP","54","49671 > 35974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"20948","9.533005","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"20949","9.533788","172.30.1.205","172.30.1.104","TCP","54","43384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20950","9.533898","172.30.1.205","172.30.1.104","TCP","74","36022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912760 TSecr=0 WS=128" +"20951","9.534035","172.30.1.104","172.30.1.205","TCP","54","135 > 43384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20952","9.534069","172.30.1.104","172.30.1.205","TCP","54","135 > 43384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20953","9.534074","172.30.1.205","172.30.1.104","TCP","54","43384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20954","9.534169","172.30.1.104","172.30.1.205","TCP","66","49671 > 36022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20955","9.534177","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20956","9.534544","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20957","9.534845","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20958","9.534853","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20959","9.536846","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20960","9.537205","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20961","9.537211","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20962","9.538557","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20963","9.540605","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20964","9.540615","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20965","9.541564","172.30.1.205","172.30.1.104","TCP","74","43388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912767 TSecr=0 WS=128" +"20966","9.541866","172.30.1.104","172.30.1.205","TCP","66","135 > 43388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20967","9.541877","172.30.1.205","172.30.1.104","TCP","54","43388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20968","9.542223","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20969","9.542509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20970","9.542518","172.30.1.205","172.30.1.104","TCP","54","43388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20971","9.544683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20972","9.545047","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20973","9.545053","172.30.1.205","172.30.1.104","TCP","54","43388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20974","9.546856","172.30.1.205","172.30.1.104","TCP","54","43388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20975","9.546965","172.30.1.205","172.30.1.104","TCP","74","36026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912773 TSecr=0 WS=128" +"20976","9.547146","172.30.1.104","172.30.1.205","TCP","54","135 > 43388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20977","9.547176","172.30.1.104","172.30.1.205","TCP","54","135 > 43388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"20978","9.547182","172.30.1.205","172.30.1.104","TCP","54","43388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"20979","9.547254","172.30.1.104","172.30.1.205","TCP","66","49671 > 36026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20980","9.547262","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20981","9.547605","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"20982","9.547937","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20983","9.547946","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20984","9.549839","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"20985","9.550207","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"20986","9.550213","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"20987","9.551550","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"20988","9.553492","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"20989","9.553501","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"20990","9.554433","172.30.1.205","172.30.1.104","TCP","74","43392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912780 TSecr=0 WS=128" +"20991","9.554735","172.30.1.104","172.30.1.205","TCP","66","135 > 43392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"20992","9.554745","172.30.1.205","172.30.1.104","TCP","54","43392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"20993","9.555098","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"20994","9.555370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"20995","9.555378","172.30.1.205","172.30.1.104","TCP","54","43392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"20996","9.557589","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"20997","9.557944","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"20998","9.557950","172.30.1.205","172.30.1.104","TCP","54","43392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"20999","9.559743","172.30.1.205","172.30.1.104","TCP","54","43392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21000","9.559862","172.30.1.205","172.30.1.104","TCP","74","36030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912786 TSecr=0 WS=128" +"21001","9.559997","172.30.1.104","172.30.1.205","TCP","54","135 > 43392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21002","9.560019","172.30.1.104","172.30.1.205","TCP","54","135 > 43392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21003","9.560024","172.30.1.205","172.30.1.104","TCP","54","43392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21004","9.560125","172.30.1.104","172.30.1.205","TCP","66","49671 > 36030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21005","9.560133","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21006","9.560481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21007","9.560756","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21008","9.560765","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21009","9.562634","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21010","9.562977","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21011","9.562984","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21012","9.564324","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21013","9.566236","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21014","9.566245","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21015","9.567185","172.30.1.205","172.30.1.104","TCP","74","43396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912793 TSecr=0 WS=128" +"21016","9.567473","172.30.1.104","172.30.1.205","TCP","66","135 > 43396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21017","9.567483","172.30.1.205","172.30.1.104","TCP","54","43396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21018","9.567829","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21019","9.568098","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21020","9.568106","172.30.1.205","172.30.1.104","TCP","54","43396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21021","9.570321","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21022","9.570675","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21023","9.570682","172.30.1.205","172.30.1.104","TCP","54","43396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21024","9.572487","172.30.1.205","172.30.1.104","TCP","54","43396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21025","9.572595","172.30.1.205","172.30.1.104","TCP","74","36034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912799 TSecr=0 WS=128" +"21026","9.572755","172.30.1.104","172.30.1.205","TCP","54","135 > 43396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21027","9.572764","172.30.1.104","172.30.1.205","TCP","54","135 > 43396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21028","9.572769","172.30.1.205","172.30.1.104","TCP","54","43396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21029","9.572849","172.30.1.104","172.30.1.205","TCP","66","49671 > 36034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21030","9.572857","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21031","9.573219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21032","9.573479","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21033","9.573489","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21034","9.575371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21035","9.575739","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21036","9.575746","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21037","9.577125","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21038","9.579099","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21039","9.579109","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21040","9.580034","172.30.1.205","172.30.1.104","TCP","74","43400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912806 TSecr=0 WS=128" +"21041","9.580332","172.30.1.104","172.30.1.205","TCP","66","135 > 43400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21042","9.580343","172.30.1.205","172.30.1.104","TCP","54","43400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21043","9.580687","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21044","9.580953","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21045","9.580963","172.30.1.205","172.30.1.104","TCP","54","43400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21046","9.583150","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21047","9.583528","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21048","9.583534","172.30.1.205","172.30.1.104","TCP","54","43400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21049","9.585368","172.30.1.205","172.30.1.104","TCP","54","43400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21050","9.585477","172.30.1.205","172.30.1.104","TCP","74","36038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912811 TSecr=0 WS=128" +"21051","9.585646","172.30.1.104","172.30.1.205","TCP","54","135 > 43400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21052","9.585654","172.30.1.104","172.30.1.205","TCP","54","135 > 43400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21053","9.585658","172.30.1.205","172.30.1.104","TCP","54","43400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21054","9.585756","172.30.1.104","172.30.1.205","TCP","66","49671 > 36038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21055","9.585764","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21056","9.586104","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21057","9.586367","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21058","9.586375","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21059","9.588251","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21060","9.588610","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21061","9.588616","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21062","9.589984","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21063","9.591964","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21064","9.591973","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21065","9.592913","172.30.1.205","172.30.1.104","TCP","74","43404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912819 TSecr=0 WS=128" +"21066","9.593224","172.30.1.104","172.30.1.205","TCP","66","135 > 43404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21067","9.593234","172.30.1.205","172.30.1.104","TCP","54","43404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21068","9.593584","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21069","9.593882","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21070","9.593890","172.30.1.205","172.30.1.104","TCP","54","43404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21071","9.596047","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21072","9.596423","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21073","9.596429","172.30.1.205","172.30.1.104","TCP","54","43404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21074","9.598256","172.30.1.205","172.30.1.104","TCP","54","43404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21075","9.598365","172.30.1.205","172.30.1.104","TCP","74","36042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912824 TSecr=0 WS=128" +"21076","9.598559","172.30.1.104","172.30.1.205","TCP","54","135 > 43404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21077","9.598567","172.30.1.104","172.30.1.205","TCP","54","135 > 43404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21078","9.598572","172.30.1.205","172.30.1.104","TCP","54","43404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21079","9.598660","172.30.1.104","172.30.1.205","TCP","66","49671 > 36042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21080","9.598668","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21081","9.599014","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21082","9.600892","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21083","9.600899","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21084","9.602760","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21085","9.603102","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21086","9.603108","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21087","9.604438","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21088","9.607272","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21089","9.607281","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21090","9.608205","172.30.1.205","172.30.1.104","TCP","74","43408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912834 TSecr=0 WS=128" +"21091","9.608710","172.30.1.104","172.30.1.205","TCP","66","135 > 43408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21092","9.608721","172.30.1.205","172.30.1.104","TCP","54","43408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21093","9.609091","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21094","9.609437","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21095","9.609446","172.30.1.205","172.30.1.104","TCP","54","43408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21096","9.611615","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21097","9.612025","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21098","9.612031","172.30.1.205","172.30.1.104","TCP","54","43408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21099","9.613853","172.30.1.205","172.30.1.104","TCP","54","43408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21100","9.613964","172.30.1.205","172.30.1.104","TCP","74","36046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912840 TSecr=0 WS=128" +"21101","9.614116","172.30.1.104","172.30.1.205","TCP","54","135 > 43408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21102","9.614148","172.30.1.104","172.30.1.205","TCP","54","135 > 43408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21103","9.614153","172.30.1.205","172.30.1.104","TCP","54","43408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21104","9.614252","172.30.1.104","172.30.1.205","TCP","66","49671 > 36046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21105","9.614261","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21106","9.614601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21107","9.616135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21108","9.616142","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21109","9.618027","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21110","9.619325","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21111","9.619331","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21112","9.620671","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21113","9.622724","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21114","9.622734","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21115","9.623695","172.30.1.205","172.30.1.104","TCP","74","43412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912850 TSecr=0 WS=128" +"21116","9.623981","172.30.1.104","172.30.1.205","TCP","66","135 > 43412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21117","9.623996","172.30.1.205","172.30.1.104","TCP","54","43412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21118","9.624346","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21119","9.624640","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21120","9.624649","172.30.1.205","172.30.1.104","TCP","54","43412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21121","9.626857","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21122","9.627272","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21123","9.627279","172.30.1.205","172.30.1.104","TCP","54","43412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21124","9.629106","172.30.1.205","172.30.1.104","TCP","54","43412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21125","9.629220","172.30.1.205","172.30.1.104","TCP","74","36050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912855 TSecr=0 WS=128" +"21126","9.629434","172.30.1.104","172.30.1.205","TCP","54","135 > 43412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21127","9.629449","172.30.1.104","172.30.1.205","TCP","54","135 > 43412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21128","9.629456","172.30.1.205","172.30.1.104","TCP","54","43412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21129","9.629528","172.30.1.104","172.30.1.205","TCP","66","49671 > 36050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21130","9.629537","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21131","9.629884","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21132","9.630166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21133","9.630175","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21134","9.632048","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21135","9.632416","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21136","9.632422","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21137","9.633801","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21138","9.635772","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21139","9.635781","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21140","9.636769","172.30.1.205","172.30.1.104","TCP","74","43416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912863 TSecr=0 WS=128" +"21141","9.637045","172.30.1.104","172.30.1.205","TCP","66","135 > 43416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21142","9.637056","172.30.1.205","172.30.1.104","TCP","54","43416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21143","9.637402","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21144","9.637670","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21145","9.637679","172.30.1.205","172.30.1.104","TCP","54","43416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21146","9.639860","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21147","9.640234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21148","9.640240","172.30.1.205","172.30.1.104","TCP","54","43416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21149","9.642085","172.30.1.205","172.30.1.104","TCP","54","43416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21150","9.642205","172.30.1.205","172.30.1.104","TCP","74","36054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912868 TSecr=0 WS=128" +"21151","9.642348","172.30.1.104","172.30.1.205","TCP","54","135 > 43416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21152","9.642374","172.30.1.104","172.30.1.205","TCP","54","135 > 43416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21153","9.642381","172.30.1.205","172.30.1.104","TCP","54","43416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21154","9.642479","172.30.1.104","172.30.1.205","TCP","66","49671 > 36054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21155","9.642487","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21156","9.642829","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21157","9.643118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21158","9.643125","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21159","9.645009","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21160","9.645447","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21161","9.645454","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21162","9.646804","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21163","9.648710","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21164","9.648719","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21165","9.649686","172.30.1.205","172.30.1.104","TCP","74","43420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912876 TSecr=0 WS=128" +"21166","9.649996","172.30.1.104","172.30.1.205","TCP","66","135 > 43420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21167","9.650007","172.30.1.205","172.30.1.104","TCP","54","43420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21168","9.650352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21169","9.650667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21170","9.650676","172.30.1.205","172.30.1.104","TCP","54","43420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21171","9.652876","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21172","9.653280","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21173","9.653293","172.30.1.205","172.30.1.104","TCP","54","43420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21174","9.655100","172.30.1.205","172.30.1.104","TCP","54","43420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21175","9.655212","172.30.1.205","172.30.1.104","TCP","74","36058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912881 TSecr=0 WS=128" +"21176","9.655369","172.30.1.104","172.30.1.205","TCP","54","135 > 43420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21177","9.655407","172.30.1.104","172.30.1.205","TCP","54","135 > 43420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21178","9.655414","172.30.1.205","172.30.1.104","TCP","54","43420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21179","9.655503","172.30.1.104","172.30.1.205","TCP","66","49671 > 36058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21180","9.655511","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21181","9.655854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21182","9.656215","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21183","9.656224","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21184","9.658120","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21185","9.658651","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21186","9.658658","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21187","9.659996","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21188","9.661891","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21189","9.661901","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21190","9.662850","172.30.1.205","172.30.1.104","TCP","74","43424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912889 TSecr=0 WS=128" +"21191","9.663171","172.30.1.104","172.30.1.205","TCP","66","135 > 43424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21192","9.663182","172.30.1.205","172.30.1.104","TCP","54","43424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21193","9.663528","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21194","9.663894","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21195","9.663902","172.30.1.205","172.30.1.104","TCP","54","43424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21196","9.666117","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21197","9.666684","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21198","9.666690","172.30.1.205","172.30.1.104","TCP","54","43424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21199","9.668504","172.30.1.205","172.30.1.104","TCP","54","43424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21200","9.668621","172.30.1.205","172.30.1.104","TCP","74","36062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912895 TSecr=0 WS=128" +"21201","9.668793","172.30.1.104","172.30.1.205","TCP","54","135 > 43424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21202","9.668846","172.30.1.104","172.30.1.205","TCP","54","135 > 43424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21203","9.668854","172.30.1.205","172.30.1.104","TCP","54","43424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21204","9.668925","172.30.1.104","172.30.1.205","TCP","66","49671 > 36062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21205","9.668933","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21206","9.669286","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21207","9.669660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21208","9.669669","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21209","9.671557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21210","9.671888","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21211","9.671894","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21212","9.673266","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21213","9.675212","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21214","9.675222","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21215","9.676173","172.30.1.205","172.30.1.104","TCP","74","43428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912902 TSecr=0 WS=128" +"21216","9.676481","172.30.1.104","172.30.1.205","TCP","66","135 > 43428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21217","9.676492","172.30.1.205","172.30.1.104","TCP","54","43428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21218","9.676863","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21219","9.677161","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21220","9.677170","172.30.1.205","172.30.1.104","TCP","54","43428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21221","9.679359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21222","9.679827","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21223","9.679834","172.30.1.205","172.30.1.104","TCP","54","43428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21224","9.681659","172.30.1.205","172.30.1.104","TCP","54","43428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21225","9.681776","172.30.1.205","172.30.1.104","TCP","74","36066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912908 TSecr=0 WS=128" +"21226","9.681946","172.30.1.104","172.30.1.205","TCP","54","135 > 43428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21227","9.681958","172.30.1.104","172.30.1.205","TCP","54","135 > 43428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21228","9.681965","172.30.1.205","172.30.1.104","TCP","54","43428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21229","9.682043","172.30.1.104","172.30.1.205","TCP","66","49671 > 36066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21230","9.682052","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21231","9.682392","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21232","9.682676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21233","9.682684","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21234","9.684550","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21235","9.684904","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21236","9.684910","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21237","9.686263","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21238","9.688269","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21239","9.688278","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21240","9.689252","172.30.1.205","172.30.1.104","TCP","74","43432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912915 TSecr=0 WS=128" +"21241","9.689704","172.30.1.104","172.30.1.205","TCP","66","135 > 43432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21242","9.689714","172.30.1.205","172.30.1.104","TCP","54","43432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21243","9.690058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21244","9.690360","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21245","9.690369","172.30.1.205","172.30.1.104","TCP","54","43432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21246","9.692528","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21247","9.692905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21248","9.692912","172.30.1.205","172.30.1.104","TCP","54","43432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21249","9.693768","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21250","9.693816","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21251","9.693856","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21252","9.693886","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21253","9.693914","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21254","9.693937","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21255","9.693959","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21256","9.693986","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21257","9.694011","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21258","9.694033","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21259","9.694060","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21260","9.694125","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21261","9.694128","172.30.1.104","172.30.1.205","TCP","54","49671 > 36026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21262","9.694162","172.30.1.104","172.30.1.205","TCP","54","49671 > 36030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21263","9.694199","172.30.1.104","172.30.1.205","TCP","54","49671 > 36026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21264","9.694206","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21265","9.694232","172.30.1.104","172.30.1.205","TCP","54","49671 > 36030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21266","9.694239","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21267","9.694441","172.30.1.104","172.30.1.205","TCP","54","49671 > 36034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21268","9.694464","172.30.1.104","172.30.1.205","TCP","54","49671 > 36038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21269","9.694491","172.30.1.104","172.30.1.205","TCP","54","49671 > 36038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21270","9.694497","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21271","9.694517","172.30.1.104","172.30.1.205","TCP","54","49671 > 36034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21272","9.694520","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21273","9.694544","172.30.1.104","172.30.1.205","TCP","54","49671 > 36042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21274","9.694571","172.30.1.104","172.30.1.205","TCP","54","49671 > 36046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21275","9.694660","172.30.1.104","172.30.1.205","TCP","54","49671 > 36046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21276","9.694665","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21277","9.694685","172.30.1.104","172.30.1.205","TCP","54","49671 > 36050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21278","9.694721","172.30.1.104","172.30.1.205","TCP","54","49671 > 36042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21279","9.694724","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21280","9.694750","172.30.1.104","172.30.1.205","TCP","54","49671 > 36050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21281","9.694754","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21282","9.694826","172.30.1.104","172.30.1.205","TCP","54","49671 > 36054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21283","9.694832","172.30.1.104","172.30.1.205","TCP","54","49671 > 36058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21284","9.694843","172.30.1.104","172.30.1.205","TCP","54","49671 > 36054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21285","9.694848","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21286","9.694897","172.30.1.104","172.30.1.205","TCP","54","49671 > 36062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21287","9.694902","172.30.1.104","172.30.1.205","TCP","54","49671 > 36062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21288","9.694906","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21289","9.694921","172.30.1.104","172.30.1.205","TCP","54","49671 > 36066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21290","9.694949","172.30.1.104","172.30.1.205","TCP","54","49671 > 36066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21291","9.694953","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21292","9.694985","172.30.1.104","172.30.1.205","TCP","54","49671 > 36022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21293","9.695021","172.30.1.104","172.30.1.205","TCP","54","49671 > 36022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21294","9.695025","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21295","9.695057","172.30.1.104","172.30.1.205","TCP","54","49671 > 36058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21296","9.695060","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21297","9.695750","172.30.1.205","172.30.1.104","TCP","54","43432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21298","9.695860","172.30.1.205","172.30.1.104","TCP","74","36070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912922 TSecr=0 WS=128" +"21299","9.696021","172.30.1.104","172.30.1.205","TCP","54","135 > 43432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21300","9.696050","172.30.1.104","172.30.1.205","TCP","54","135 > 43432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21301","9.696055","172.30.1.205","172.30.1.104","TCP","54","43432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21302","9.696191","172.30.1.104","172.30.1.205","TCP","66","49671 > 36070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21303","9.696199","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21304","9.696552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21305","9.696826","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21306","9.696835","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21307","9.698706","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21308","9.699060","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21309","9.699066","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21310","9.700408","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21311","9.702309","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21312","9.702318","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21313","9.703266","172.30.1.205","172.30.1.104","TCP","74","43436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912929 TSecr=0 WS=128" +"21314","9.703567","172.30.1.104","172.30.1.205","TCP","66","135 > 43436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21315","9.703577","172.30.1.205","172.30.1.104","TCP","54","43436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21316","9.703922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21317","9.704236","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21318","9.704245","172.30.1.205","172.30.1.104","TCP","54","43436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21319","9.706444","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21320","9.706819","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21321","9.706825","172.30.1.205","172.30.1.104","TCP","54","43436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21322","9.708667","172.30.1.205","172.30.1.104","TCP","54","43436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21323","9.708792","172.30.1.205","172.30.1.104","TCP","74","36074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912935 TSecr=0 WS=128" +"21324","9.708994","172.30.1.104","172.30.1.205","TCP","54","135 > 43436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21325","9.709005","172.30.1.104","172.30.1.205","TCP","54","135 > 43436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21326","9.709010","172.30.1.205","172.30.1.104","TCP","54","43436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21327","9.709084","172.30.1.104","172.30.1.205","TCP","66","49671 > 36074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21328","9.709092","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21329","9.709434","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21330","9.709752","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21331","9.709760","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21332","9.711603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21333","9.712030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21334","9.712036","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21335","9.713402","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21336","9.715316","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21337","9.715325","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21338","9.716247","172.30.1.205","172.30.1.104","TCP","74","43440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912942 TSecr=0 WS=128" +"21339","9.716559","172.30.1.104","172.30.1.205","TCP","66","135 > 43440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21340","9.716579","172.30.1.205","172.30.1.104","TCP","54","43440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21341","9.717166","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21342","9.717576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21343","9.717585","172.30.1.205","172.30.1.104","TCP","54","43440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21344","9.719764","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21345","9.720183","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21346","9.720189","172.30.1.205","172.30.1.104","TCP","54","43440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21347","9.722008","172.30.1.205","172.30.1.104","TCP","54","43440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21348","9.722117","172.30.1.205","172.30.1.104","TCP","74","36078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912948 TSecr=0 WS=128" +"21349","9.722375","172.30.1.104","172.30.1.205","TCP","54","135 > 43440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21350","9.722421","172.30.1.104","172.30.1.205","TCP","66","49671 > 36078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21351","9.722430","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21352","9.722451","172.30.1.104","172.30.1.205","TCP","54","135 > 43440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21353","9.722455","172.30.1.205","172.30.1.104","TCP","54","43440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21354","9.722804","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21355","9.723108","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21356","9.723117","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21357","9.725009","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21358","9.725382","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21359","9.725388","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21360","9.726720","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21361","9.728762","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21362","9.728771","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21363","9.729716","172.30.1.205","172.30.1.104","TCP","74","43444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912956 TSecr=0 WS=128" +"21364","9.730034","172.30.1.104","172.30.1.205","TCP","66","135 > 43444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21365","9.730044","172.30.1.205","172.30.1.104","TCP","54","43444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21366","9.730391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21367","9.730776","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21368","9.730785","172.30.1.205","172.30.1.104","TCP","54","43444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21369","9.733013","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21370","9.733452","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21371","9.733459","172.30.1.205","172.30.1.104","TCP","54","43444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21372","9.735288","172.30.1.205","172.30.1.104","TCP","54","43444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21373","9.735395","172.30.1.205","172.30.1.104","TCP","74","36082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912961 TSecr=0 WS=128" +"21374","9.735573","172.30.1.104","172.30.1.205","TCP","54","135 > 43444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21375","9.735600","172.30.1.104","172.30.1.205","TCP","54","135 > 43444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21376","9.735605","172.30.1.205","172.30.1.104","TCP","54","43444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21377","9.735719","172.30.1.104","172.30.1.205","TCP","66","49671 > 36082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21378","9.735727","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21379","9.736072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21380","9.736409","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21381","9.736418","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21382","9.738666","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21383","9.739101","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21384","9.739108","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21385","9.740468","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21386","9.742469","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21387","9.742478","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21388","9.743418","172.30.1.205","172.30.1.104","TCP","74","43448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912969 TSecr=0 WS=128" +"21389","9.743846","172.30.1.104","172.30.1.205","TCP","66","135 > 43448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21390","9.743856","172.30.1.205","172.30.1.104","TCP","54","43448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21391","9.744202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21392","9.744572","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21393","9.744580","172.30.1.205","172.30.1.104","TCP","54","43448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21394","9.746759","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21395","9.747155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21396","9.747161","172.30.1.205","172.30.1.104","TCP","54","43448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21397","9.748980","172.30.1.205","172.30.1.104","TCP","54","43448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21398","9.749089","172.30.1.205","172.30.1.104","TCP","74","36086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912975 TSecr=0 WS=128" +"21399","9.749286","172.30.1.104","172.30.1.205","TCP","54","135 > 43448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21400","9.749358","172.30.1.104","172.30.1.205","TCP","54","135 > 43448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21401","9.749363","172.30.1.205","172.30.1.104","TCP","54","43448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21402","9.749475","172.30.1.104","172.30.1.205","TCP","66","49671 > 36086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21403","9.749483","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21404","9.749830","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21405","9.750338","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21406","9.750347","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21407","9.752216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21408","9.752606","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21409","9.752612","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21410","9.753976","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21411","9.756012","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21412","9.756039","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21413","9.756999","172.30.1.205","172.30.1.104","TCP","74","43452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912983 TSecr=0 WS=128" +"21414","9.757370","172.30.1.104","172.30.1.205","TCP","66","135 > 43452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21415","9.757380","172.30.1.205","172.30.1.104","TCP","54","43452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21416","9.757731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21417","9.758057","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21418","9.758065","172.30.1.205","172.30.1.104","TCP","54","43452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21419","9.760236","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21420","9.760674","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21421","9.760680","172.30.1.205","172.30.1.104","TCP","54","43452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21422","9.762510","172.30.1.205","172.30.1.104","TCP","54","43452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21423","9.762619","172.30.1.205","172.30.1.104","TCP","74","36090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912989 TSecr=0 WS=128" +"21424","9.762810","172.30.1.104","172.30.1.205","TCP","54","135 > 43452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21425","9.762841","172.30.1.104","172.30.1.205","TCP","54","135 > 43452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21426","9.762847","172.30.1.205","172.30.1.104","TCP","54","43452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21427","9.762964","172.30.1.104","172.30.1.205","TCP","66","49671 > 36090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21428","9.762972","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21429","9.763317","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21430","9.763660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21431","9.763668","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21432","9.765557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21433","9.765979","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21434","9.765985","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21435","9.767355","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21436","9.769403","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21437","9.769412","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21438","9.770363","172.30.1.205","172.30.1.104","TCP","74","43456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912996 TSecr=0 WS=128" +"21439","9.770671","172.30.1.104","172.30.1.205","TCP","66","135 > 43456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21440","9.770681","172.30.1.205","172.30.1.104","TCP","54","43456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21441","9.771029","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21442","9.771351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21443","9.771360","172.30.1.205","172.30.1.104","TCP","54","43456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21444","9.773570","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21445","9.773970","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21446","9.773977","172.30.1.205","172.30.1.104","TCP","54","43456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21447","9.775792","172.30.1.205","172.30.1.104","TCP","54","43456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21448","9.775912","172.30.1.205","172.30.1.104","TCP","74","36094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913002 TSecr=0 WS=128" +"21449","9.776088","172.30.1.104","172.30.1.205","TCP","54","135 > 43456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21450","9.776120","172.30.1.104","172.30.1.205","TCP","54","135 > 43456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21451","9.776125","172.30.1.205","172.30.1.104","TCP","54","43456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21452","9.776226","172.30.1.104","172.30.1.205","TCP","66","49671 > 36094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21453","9.776234","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21454","9.776574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21455","9.776881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21456","9.776890","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21457","9.778753","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21458","9.779194","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21459","9.779199","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21460","9.780544","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21461","9.782560","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21462","9.782569","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21463","9.783507","172.30.1.205","172.30.1.104","TCP","74","43460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913009 TSecr=0 WS=128" +"21464","9.783837","172.30.1.104","172.30.1.205","TCP","66","135 > 43460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21465","9.783847","172.30.1.205","172.30.1.104","TCP","54","43460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21466","9.784201","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21467","9.784511","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21468","9.784519","172.30.1.205","172.30.1.104","TCP","54","43460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21469","9.786714","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21470","9.787123","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21471","9.787129","172.30.1.205","172.30.1.104","TCP","54","43460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21472","9.788949","172.30.1.205","172.30.1.104","TCP","54","43460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21473","9.789057","172.30.1.205","172.30.1.104","TCP","74","36098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913015 TSecr=0 WS=128" +"21474","9.789284","172.30.1.104","172.30.1.205","TCP","54","135 > 43460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21475","9.789315","172.30.1.104","172.30.1.205","TCP","66","49671 > 36098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21476","9.789323","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21477","9.789345","172.30.1.104","172.30.1.205","TCP","54","135 > 43460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21478","9.789349","172.30.1.205","172.30.1.104","TCP","54","43460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21479","9.789686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21480","9.790009","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21481","9.790018","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21482","9.791868","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21483","9.792236","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21484","9.792242","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21485","9.793621","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21486","9.795610","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21487","9.795619","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21488","9.796550","172.30.1.205","172.30.1.104","TCP","74","43464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913022 TSecr=0 WS=128" +"21489","9.796854","172.30.1.104","172.30.1.205","TCP","66","135 > 43464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21490","9.796864","172.30.1.205","172.30.1.104","TCP","54","43464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21491","9.797217","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21492","9.797524","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21493","9.797532","172.30.1.205","172.30.1.104","TCP","54","43464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21494","9.799704","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21495","9.800125","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21496","9.800132","172.30.1.205","172.30.1.104","TCP","54","43464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21497","9.801958","172.30.1.205","172.30.1.104","TCP","54","43464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21498","9.802067","172.30.1.205","172.30.1.104","TCP","74","36102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913028 TSecr=0 WS=128" +"21499","9.802213","172.30.1.104","172.30.1.205","TCP","54","135 > 43464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21500","9.802240","172.30.1.104","172.30.1.205","TCP","54","135 > 43464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21501","9.802245","172.30.1.205","172.30.1.104","TCP","54","43464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21502","9.802350","172.30.1.104","172.30.1.205","TCP","66","49671 > 36102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21503","9.802358","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21504","9.802710","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21505","9.802992","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21506","9.803001","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21507","9.804868","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21508","9.805241","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21509","9.805249","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21510","9.806627","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21511","9.808677","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21512","9.808686","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21513","9.809642","172.30.1.205","172.30.1.104","TCP","74","43468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913036 TSecr=0 WS=128" +"21514","9.809964","172.30.1.104","172.30.1.205","TCP","66","135 > 43468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21515","9.809974","172.30.1.205","172.30.1.104","TCP","54","43468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21516","9.810328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21517","9.810641","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21518","9.810649","172.30.1.205","172.30.1.104","TCP","54","43468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21519","9.812843","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21520","9.813208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21521","9.813214","172.30.1.205","172.30.1.104","TCP","54","43468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21522","9.815022","172.30.1.205","172.30.1.104","TCP","54","43468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21523","9.815130","172.30.1.205","172.30.1.104","TCP","74","36106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913041 TSecr=0 WS=128" +"21524","9.815295","172.30.1.104","172.30.1.205","TCP","54","135 > 43468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21525","9.815322","172.30.1.104","172.30.1.205","TCP","54","135 > 43468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21526","9.815327","172.30.1.205","172.30.1.104","TCP","54","43468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21527","9.815409","172.30.1.104","172.30.1.205","TCP","66","49671 > 36106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21528","9.815418","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21529","9.815765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21530","9.816100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21531","9.816108","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21532","9.818013","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21533","9.818364","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21534","9.818370","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21535","9.819707","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21536","9.821672","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21537","9.821681","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21538","9.822610","172.30.1.205","172.30.1.104","TCP","74","43472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913049 TSecr=0 WS=128" +"21539","9.822969","172.30.1.104","172.30.1.205","TCP","66","135 > 43472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21540","9.822979","172.30.1.205","172.30.1.104","TCP","54","43472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21541","9.823327","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21542","9.823656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21543","9.823665","172.30.1.205","172.30.1.104","TCP","54","43472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21544","9.825902","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21545","9.826314","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21546","9.826320","172.30.1.205","172.30.1.104","TCP","54","43472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21547","9.828160","172.30.1.205","172.30.1.104","TCP","54","43472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21548","9.828273","172.30.1.205","172.30.1.104","TCP","74","36110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913054 TSecr=0 WS=128" +"21549","9.828434","172.30.1.104","172.30.1.205","TCP","54","135 > 43472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21550","9.828454","172.30.1.104","172.30.1.205","TCP","54","135 > 43472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21551","9.828460","172.30.1.205","172.30.1.104","TCP","54","43472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21552","9.828591","172.30.1.104","172.30.1.205","TCP","66","49671 > 36110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21553","9.828605","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21554","9.828979","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21555","9.829328","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21556","9.829343","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21557","9.831333","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21558","9.833357","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21559","9.833371","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21560","9.834787","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21561","9.836856","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21562","9.836875","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21563","9.838051","172.30.1.205","172.30.1.104","TCP","74","43476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913064 TSecr=0 WS=128" +"21564","9.838396","172.30.1.104","172.30.1.205","TCP","66","135 > 43476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21565","9.838408","172.30.1.205","172.30.1.104","TCP","54","43476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21566","9.838758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21567","9.839098","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21568","9.839107","172.30.1.205","172.30.1.104","TCP","54","43476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21569","9.841319","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21570","9.841737","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21571","9.841744","172.30.1.205","172.30.1.104","TCP","54","43476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21572","9.843619","172.30.1.205","172.30.1.104","TCP","54","43476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21573","9.843744","172.30.1.205","172.30.1.104","TCP","74","36114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913070 TSecr=0 WS=128" +"21574","9.843945","172.30.1.104","172.30.1.205","TCP","54","135 > 43476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21575","9.843973","172.30.1.104","172.30.1.205","TCP","54","135 > 43476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21576","9.843979","172.30.1.205","172.30.1.104","TCP","54","43476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21577","9.844022","172.30.1.104","172.30.1.205","TCP","66","49671 > 36114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21578","9.844030","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21579","9.844380","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21580","9.844716","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21581","9.844725","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21582","9.846616","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21583","9.847027","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21584","9.847031","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21585","9.848392","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21586","9.850476","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21587","9.850486","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21588","9.851431","172.30.1.205","172.30.1.104","TCP","74","43480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913077 TSecr=0 WS=128" +"21589","9.851774","172.30.1.104","172.30.1.205","TCP","66","135 > 43480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21590","9.851795","172.30.1.205","172.30.1.104","TCP","54","43480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21591","9.852337","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21592","9.852662","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21593","9.852672","172.30.1.205","172.30.1.104","TCP","54","43480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21594","9.854876","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21595","9.855305","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21596","9.855312","172.30.1.205","172.30.1.104","TCP","54","43480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21597","9.856158","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21598","9.856207","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21599","9.856234","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21600","9.856267","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21601","9.856295","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21602","9.856318","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21603","9.856345","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21604","9.856372","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21605","9.856399","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21606","9.856426","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21607","9.856448","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21608","9.856519","172.30.1.104","172.30.1.205","TCP","54","49671 > 36074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21609","9.856534","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21610","9.856655","172.30.1.104","172.30.1.205","TCP","54","49671 > 36078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21611","9.856677","172.30.1.104","172.30.1.205","TCP","54","49671 > 36082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21612","9.856702","172.30.1.104","172.30.1.205","TCP","54","49671 > 36074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21613","9.856709","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21614","9.856729","172.30.1.104","172.30.1.205","TCP","54","49671 > 36078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21615","9.856732","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21616","9.856757","172.30.1.104","172.30.1.205","TCP","54","49671 > 36086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21617","9.856894","172.30.1.104","172.30.1.205","TCP","54","49671 > 36090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21618","9.856922","172.30.1.104","172.30.1.205","TCP","54","49671 > 36094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21619","9.856952","172.30.1.104","172.30.1.205","TCP","54","49671 > 36082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21620","9.856958","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21621","9.856981","172.30.1.104","172.30.1.205","TCP","54","49671 > 36094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21622","9.856985","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21623","9.857012","172.30.1.104","172.30.1.205","TCP","54","49671 > 36086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21624","9.857016","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21625","9.857038","172.30.1.104","172.30.1.205","TCP","54","49671 > 36090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21626","9.857041","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21627","9.857065","172.30.1.104","172.30.1.205","TCP","54","49671 > 36098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21628","9.857095","172.30.1.104","172.30.1.205","TCP","54","49671 > 36102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21629","9.857124","172.30.1.104","172.30.1.205","TCP","54","49671 > 36106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21630","9.857171","172.30.1.104","172.30.1.205","TCP","54","49671 > 36098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21631","9.857175","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21632","9.857200","172.30.1.104","172.30.1.205","TCP","54","49671 > 36110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21633","9.857228","172.30.1.104","172.30.1.205","TCP","54","49671 > 36114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21634","9.857256","172.30.1.104","172.30.1.205","TCP","54","49671 > 36110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21635","9.857260","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21636","9.857287","172.30.1.104","172.30.1.205","TCP","54","49671 > 36114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21637","9.857290","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21638","9.857315","172.30.1.104","172.30.1.205","TCP","54","49671 > 36102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21639","9.857318","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21640","9.857342","172.30.1.104","172.30.1.205","TCP","54","49671 > 36106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21641","9.857345","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21642","9.857371","172.30.1.104","172.30.1.205","TCP","54","49671 > 36070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21643","9.857851","172.30.1.104","172.30.1.205","TCP","54","49671 > 36070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21644","9.857857","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21645","9.858199","172.30.1.205","172.30.1.104","TCP","54","43480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21646","9.858319","172.30.1.205","172.30.1.104","TCP","74","36118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913084 TSecr=0 WS=128" +"21647","9.858471","172.30.1.104","172.30.1.205","TCP","54","135 > 43480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21648","9.858485","172.30.1.104","172.30.1.205","TCP","54","135 > 43480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21649","9.858490","172.30.1.205","172.30.1.104","TCP","54","43480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21650","9.858622","172.30.1.104","172.30.1.205","TCP","66","49671 > 36118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21651","9.858630","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21652","9.858986","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21653","9.859293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21654","9.859302","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21655","9.861230","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21656","9.862118","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21657","9.862125","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21658","9.863484","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21659","9.865599","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21660","9.865608","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21661","9.866569","172.30.1.205","172.30.1.104","TCP","74","43484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913092 TSecr=0 WS=128" +"21662","9.866883","172.30.1.104","172.30.1.205","TCP","66","135 > 43484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21663","9.866894","172.30.1.205","172.30.1.104","TCP","54","43484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21664","9.867245","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21665","9.867549","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21666","9.867557","172.30.1.205","172.30.1.104","TCP","54","43484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21667","9.869766","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21668","9.870170","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21669","9.870178","172.30.1.205","172.30.1.104","TCP","54","43484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21670","9.872024","172.30.1.205","172.30.1.104","TCP","54","43484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21671","9.872140","172.30.1.205","172.30.1.104","TCP","74","36122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913098 TSecr=0 WS=128" +"21672","9.872395","172.30.1.104","172.30.1.205","TCP","54","135 > 43484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21673","9.872407","172.30.1.104","172.30.1.205","TCP","54","135 > 43484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21674","9.872420","172.30.1.205","172.30.1.104","TCP","54","43484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21675","9.872458","172.30.1.104","172.30.1.205","TCP","66","49671 > 36122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21676","9.872466","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21677","9.872837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21678","9.873789","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21679","9.873797","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21680","9.875665","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21681","9.876078","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21682","9.876085","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21683","9.877469","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21684","9.879549","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21685","9.879559","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21686","9.880502","172.30.1.205","172.30.1.104","TCP","74","43488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913106 TSecr=0 WS=128" +"21687","9.880838","172.30.1.104","172.30.1.205","TCP","66","135 > 43488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21688","9.880849","172.30.1.205","172.30.1.104","TCP","54","43488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21689","9.881212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21690","9.881531","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21691","9.881541","172.30.1.205","172.30.1.104","TCP","54","43488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21692","9.883738","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21693","9.884152","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21694","9.884158","172.30.1.205","172.30.1.104","TCP","54","43488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21695","9.885996","172.30.1.205","172.30.1.104","TCP","54","43488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21696","9.886108","172.30.1.205","172.30.1.104","TCP","74","36126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913112 TSecr=0 WS=128" +"21697","9.886313","172.30.1.104","172.30.1.205","TCP","54","135 > 43488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21698","9.886369","172.30.1.104","172.30.1.205","TCP","54","135 > 43488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21699","9.886374","172.30.1.205","172.30.1.104","TCP","54","43488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21700","9.886476","172.30.1.104","172.30.1.205","TCP","66","49671 > 36126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21701","9.886484","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21702","9.886833","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21703","9.887194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21704","9.887203","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21705","9.889120","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21706","9.889547","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21707","9.889560","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21708","9.891142","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21709","9.893218","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21710","9.893227","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21711","9.894201","172.30.1.205","172.30.1.104","TCP","74","43492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913120 TSecr=0 WS=128" +"21712","9.894515","172.30.1.104","172.30.1.205","TCP","66","135 > 43492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21713","9.894526","172.30.1.205","172.30.1.104","TCP","54","43492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21714","9.894880","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21715","9.895193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21716","9.895201","172.30.1.205","172.30.1.104","TCP","54","43492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21717","9.897431","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21718","9.897852","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21719","9.897858","172.30.1.205","172.30.1.104","TCP","54","43492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21720","9.899683","172.30.1.205","172.30.1.104","TCP","54","43492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21721","9.899794","172.30.1.205","172.30.1.104","TCP","74","36130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913126 TSecr=0 WS=128" +"21722","9.900001","172.30.1.104","172.30.1.205","TCP","54","135 > 43492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21723","9.900029","172.30.1.104","172.30.1.205","TCP","54","135 > 43492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21724","9.900034","172.30.1.205","172.30.1.104","TCP","54","43492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21725","9.900120","172.30.1.104","172.30.1.205","TCP","66","49671 > 36130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21726","9.900128","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21727","9.900483","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21728","9.900792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21729","9.900802","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21730","9.902701","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21731","9.903081","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21732","9.903088","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21733","9.904441","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21734","9.906966","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21735","9.906977","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21736","9.907936","172.30.1.205","172.30.1.104","TCP","74","43496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913134 TSecr=0 WS=128" +"21737","9.908262","172.30.1.104","172.30.1.205","TCP","66","135 > 43496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21738","9.908273","172.30.1.205","172.30.1.104","TCP","54","43496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21739","9.908623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21740","9.908946","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21741","9.908956","172.30.1.205","172.30.1.104","TCP","54","43496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21742","9.911172","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21743","9.911573","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21744","9.911579","172.30.1.205","172.30.1.104","TCP","54","43496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21745","9.913427","172.30.1.205","172.30.1.104","TCP","54","43496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21746","9.913544","172.30.1.205","172.30.1.104","TCP","74","36134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913139 TSecr=0 WS=128" +"21747","9.913719","172.30.1.104","172.30.1.205","TCP","54","135 > 43496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21748","9.913742","172.30.1.104","172.30.1.205","TCP","54","135 > 43496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21749","9.913748","172.30.1.205","172.30.1.104","TCP","54","43496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21750","9.913858","172.30.1.104","172.30.1.205","TCP","66","49671 > 36134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21751","9.913875","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21752","9.914282","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21753","9.914600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21754","9.914608","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21755","9.916524","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21756","9.916929","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21757","9.916937","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21758","9.918313","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21759","9.920402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21760","9.920414","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21761","9.921466","172.30.1.205","172.30.1.104","TCP","74","43500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913147 TSecr=0 WS=128" +"21762","9.921793","172.30.1.104","172.30.1.205","TCP","66","135 > 43500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21763","9.921811","172.30.1.205","172.30.1.104","TCP","54","43500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21764","9.922224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21765","9.922524","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21766","9.922535","172.30.1.205","172.30.1.104","TCP","54","43500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21767","9.924826","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21768","9.925217","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21769","9.925224","172.30.1.205","172.30.1.104","TCP","54","43500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21770","9.927084","172.30.1.205","172.30.1.104","TCP","54","43500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21771","9.927226","172.30.1.205","172.30.1.104","TCP","74","36138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913153 TSecr=0 WS=128" +"21772","9.927385","172.30.1.104","172.30.1.205","TCP","54","135 > 43500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21773","9.927397","172.30.1.104","172.30.1.205","TCP","54","135 > 43500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21774","9.927404","172.30.1.205","172.30.1.104","TCP","54","43500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21775","9.927479","172.30.1.104","172.30.1.205","TCP","66","49671 > 36138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21776","9.927488","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21777","9.927841","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21778","9.928129","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21779","9.928135","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21780","9.930077","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21781","9.930449","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21782","9.930455","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21783","9.931832","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21784","9.934460","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21785","9.934471","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21786","9.935479","172.30.1.205","172.30.1.104","TCP","74","43504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913161 TSecr=0 WS=128" +"21787","9.935810","172.30.1.104","172.30.1.205","TCP","66","135 > 43504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21788","9.935822","172.30.1.205","172.30.1.104","TCP","54","43504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21789","9.936171","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21790","9.936475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21791","9.936484","172.30.1.205","172.30.1.104","TCP","54","43504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21792","9.938728","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21793","9.939137","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21794","9.939144","172.30.1.205","172.30.1.104","TCP","54","43504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21795","9.940992","172.30.1.205","172.30.1.104","TCP","54","43504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21796","9.941106","172.30.1.205","172.30.1.104","TCP","74","36142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913167 TSecr=0 WS=128" +"21797","9.941268","172.30.1.104","172.30.1.205","TCP","54","135 > 43504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21798","9.941294","172.30.1.104","172.30.1.205","TCP","54","135 > 43504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21799","9.941300","172.30.1.205","172.30.1.104","TCP","54","43504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21800","9.941408","172.30.1.104","172.30.1.205","TCP","66","49671 > 36142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21801","9.941416","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21802","9.941768","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21803","9.942064","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21804","9.942073","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21805","9.943958","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21806","9.944325","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21807","9.944332","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21808","9.945720","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21809","9.947745","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21810","9.947757","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21811","9.948727","172.30.1.205","172.30.1.104","TCP","74","43508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913175 TSecr=0 WS=128" +"21812","9.949033","172.30.1.104","172.30.1.205","TCP","66","135 > 43508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21813","9.949044","172.30.1.205","172.30.1.104","TCP","54","43508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21814","9.949405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21815","9.949712","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21816","9.949721","172.30.1.205","172.30.1.104","TCP","54","43508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21817","9.951976","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21818","9.952406","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21819","9.952412","172.30.1.205","172.30.1.104","TCP","54","43508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21820","9.954332","172.30.1.205","172.30.1.104","TCP","54","43508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21821","9.954453","172.30.1.205","172.30.1.104","TCP","74","36146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913180 TSecr=0 WS=128" +"21822","9.954624","172.30.1.104","172.30.1.205","TCP","54","135 > 43508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21823","9.954635","172.30.1.104","172.30.1.205","TCP","54","135 > 43508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21824","9.954651","172.30.1.205","172.30.1.104","TCP","54","43508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21825","9.954765","172.30.1.104","172.30.1.205","TCP","66","49671 > 36146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21826","9.954774","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21827","9.955163","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21828","9.955453","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21829","9.955460","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21830","9.957389","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21831","9.957757","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21832","9.957764","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21833","9.959124","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21834","9.961230","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21835","9.961240","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21836","9.962196","172.30.1.205","172.30.1.104","TCP","74","43512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913188 TSecr=0 WS=128" +"21837","9.962535","172.30.1.104","172.30.1.205","TCP","66","135 > 43512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21838","9.962548","172.30.1.205","172.30.1.104","TCP","54","43512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21839","9.962907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21840","9.963229","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21841","9.963239","172.30.1.205","172.30.1.104","TCP","54","43512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21842","9.965456","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21843","9.965837","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21844","9.965844","172.30.1.205","172.30.1.104","TCP","54","43512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21845","9.967663","172.30.1.205","172.30.1.104","TCP","54","43512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21846","9.967777","172.30.1.205","172.30.1.104","TCP","74","36150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913194 TSecr=0 WS=128" +"21847","9.967952","172.30.1.104","172.30.1.205","TCP","54","135 > 43512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21848","9.967998","172.30.1.104","172.30.1.205","TCP","54","135 > 43512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21849","9.968004","172.30.1.205","172.30.1.104","TCP","54","43512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21850","9.968089","172.30.1.104","172.30.1.205","TCP","66","49671 > 36150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21851","9.968097","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21852","9.968449","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21853","9.968733","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21854","9.968742","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21855","9.970660","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21856","9.971028","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21857","9.971034","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21858","9.972389","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21859","9.974419","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21860","9.974429","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21861","9.975405","172.30.1.205","172.30.1.104","TCP","74","43516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913201 TSecr=0 WS=128" +"21862","9.975744","172.30.1.104","172.30.1.205","TCP","66","135 > 43516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21863","9.975756","172.30.1.205","172.30.1.104","TCP","54","43516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21864","9.976107","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21865","9.976389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21866","9.976397","172.30.1.205","172.30.1.104","TCP","54","43516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21867","9.978653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21868","9.979066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21869","9.979074","172.30.1.205","172.30.1.104","TCP","54","43516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21870","9.980941","172.30.1.205","172.30.1.104","TCP","54","43516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21871","9.981102","172.30.1.205","172.30.1.104","TCP","74","36154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913207 TSecr=0 WS=128" +"21872","9.981240","172.30.1.104","172.30.1.205","TCP","54","135 > 43516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21873","9.981253","172.30.1.104","172.30.1.205","TCP","54","135 > 43516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21874","9.981261","172.30.1.205","172.30.1.104","TCP","54","43516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21875","9.981392","172.30.1.104","172.30.1.205","TCP","66","49671 > 36154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21876","9.981402","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21877","9.981765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21878","9.982072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21879","9.982082","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21880","9.984005","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21881","9.984372","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21882","9.984380","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21883","9.985799","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21884","9.987957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21885","9.987967","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21886","9.989022","172.30.1.205","172.30.1.104","TCP","74","43520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913215 TSecr=0 WS=128" +"21887","9.989360","172.30.1.104","172.30.1.205","TCP","66","135 > 43520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21888","9.989373","172.30.1.205","172.30.1.104","TCP","54","43520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21889","9.989736","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21890","9.990118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21891","9.990127","172.30.1.205","172.30.1.104","TCP","54","43520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21892","9.992369","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21893","9.992847","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21894","9.992855","172.30.1.205","172.30.1.104","TCP","54","43520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21895","9.994708","172.30.1.205","172.30.1.104","TCP","54","43520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21896","9.994855","172.30.1.205","172.30.1.104","TCP","74","36158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913221 TSecr=0 WS=128" +"21897","9.995016","172.30.1.104","172.30.1.205","TCP","54","135 > 43520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21898","9.995042","172.30.1.104","172.30.1.205","TCP","54","135 > 43520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21899","9.995050","172.30.1.205","172.30.1.104","TCP","54","43520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21900","9.995179","172.30.1.104","172.30.1.205","TCP","66","49671 > 36158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21901","9.995188","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21902","9.995542","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21903","9.995847","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21904","9.995856","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21905","9.997835","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21906","9.998237","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21907","9.998244","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21908","9.999642","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21909","10.002806","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21910","10.002816","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21911","10.003870","172.30.1.205","172.30.1.104","TCP","74","43524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913230 TSecr=0 WS=128" +"21912","10.004185","172.30.1.104","172.30.1.205","TCP","66","135 > 43524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21913","10.004198","172.30.1.205","172.30.1.104","TCP","54","43524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21914","10.004556","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21915","10.004951","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21916","10.004965","172.30.1.205","172.30.1.104","TCP","54","43524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21917","10.007213","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21918","10.007624","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21919","10.007631","172.30.1.205","172.30.1.104","TCP","54","43524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21920","10.009495","172.30.1.205","172.30.1.104","TCP","54","43524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21921","10.009641","172.30.1.205","172.30.1.104","TCP","74","36162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913236 TSecr=0 WS=128" +"21922","10.009778","172.30.1.104","172.30.1.205","TCP","54","135 > 43524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21923","10.009872","172.30.1.104","172.30.1.205","TCP","54","135 > 43524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21924","10.009884","172.30.1.205","172.30.1.104","TCP","54","43524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21925","10.009978","172.30.1.104","172.30.1.205","TCP","66","49671 > 36162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21926","10.009992","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21927","10.010400","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"21928","10.010723","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21929","10.010737","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21930","10.012774","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"21931","10.013176","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"21932","10.013184","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"21933","10.014622","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"21934","10.016785","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"21935","10.016799","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21936","10.017872","172.30.1.205","172.30.1.104","TCP","74","43528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913244 TSecr=0 WS=128" +"21937","10.018178","172.30.1.104","172.30.1.205","TCP","66","135 > 43528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21938","10.018191","172.30.1.205","172.30.1.104","TCP","54","43528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"21939","10.018560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"21940","10.018854","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"21941","10.018863","172.30.1.205","172.30.1.104","TCP","54","43528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"21942","10.021147","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"21943","10.021560","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"21944","10.021568","172.30.1.205","172.30.1.104","TCP","54","43528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21945","10.022446","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21946","10.022499","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21947","10.022536","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21948","10.022571","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21949","10.022599","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21950","10.022627","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21951","10.022660","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21952","10.022682","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21953","10.022706","172.30.1.104","172.30.1.205","TCP","54","49671 > 36122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21954","10.022733","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21955","10.022763","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21956","10.022791","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21957","10.022830","172.30.1.104","172.30.1.205","TCP","54","49671 > 36126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21958","10.022855","172.30.1.104","172.30.1.205","TCP","54","49671 > 36122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21959","10.022865","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21960","10.022883","172.30.1.104","172.30.1.205","TCP","54","49671 > 36126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21961","10.022886","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21962","10.022906","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"21963","10.022912","172.30.1.104","172.30.1.205","TCP","54","49671 > 36130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21964","10.022941","172.30.1.104","172.30.1.205","TCP","54","49671 > 36134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21965","10.023056","172.30.1.104","172.30.1.205","TCP","54","49671 > 36138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21966","10.023080","172.30.1.104","172.30.1.205","TCP","54","49671 > 36142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21967","10.023106","172.30.1.104","172.30.1.205","TCP","54","49671 > 36130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21968","10.023112","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21969","10.023135","172.30.1.104","172.30.1.205","TCP","54","49671 > 36142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21970","10.023137","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21971","10.023163","172.30.1.104","172.30.1.205","TCP","54","49671 > 36134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21972","10.023166","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21973","10.023190","172.30.1.104","172.30.1.205","TCP","54","49671 > 36138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21974","10.023193","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21975","10.023217","172.30.1.104","172.30.1.205","TCP","54","49671 > 36146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21976","10.023250","172.30.1.104","172.30.1.205","TCP","54","49671 > 36150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21977","10.023278","172.30.1.104","172.30.1.205","TCP","54","49671 > 36154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21978","10.023392","172.30.1.104","172.30.1.205","TCP","54","49671 > 36146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21979","10.023397","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21980","10.023420","172.30.1.104","172.30.1.205","TCP","54","49671 > 36158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21981","10.023447","172.30.1.104","172.30.1.205","TCP","54","49671 > 36158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21982","10.023450","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21983","10.023473","172.30.1.104","172.30.1.205","TCP","54","49671 > 36150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21984","10.023475","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21985","10.023499","172.30.1.104","172.30.1.205","TCP","54","49671 > 36154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21986","10.023501","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21987","10.023526","172.30.1.104","172.30.1.205","TCP","54","49671 > 36162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21988","10.023553","172.30.1.104","172.30.1.205","TCP","54","49671 > 36118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21989","10.023579","172.30.1.104","172.30.1.205","TCP","54","49671 > 36162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21990","10.023582","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21991","10.023607","172.30.1.104","172.30.1.205","TCP","54","49671 > 36118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"21992","10.023610","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"21993","10.024467","172.30.1.205","172.30.1.104","TCP","54","43528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"21994","10.024605","172.30.1.205","172.30.1.104","TCP","74","36166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913251 TSecr=0 WS=128" +"21995","10.024740","172.30.1.104","172.30.1.205","TCP","54","135 > 43528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21996","10.024766","172.30.1.104","172.30.1.205","TCP","54","135 > 43528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"21997","10.024771","172.30.1.205","172.30.1.104","TCP","54","43528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"21998","10.025020","172.30.1.104","172.30.1.205","TCP","66","49671 > 36166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"21999","10.025030","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22000","10.025395","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22001","10.025694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22002","10.025703","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22003","10.027613","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22004","10.028009","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22005","10.028016","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22006","10.029436","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22007","10.031611","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22008","10.031623","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22009","10.032644","172.30.1.205","172.30.1.104","TCP","74","43532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913259 TSecr=0 WS=128" +"22010","10.032950","172.30.1.104","172.30.1.205","TCP","66","135 > 43532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22011","10.032963","172.30.1.205","172.30.1.104","TCP","54","43532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22012","10.033328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22013","10.033645","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22014","10.033654","172.30.1.205","172.30.1.104","TCP","54","43532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22015","10.035878","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22016","10.036322","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22017","10.036329","172.30.1.205","172.30.1.104","TCP","54","43532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22018","10.038174","172.30.1.205","172.30.1.104","TCP","54","43532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22019","10.038303","172.30.1.205","172.30.1.104","TCP","74","36170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913264 TSecr=0 WS=128" +"22020","10.038457","172.30.1.104","172.30.1.205","TCP","54","135 > 43532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22021","10.038470","172.30.1.104","172.30.1.205","TCP","54","135 > 43532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22022","10.038478","172.30.1.205","172.30.1.104","TCP","54","43532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22023","10.038609","172.30.1.104","172.30.1.205","TCP","66","49671 > 36170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22024","10.038618","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22025","10.038989","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22026","10.039297","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22027","10.039305","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22028","10.041198","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22029","10.041600","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22030","10.041610","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22031","10.043040","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22032","10.045251","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22033","10.045263","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22034","10.046306","172.30.1.205","172.30.1.104","TCP","74","43536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913272 TSecr=0 WS=128" +"22035","10.046642","172.30.1.104","172.30.1.205","TCP","66","135 > 43536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22036","10.046654","172.30.1.205","172.30.1.104","TCP","54","43536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22037","10.047019","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22038","10.049986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22039","10.049995","172.30.1.205","172.30.1.104","TCP","54","43536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22040","10.052250","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22041","10.052721","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22042","10.052729","172.30.1.205","172.30.1.104","TCP","54","43536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22043","10.054574","172.30.1.205","172.30.1.104","TCP","54","43536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22044","10.054710","172.30.1.205","172.30.1.104","TCP","74","36174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913281 TSecr=0 WS=128" +"22045","10.054866","172.30.1.104","172.30.1.205","TCP","54","135 > 43536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22046","10.054879","172.30.1.104","172.30.1.205","TCP","54","135 > 43536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22047","10.054886","172.30.1.205","172.30.1.104","TCP","54","43536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22048","10.055004","172.30.1.104","172.30.1.205","TCP","66","49671 > 36174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22049","10.055012","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22050","10.055357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22051","10.055631","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22052","10.055640","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22053","10.057553","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22054","10.058793","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22055","10.058799","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22056","10.060164","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22057","10.062330","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22058","10.062341","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22059","10.063385","172.30.1.205","172.30.1.104","TCP","74","43540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913289 TSecr=0 WS=128" +"22060","10.063703","172.30.1.104","172.30.1.205","TCP","66","135 > 43540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22061","10.063716","172.30.1.205","172.30.1.104","TCP","54","43540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22062","10.064077","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22063","10.064378","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22064","10.064387","172.30.1.205","172.30.1.104","TCP","54","43540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22065","10.066653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22066","10.067083","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22067","10.067090","172.30.1.205","172.30.1.104","TCP","54","43540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22068","10.068945","172.30.1.205","172.30.1.104","TCP","54","43540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22069","10.069095","172.30.1.205","172.30.1.104","TCP","74","36178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913295 TSecr=0 WS=128" +"22070","10.069237","172.30.1.104","172.30.1.205","TCP","54","135 > 43540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22071","10.069263","172.30.1.104","172.30.1.205","TCP","54","135 > 43540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22072","10.069271","172.30.1.205","172.30.1.104","TCP","54","43540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22073","10.069371","172.30.1.104","172.30.1.205","TCP","66","49671 > 36178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22074","10.069380","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22075","10.069752","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22076","10.071257","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22077","10.071268","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22078","10.073208","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22079","10.074387","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22080","10.074399","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22081","10.075781","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22082","10.077957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22083","10.077968","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22084","10.079007","172.30.1.205","172.30.1.104","TCP","74","43544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913305 TSecr=0 WS=128" +"22085","10.079342","172.30.1.104","172.30.1.205","TCP","66","135 > 43544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22086","10.079354","172.30.1.205","172.30.1.104","TCP","54","43544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22087","10.079705","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22088","10.080055","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22089","10.080065","172.30.1.205","172.30.1.104","TCP","54","43544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22090","10.082321","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22091","10.082750","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22092","10.082757","172.30.1.205","172.30.1.104","TCP","54","43544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22093","10.084578","172.30.1.205","172.30.1.104","TCP","54","43544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22094","10.084715","172.30.1.205","172.30.1.104","TCP","74","36182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913311 TSecr=0 WS=128" +"22095","10.084889","172.30.1.104","172.30.1.205","TCP","54","135 > 43544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22096","10.084914","172.30.1.104","172.30.1.205","TCP","54","135 > 43544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22097","10.084922","172.30.1.205","172.30.1.104","TCP","54","43544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22098","10.085057","172.30.1.104","172.30.1.205","TCP","66","49671 > 36182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22099","10.085065","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22100","10.085434","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22101","10.086088","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22102","10.086097","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22103","10.087955","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22104","10.088386","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22105","10.088392","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22106","10.089768","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22107","10.091926","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22108","10.091935","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22109","10.092941","172.30.1.205","172.30.1.104","TCP","74","43548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913319 TSecr=0 WS=128" +"22110","10.093258","172.30.1.104","172.30.1.205","TCP","66","135 > 43548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22111","10.093269","172.30.1.205","172.30.1.104","TCP","54","43548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22112","10.093627","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22113","10.093944","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22114","10.093953","172.30.1.205","172.30.1.104","TCP","54","43548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22115","10.096165","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22116","10.096589","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22117","10.096595","172.30.1.205","172.30.1.104","TCP","54","43548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22118","10.098452","172.30.1.205","172.30.1.104","TCP","54","43548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22119","10.098592","172.30.1.205","172.30.1.104","TCP","74","36186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913325 TSecr=0 WS=128" +"22120","10.098775","172.30.1.104","172.30.1.205","TCP","54","135 > 43548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22121","10.098789","172.30.1.104","172.30.1.205","TCP","54","135 > 43548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22122","10.098796","172.30.1.205","172.30.1.104","TCP","54","43548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22123","10.098898","172.30.1.104","172.30.1.205","TCP","66","49671 > 36186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22124","10.098906","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22125","10.099259","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22126","10.099618","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22127","10.099633","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22128","10.101647","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22129","10.102067","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22130","10.102074","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22131","10.103471","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22132","10.105674","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22133","10.105686","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22134","10.106718","172.30.1.205","172.30.1.104","TCP","74","43552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913333 TSecr=0 WS=128" +"22135","10.107116","172.30.1.104","172.30.1.205","TCP","66","135 > 43552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22136","10.107129","172.30.1.205","172.30.1.104","TCP","54","43552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22137","10.107489","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22138","10.107810","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22139","10.107820","172.30.1.205","172.30.1.104","TCP","54","43552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22140","10.110103","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22141","10.110537","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22142","10.110544","172.30.1.205","172.30.1.104","TCP","54","43552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22143","10.112380","172.30.1.205","172.30.1.104","TCP","54","43552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22144","10.112503","172.30.1.205","172.30.1.104","TCP","74","36190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913338 TSecr=0 WS=128" +"22145","10.112686","172.30.1.104","172.30.1.205","TCP","54","135 > 43552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22146","10.112711","172.30.1.104","172.30.1.205","TCP","54","135 > 43552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22147","10.112718","172.30.1.205","172.30.1.104","TCP","54","43552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22148","10.112841","172.30.1.104","172.30.1.205","TCP","66","49671 > 36190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22149","10.112850","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22150","10.113206","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22151","10.113630","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22152","10.113639","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22153","10.115547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22154","10.116353","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22155","10.116360","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22156","10.117755","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22157","10.119972","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22158","10.119982","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22159","10.120972","172.30.1.205","172.30.1.104","TCP","74","43556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913347 TSecr=0 WS=128" +"22160","10.121332","172.30.1.104","172.30.1.205","TCP","66","135 > 43556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22161","10.121345","172.30.1.205","172.30.1.104","TCP","54","43556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22162","10.121720","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22163","10.122062","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22164","10.122072","172.30.1.205","172.30.1.104","TCP","54","43556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22165","10.124313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22166","10.124759","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22167","10.124766","172.30.1.205","172.30.1.104","TCP","54","43556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22168","10.126586","172.30.1.205","172.30.1.104","TCP","54","43556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22169","10.126704","172.30.1.205","172.30.1.104","TCP","74","36194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913353 TSecr=0 WS=128" +"22170","10.126877","172.30.1.104","172.30.1.205","TCP","54","135 > 43556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22171","10.126900","172.30.1.104","172.30.1.205","TCP","54","135 > 43556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22172","10.126906","172.30.1.205","172.30.1.104","TCP","54","43556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22173","10.127039","172.30.1.104","172.30.1.205","TCP","66","49671 > 36194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22174","10.127047","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22175","10.127392","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22176","10.127719","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22177","10.127728","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22178","10.129642","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22179","10.130025","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22180","10.130032","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22181","10.131391","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22182","10.133551","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22183","10.133560","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22184","10.134520","172.30.1.205","172.30.1.104","TCP","74","43560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913360 TSecr=0 WS=128" +"22185","10.134866","172.30.1.104","172.30.1.205","TCP","66","135 > 43560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22186","10.134877","172.30.1.205","172.30.1.104","TCP","54","43560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22187","10.135228","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22188","10.135544","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22189","10.135553","172.30.1.205","172.30.1.104","TCP","54","43560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22190","10.137777","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22191","10.138222","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22192","10.138236","172.30.1.205","172.30.1.104","TCP","54","43560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22193","10.140049","172.30.1.205","172.30.1.104","TCP","54","43560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22194","10.140160","172.30.1.205","172.30.1.104","TCP","74","36198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913366 TSecr=0 WS=128" +"22195","10.140335","172.30.1.104","172.30.1.205","TCP","54","135 > 43560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22196","10.140363","172.30.1.104","172.30.1.205","TCP","54","135 > 43560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22197","10.140369","172.30.1.205","172.30.1.104","TCP","54","43560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22198","10.140442","172.30.1.104","172.30.1.205","TCP","66","49671 > 36198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22199","10.140451","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22200","10.140822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22201","10.141135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22202","10.141143","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22203","10.143031","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22204","10.143404","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22205","10.143411","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22206","10.144818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22207","10.146934","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22208","10.146945","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22209","10.147924","172.30.1.205","172.30.1.104","TCP","74","43564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913374 TSecr=0 WS=128" +"22210","10.148262","172.30.1.104","172.30.1.205","TCP","66","135 > 43564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22211","10.148279","172.30.1.205","172.30.1.104","TCP","54","43564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22212","10.148629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22213","10.149049","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22214","10.149058","172.30.1.205","172.30.1.104","TCP","54","43564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22215","10.151268","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22216","10.151691","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22217","10.151697","172.30.1.205","172.30.1.104","TCP","54","43564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22218","10.153541","172.30.1.205","172.30.1.104","TCP","54","43564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22219","10.153656","172.30.1.205","172.30.1.104","TCP","74","36202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913380 TSecr=0 WS=128" +"22220","10.153845","172.30.1.104","172.30.1.205","TCP","54","135 > 43564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22221","10.153904","172.30.1.104","172.30.1.205","TCP","54","135 > 43564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22222","10.153910","172.30.1.205","172.30.1.104","TCP","54","43564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22223","10.153946","172.30.1.104","172.30.1.205","TCP","66","49671 > 36202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22224","10.153955","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22225","10.154299","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22226","10.154648","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22227","10.154657","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22228","10.156554","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22229","10.157012","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22230","10.157022","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22231","10.158448","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22232","10.160586","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22233","10.160599","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22234","10.161615","172.30.1.205","172.30.1.104","TCP","74","43568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913388 TSecr=0 WS=128" +"22235","10.161936","172.30.1.104","172.30.1.205","TCP","66","135 > 43568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22236","10.161949","172.30.1.205","172.30.1.104","TCP","54","43568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22237","10.162313","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22238","10.162608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22239","10.162617","172.30.1.205","172.30.1.104","TCP","54","43568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22240","10.164859","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22241","10.165287","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22242","10.165294","172.30.1.205","172.30.1.104","TCP","54","43568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22243","10.167124","172.30.1.205","172.30.1.104","TCP","54","43568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22244","10.167238","172.30.1.205","172.30.1.104","TCP","74","36206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913393 TSecr=0 WS=128" +"22245","10.167484","172.30.1.104","172.30.1.205","TCP","54","135 > 43568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22246","10.167514","172.30.1.104","172.30.1.205","TCP","54","135 > 43568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22247","10.167524","172.30.1.205","172.30.1.104","TCP","54","43568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22248","10.167589","172.30.1.104","172.30.1.205","TCP","66","49671 > 36206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22249","10.167607","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22250","10.168091","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22251","10.168404","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22252","10.168413","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22253","10.170320","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22254","10.170704","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22255","10.170710","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22256","10.172067","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22257","10.174170","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22258","10.174179","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22259","10.175130","172.30.1.205","172.30.1.104","TCP","74","43572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913401 TSecr=0 WS=128" +"22260","10.175469","172.30.1.104","172.30.1.205","TCP","66","135 > 43572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22261","10.175480","172.30.1.205","172.30.1.104","TCP","54","43572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22262","10.175832","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22263","10.176158","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22264","10.176167","172.30.1.205","172.30.1.104","TCP","54","43572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22265","10.178389","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22266","10.178812","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22267","10.178819","172.30.1.205","172.30.1.104","TCP","54","43572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22268","10.180632","172.30.1.205","172.30.1.104","TCP","54","43572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22269","10.180743","172.30.1.205","172.30.1.104","TCP","74","36210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913407 TSecr=0 WS=128" +"22270","10.180959","172.30.1.104","172.30.1.205","TCP","54","135 > 43572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22271","10.180993","172.30.1.104","172.30.1.205","TCP","54","135 > 43572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22272","10.181005","172.30.1.205","172.30.1.104","TCP","54","43572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22273","10.181053","172.30.1.104","172.30.1.205","TCP","66","49671 > 36210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22274","10.181068","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22275","10.181607","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22276","10.181971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22277","10.181980","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22278","10.183843","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22279","10.184254","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22280","10.184258","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22281","10.185638","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22282","10.189680","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22283","10.189698","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22284","10.190719","172.30.1.205","172.30.1.104","TCP","74","43576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913417 TSecr=0 WS=128" +"22285","10.191065","172.30.1.104","172.30.1.205","TCP","66","135 > 43576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22286","10.191076","172.30.1.205","172.30.1.104","TCP","54","43576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22287","10.191430","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22288","10.191746","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22289","10.191764","172.30.1.205","172.30.1.104","TCP","54","43576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22290","10.194131","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22291","10.194572","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22292","10.194584","172.30.1.205","172.30.1.104","TCP","54","43576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22293","10.195571","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22294","10.195620","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22295","10.195657","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22296","10.195687","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22297","10.195716","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22298","10.195750","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22299","10.195777","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22300","10.195811","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22301","10.195838","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22302","10.195860","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22303","10.195886","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22304","10.195959","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22305","10.196222","172.30.1.104","172.30.1.205","TCP","54","49671 > 36170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22306","10.196237","172.30.1.104","172.30.1.205","TCP","54","49671 > 36170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22307","10.196248","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22308","10.196281","172.30.1.104","172.30.1.205","TCP","54","49671 > 36174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22309","10.196300","172.30.1.104","172.30.1.205","TCP","54","49671 > 36178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22310","10.196321","172.30.1.104","172.30.1.205","TCP","54","49671 > 36182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22311","10.196366","172.30.1.104","172.30.1.205","TCP","54","49671 > 36174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22312","10.196371","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22313","10.196387","172.30.1.104","172.30.1.205","TCP","54","49671 > 36186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22314","10.196409","172.30.1.104","172.30.1.205","TCP","54","49671 > 36186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22315","10.196412","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22316","10.196465","172.30.1.104","172.30.1.205","TCP","54","49671 > 36190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22317","10.196488","172.30.1.104","172.30.1.205","TCP","54","49671 > 36190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22318","10.196491","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22319","10.196514","172.30.1.104","172.30.1.205","TCP","54","49671 > 36194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22320","10.196530","172.30.1.104","172.30.1.205","TCP","54","49671 > 36194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22321","10.196534","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22322","10.196551","172.30.1.104","172.30.1.205","TCP","54","49671 > 36198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22323","10.196645","172.30.1.104","172.30.1.205","TCP","54","49671 > 36198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22324","10.196649","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22325","10.196665","172.30.1.104","172.30.1.205","TCP","54","49671 > 36178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22326","10.196669","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22327","10.196688","172.30.1.104","172.30.1.205","TCP","54","49671 > 36202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22328","10.196709","172.30.1.104","172.30.1.205","TCP","54","49671 > 36206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22329","10.196730","172.30.1.104","172.30.1.205","TCP","54","49671 > 36206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22330","10.196733","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22331","10.196763","172.30.1.104","172.30.1.205","TCP","54","49671 > 36210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22332","10.196844","172.30.1.104","172.30.1.205","TCP","54","49671 > 36210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22333","10.196850","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22334","10.197208","172.30.1.104","172.30.1.205","TCP","54","49671 > 36166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22335","10.197240","172.30.1.104","172.30.1.205","TCP","54","49671 > 36166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22336","10.197245","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22337","10.197260","172.30.1.104","172.30.1.205","TCP","54","49671 > 36182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22338","10.197266","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22339","10.197371","172.30.1.104","172.30.1.205","TCP","54","49671 > 36202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22340","10.197375","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22341","10.197904","172.30.1.205","172.30.1.104","TCP","54","43576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22342","10.198016","172.30.1.205","172.30.1.104","TCP","74","36214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913424 TSecr=0 WS=128" +"22343","10.198176","172.30.1.104","172.30.1.205","TCP","54","135 > 43576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22344","10.198212","172.30.1.104","172.30.1.205","TCP","54","135 > 43576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22345","10.198218","172.30.1.205","172.30.1.104","TCP","54","43576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22346","10.198299","172.30.1.104","172.30.1.205","TCP","66","49671 > 36214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22347","10.198308","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22348","10.198688","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22349","10.199020","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22350","10.199029","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22351","10.200947","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22352","10.201326","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22353","10.201333","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22354","10.202687","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22355","10.204885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22356","10.204894","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22357","10.205842","172.30.1.205","172.30.1.104","TCP","74","43580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913432 TSecr=0 WS=128" +"22358","10.206140","172.30.1.104","172.30.1.205","TCP","66","135 > 43580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22359","10.206151","172.30.1.205","172.30.1.104","TCP","54","43580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22360","10.206512","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22361","10.206834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22362","10.206843","172.30.1.205","172.30.1.104","TCP","54","43580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22363","10.209035","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22364","10.209473","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22365","10.209482","172.30.1.205","172.30.1.104","TCP","54","43580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22366","10.211363","172.30.1.205","172.30.1.104","TCP","54","43580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22367","10.211489","172.30.1.205","172.30.1.104","TCP","74","36218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913437 TSecr=0 WS=128" +"22368","10.211639","172.30.1.104","172.30.1.205","TCP","54","135 > 43580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22369","10.211693","172.30.1.104","172.30.1.205","TCP","54","135 > 43580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22370","10.211699","172.30.1.205","172.30.1.104","TCP","54","43580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22371","10.211772","172.30.1.104","172.30.1.205","TCP","66","49671 > 36218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22372","10.211786","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22373","10.212132","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22374","10.212469","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22375","10.212478","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22376","10.214374","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22377","10.214749","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22378","10.214755","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22379","10.216118","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22380","10.218253","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22381","10.218262","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22382","10.219213","172.30.1.205","172.30.1.104","TCP","74","43584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913445 TSecr=0 WS=128" +"22383","10.219539","172.30.1.104","172.30.1.205","TCP","66","135 > 43584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22384","10.219556","172.30.1.205","172.30.1.104","TCP","54","43584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22385","10.219904","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22386","10.220210","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22387","10.220219","172.30.1.205","172.30.1.104","TCP","54","43584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22388","10.222445","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22389","10.222857","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22390","10.222864","172.30.1.205","172.30.1.104","TCP","54","43584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22391","10.224678","172.30.1.205","172.30.1.104","TCP","54","43584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22392","10.224809","172.30.1.205","172.30.1.104","TCP","74","36222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913451 TSecr=0 WS=128" +"22393","10.224941","172.30.1.104","172.30.1.205","TCP","54","135 > 43584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22394","10.224955","172.30.1.104","172.30.1.205","TCP","54","135 > 43584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22395","10.224960","172.30.1.205","172.30.1.104","TCP","54","43584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22396","10.225090","172.30.1.104","172.30.1.205","TCP","66","49671 > 36222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22397","10.225098","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22398","10.225448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22399","10.225733","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22400","10.225742","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22401","10.227633","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22402","10.228025","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22403","10.228031","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22404","10.229418","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22405","10.231703","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22406","10.231713","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22407","10.232646","172.30.1.205","172.30.1.104","TCP","74","43588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913459 TSecr=0 WS=128" +"22408","10.232971","172.30.1.104","172.30.1.205","TCP","66","135 > 43588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22409","10.232983","172.30.1.205","172.30.1.104","TCP","54","43588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22410","10.233345","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22411","10.233644","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22412","10.233654","172.30.1.205","172.30.1.104","TCP","54","43588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22413","10.235840","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22414","10.236251","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22415","10.236258","172.30.1.205","172.30.1.104","TCP","54","43588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22416","10.238095","172.30.1.205","172.30.1.104","TCP","54","43588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22417","10.238205","172.30.1.205","172.30.1.104","TCP","74","36226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913464 TSecr=0 WS=128" +"22418","10.238359","172.30.1.104","172.30.1.205","TCP","54","135 > 43588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22419","10.238375","172.30.1.104","172.30.1.205","TCP","54","135 > 43588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22420","10.238380","172.30.1.205","172.30.1.104","TCP","54","43588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22421","10.238478","172.30.1.104","172.30.1.205","TCP","66","49671 > 36226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22422","10.238486","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22423","10.238837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22424","10.239958","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22425","10.239966","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22426","10.241920","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22427","10.242326","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22428","10.242330","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22429","10.243745","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22430","10.245981","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22431","10.245990","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22432","10.246949","172.30.1.205","172.30.1.104","TCP","74","43592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913473 TSecr=0 WS=128" +"22433","10.247281","172.30.1.104","172.30.1.205","TCP","66","135 > 43592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22434","10.247292","172.30.1.205","172.30.1.104","TCP","54","43592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22435","10.247681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22436","10.247970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22437","10.247979","172.30.1.205","172.30.1.104","TCP","54","43592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22438","10.250188","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22439","10.250590","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22440","10.250596","172.30.1.205","172.30.1.104","TCP","54","43592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22441","10.252419","172.30.1.205","172.30.1.104","TCP","54","43592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22442","10.252529","172.30.1.205","172.30.1.104","TCP","74","36230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913478 TSecr=0 WS=128" +"22443","10.252690","172.30.1.104","172.30.1.205","TCP","54","135 > 43592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22444","10.252721","172.30.1.104","172.30.1.205","TCP","54","135 > 43592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22445","10.252727","172.30.1.205","172.30.1.104","TCP","54","43592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22446","10.252826","172.30.1.104","172.30.1.205","TCP","66","49671 > 36230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22447","10.252835","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22448","10.253205","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22449","10.253498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22450","10.253507","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22451","10.255408","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22452","10.255769","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22453","10.255773","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22454","10.257192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22455","10.259305","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22456","10.259316","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22457","10.260260","172.30.1.205","172.30.1.104","TCP","74","43596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913486 TSecr=0 WS=128" +"22458","10.260599","172.30.1.104","172.30.1.205","TCP","66","135 > 43596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22459","10.260609","172.30.1.205","172.30.1.104","TCP","54","43596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22460","10.260987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22461","10.261279","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22462","10.261287","172.30.1.205","172.30.1.104","TCP","54","43596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22463","10.263477","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22464","10.263859","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22465","10.263866","172.30.1.205","172.30.1.104","TCP","54","43596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22466","10.265725","172.30.1.205","172.30.1.104","TCP","54","43596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22467","10.265836","172.30.1.205","172.30.1.104","TCP","74","36234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913492 TSecr=0 WS=128" +"22468","10.266014","172.30.1.104","172.30.1.205","TCP","54","135 > 43596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22469","10.266035","172.30.1.104","172.30.1.205","TCP","54","135 > 43596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22470","10.266046","172.30.1.205","172.30.1.104","TCP","54","43596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22471","10.266121","172.30.1.104","172.30.1.205","TCP","66","49671 > 36234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22472","10.266129","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22473","10.266475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22474","10.266757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22475","10.266772","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22476","10.268636","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22477","10.268996","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22478","10.269003","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22479","10.270394","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22480","10.272439","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22481","10.272448","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22482","10.273419","172.30.1.205","172.30.1.104","TCP","74","43600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913499 TSecr=0 WS=128" +"22483","10.273722","172.30.1.104","172.30.1.205","TCP","66","135 > 43600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22484","10.273732","172.30.1.205","172.30.1.104","TCP","54","43600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22485","10.274078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22486","10.274395","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22487","10.274404","172.30.1.205","172.30.1.104","TCP","54","43600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22488","10.276593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22489","10.277000","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22490","10.277008","172.30.1.205","172.30.1.104","TCP","54","43600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22491","10.278834","172.30.1.205","172.30.1.104","TCP","54","43600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22492","10.278955","172.30.1.205","172.30.1.104","TCP","74","36238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913505 TSecr=0 WS=128" +"22493","10.279084","172.30.1.104","172.30.1.205","TCP","54","135 > 43600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22494","10.279139","172.30.1.104","172.30.1.205","TCP","54","135 > 43600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22495","10.279145","172.30.1.205","172.30.1.104","TCP","54","43600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22496","10.279234","172.30.1.104","172.30.1.205","TCP","66","49671 > 36238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22497","10.279242","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22498","10.279587","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22499","10.279867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22500","10.279881","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22501","10.281799","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22502","10.282163","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22503","10.282170","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22504","10.283520","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22505","10.285751","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22506","10.285762","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22507","10.286741","172.30.1.205","172.30.1.104","TCP","74","43604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913513 TSecr=0 WS=128" +"22508","10.287077","172.30.1.104","172.30.1.205","TCP","66","135 > 43604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22509","10.287088","172.30.1.205","172.30.1.104","TCP","54","43604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22510","10.287435","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22511","10.287756","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22512","10.287768","172.30.1.205","172.30.1.104","TCP","54","43604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22513","10.290009","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22514","10.290442","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22515","10.290448","172.30.1.205","172.30.1.104","TCP","54","43604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22516","10.292258","172.30.1.205","172.30.1.104","TCP","54","43604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22517","10.292369","172.30.1.205","172.30.1.104","TCP","74","36242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913518 TSecr=0 WS=128" +"22518","10.292535","172.30.1.104","172.30.1.205","TCP","54","135 > 43604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22519","10.292546","172.30.1.104","172.30.1.205","TCP","54","135 > 43604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22520","10.292551","172.30.1.205","172.30.1.104","TCP","54","43604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22521","10.292697","172.30.1.104","172.30.1.205","TCP","66","49671 > 36242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22522","10.292705","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22523","10.293075","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22524","10.293363","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22525","10.293372","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22526","10.295242","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22527","10.295632","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22528","10.295638","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22529","10.297023","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22530","10.299130","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22531","10.299141","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22532","10.300069","172.30.1.205","172.30.1.104","TCP","74","43608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913526 TSecr=0 WS=128" +"22533","10.300406","172.30.1.104","172.30.1.205","TCP","66","135 > 43608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22534","10.300417","172.30.1.205","172.30.1.104","TCP","54","43608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22535","10.300762","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22536","10.301045","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22537","10.301054","172.30.1.205","172.30.1.104","TCP","54","43608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22538","10.303223","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22539","10.303600","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22540","10.303607","172.30.1.205","172.30.1.104","TCP","54","43608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22541","10.305433","172.30.1.205","172.30.1.104","TCP","54","43608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22542","10.305546","172.30.1.205","172.30.1.104","TCP","74","36246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913531 TSecr=0 WS=128" +"22543","10.305711","172.30.1.104","172.30.1.205","TCP","54","135 > 43608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22544","10.305720","172.30.1.104","172.30.1.205","TCP","54","135 > 43608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22545","10.305725","172.30.1.205","172.30.1.104","TCP","54","43608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22546","10.305815","172.30.1.104","172.30.1.205","TCP","66","49671 > 36246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22547","10.305823","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22548","10.306167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22549","10.306667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22550","10.306674","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22551","10.308521","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22552","10.308876","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22553","10.308883","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22554","10.310235","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22555","10.312312","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22556","10.312322","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22557","10.313286","172.30.1.205","172.30.1.104","TCP","74","43612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913539 TSecr=0 WS=128" +"22558","10.313589","172.30.1.104","172.30.1.205","TCP","66","135 > 43612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22559","10.313600","172.30.1.205","172.30.1.104","TCP","54","43612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22560","10.313946","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22561","10.314223","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22562","10.314231","172.30.1.205","172.30.1.104","TCP","54","43612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22563","10.316397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22564","10.316823","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22565","10.316830","172.30.1.205","172.30.1.104","TCP","54","43612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22566","10.318645","172.30.1.205","172.30.1.104","TCP","54","43612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22567","10.318756","172.30.1.205","172.30.1.104","TCP","74","36250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913545 TSecr=0 WS=128" +"22568","10.318999","172.30.1.104","172.30.1.205","TCP","54","135 > 43612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22569","10.319087","172.30.1.104","172.30.1.205","TCP","66","49671 > 36250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22570","10.319096","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22571","10.319102","172.30.1.104","172.30.1.205","TCP","54","135 > 43612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22572","10.319105","172.30.1.205","172.30.1.104","TCP","54","43612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22573","10.319451","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22574","10.319770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22575","10.319779","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22576","10.321679","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22577","10.322034","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22578","10.322040","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22579","10.323377","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22580","10.325511","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22581","10.325520","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22582","10.326456","172.30.1.205","172.30.1.104","TCP","74","43616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913552 TSecr=0 WS=128" +"22583","10.326746","172.30.1.104","172.30.1.205","TCP","66","135 > 43616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22584","10.326757","172.30.1.205","172.30.1.104","TCP","54","43616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22585","10.327112","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22586","10.327476","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22587","10.327484","172.30.1.205","172.30.1.104","TCP","54","43616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22588","10.329694","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22589","10.330067","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22590","10.330074","172.30.1.205","172.30.1.104","TCP","54","43616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22591","10.331876","172.30.1.205","172.30.1.104","TCP","54","43616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22592","10.331985","172.30.1.205","172.30.1.104","TCP","74","36254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913558 TSecr=0 WS=128" +"22593","10.332185","172.30.1.104","172.30.1.205","TCP","54","135 > 43616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22594","10.332196","172.30.1.104","172.30.1.205","TCP","54","135 > 43616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22595","10.332201","172.30.1.205","172.30.1.104","TCP","54","43616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22596","10.332315","172.30.1.104","172.30.1.205","TCP","66","49671 > 36254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22597","10.332326","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22598","10.332682","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22599","10.334468","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22600","10.334478","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22601","10.336359","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22602","10.336763","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22603","10.336769","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22604","10.338146","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22605","10.340295","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22606","10.340305","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22607","10.341259","172.30.1.205","172.30.1.104","TCP","74","43620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913567 TSecr=0 WS=128" +"22608","10.341566","172.30.1.104","172.30.1.205","TCP","66","135 > 43620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22609","10.341576","172.30.1.205","172.30.1.104","TCP","54","43620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22610","10.341928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22611","10.342221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22612","10.342230","172.30.1.205","172.30.1.104","TCP","54","43620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22613","10.344408","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22614","10.344815","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22615","10.344821","172.30.1.205","172.30.1.104","TCP","54","43620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22616","10.346630","172.30.1.205","172.30.1.104","TCP","54","43620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22617","10.346740","172.30.1.205","172.30.1.104","TCP","74","36258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913573 TSecr=0 WS=128" +"22618","10.346878","172.30.1.104","172.30.1.205","TCP","54","135 > 43620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22619","10.346888","172.30.1.104","172.30.1.205","TCP","54","135 > 43620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22620","10.346893","172.30.1.205","172.30.1.104","TCP","54","43620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22621","10.347001","172.30.1.104","172.30.1.205","TCP","66","49671 > 36258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22622","10.347009","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22623","10.347369","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22624","10.348581","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22625","10.348589","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22626","10.350474","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22627","10.350887","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22628","10.350894","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22629","10.352234","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22630","10.354507","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22631","10.354517","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22632","10.355452","172.30.1.205","172.30.1.104","TCP","74","43624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913581 TSecr=0 WS=128" +"22633","10.355741","172.30.1.104","172.30.1.205","TCP","66","135 > 43624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22634","10.355752","172.30.1.205","172.30.1.104","TCP","54","43624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22635","10.356106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22636","10.356399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22637","10.356408","172.30.1.205","172.30.1.104","TCP","54","43624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22638","10.358608","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22639","10.359029","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22640","10.359035","172.30.1.205","172.30.1.104","TCP","54","43624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22641","10.359876","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22642","10.359925","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22643","10.359958","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22644","10.359986","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22645","10.360013","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22646","10.360040","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22647","10.360068","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22648","10.360096","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22649","10.360126","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22650","10.360149","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22651","10.360176","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22652","10.360184","172.30.1.104","172.30.1.205","TCP","54","49671 > 36218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22653","10.360268","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22654","10.360328","172.30.1.104","172.30.1.205","TCP","54","49671 > 36222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22655","10.360364","172.30.1.104","172.30.1.205","TCP","54","49671 > 36218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22656","10.360371","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22657","10.360393","172.30.1.104","172.30.1.205","TCP","54","49671 > 36230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22658","10.360420","172.30.1.104","172.30.1.205","TCP","54","49671 > 36226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22659","10.360448","172.30.1.104","172.30.1.205","TCP","54","49671 > 36234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22660","10.360474","172.30.1.104","172.30.1.205","TCP","54","49671 > 36230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22661","10.360479","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22662","10.360500","172.30.1.104","172.30.1.205","TCP","54","49671 > 36238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22663","10.360527","172.30.1.104","172.30.1.205","TCP","54","49671 > 36226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22664","10.360530","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22665","10.360562","172.30.1.104","172.30.1.205","TCP","54","49671 > 36242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22666","10.360599","172.30.1.104","172.30.1.205","TCP","54","49671 > 36242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22667","10.360604","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22668","10.360633","172.30.1.104","172.30.1.205","TCP","54","49671 > 36238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22669","10.360637","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22670","10.360716","172.30.1.104","172.30.1.205","TCP","54","49671 > 36234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22671","10.360720","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22672","10.360722","172.30.1.104","172.30.1.205","TCP","54","49671 > 36246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22673","10.360727","172.30.1.104","172.30.1.205","TCP","54","49671 > 36250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22674","10.360753","172.30.1.104","172.30.1.205","TCP","54","49671 > 36254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22675","10.360790","172.30.1.104","172.30.1.205","TCP","54","49671 > 36254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22676","10.360796","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22677","10.360809","172.30.1.104","172.30.1.205","TCP","54","49671 > 36250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22678","10.360812","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22679","10.360847","172.30.1.104","172.30.1.205","TCP","54","49671 > 36246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22680","10.360850","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22681","10.361245","172.30.1.104","172.30.1.205","TCP","54","49671 > 36258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22682","10.361270","172.30.1.104","172.30.1.205","TCP","54","49671 > 36214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22683","10.361299","172.30.1.104","172.30.1.205","TCP","54","49671 > 36214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22684","10.361304","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22685","10.361328","172.30.1.104","172.30.1.205","TCP","54","49671 > 36258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22686","10.361331","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22687","10.361410","172.30.1.104","172.30.1.205","TCP","54","49671 > 36222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"22688","10.361415","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"22689","10.361876","172.30.1.205","172.30.1.104","TCP","54","43624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22690","10.361990","172.30.1.205","172.30.1.104","TCP","74","36262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913588 TSecr=0 WS=128" +"22691","10.362150","172.30.1.104","172.30.1.205","TCP","54","135 > 43624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22692","10.362188","172.30.1.104","172.30.1.205","TCP","54","135 > 43624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22693","10.362193","172.30.1.205","172.30.1.104","TCP","54","43624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22694","10.362284","172.30.1.104","172.30.1.205","TCP","66","49671 > 36262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22695","10.362293","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22696","10.362669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22697","10.363078","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22698","10.363087","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22699","10.364993","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22700","10.365395","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22701","10.365402","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22702","10.366754","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22703","10.368849","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22704","10.368859","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22705","10.369809","172.30.1.205","172.30.1.104","TCP","74","43628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913596 TSecr=0 WS=128" +"22706","10.370147","172.30.1.104","172.30.1.205","TCP","66","135 > 43628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22707","10.370158","172.30.1.205","172.30.1.104","TCP","54","43628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22708","10.370520","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22709","10.370825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22710","10.370833","172.30.1.205","172.30.1.104","TCP","54","43628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22711","10.373031","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22712","10.373440","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22713","10.373446","172.30.1.205","172.30.1.104","TCP","54","43628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22714","10.375245","172.30.1.205","172.30.1.104","TCP","54","43628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22715","10.375356","172.30.1.205","172.30.1.104","TCP","74","36266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913601 TSecr=0 WS=128" +"22716","10.375528","172.30.1.104","172.30.1.205","TCP","54","135 > 43628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22717","10.375550","172.30.1.104","172.30.1.205","TCP","54","135 > 43628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22718","10.375555","172.30.1.205","172.30.1.104","TCP","54","43628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22719","10.375666","172.30.1.104","172.30.1.205","TCP","66","49671 > 36266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22720","10.375674","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22721","10.376016","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22722","10.376316","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22723","10.376324","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22724","10.378206","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22725","10.378623","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22726","10.378629","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22727","10.379967","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22728","10.382118","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22729","10.382129","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22730","10.383098","172.30.1.205","172.30.1.104","TCP","74","43632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913609 TSecr=0 WS=128" +"22731","10.383427","172.30.1.104","172.30.1.205","TCP","66","135 > 43632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22732","10.383438","172.30.1.205","172.30.1.104","TCP","54","43632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22733","10.383784","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22734","10.384137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22735","10.384145","172.30.1.205","172.30.1.104","TCP","54","43632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22736","10.386378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22737","10.386867","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22738","10.386874","172.30.1.205","172.30.1.104","TCP","54","43632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22739","10.388686","172.30.1.205","172.30.1.104","TCP","54","43632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22740","10.388825","172.30.1.205","172.30.1.104","TCP","74","36270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913615 TSecr=0 WS=128" +"22741","10.389000","172.30.1.104","172.30.1.205","TCP","54","135 > 43632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22742","10.389054","172.30.1.104","172.30.1.205","TCP","54","135 > 43632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22743","10.389060","172.30.1.205","172.30.1.104","TCP","54","43632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22744","10.389103","172.30.1.104","172.30.1.205","TCP","66","49671 > 36270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22745","10.389111","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22746","10.389460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22747","10.389794","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22748","10.389801","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22749","10.391656","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22750","10.392083","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22751","10.392093","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22752","10.393565","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22753","10.395645","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22754","10.395656","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22755","10.396632","172.30.1.205","172.30.1.104","TCP","74","43636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913623 TSecr=0 WS=128" +"22756","10.396937","172.30.1.104","172.30.1.205","TCP","66","135 > 43636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22757","10.396949","172.30.1.205","172.30.1.104","TCP","54","43636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22758","10.397310","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22759","10.397608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22760","10.397619","172.30.1.205","172.30.1.104","TCP","54","43636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22761","10.399815","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22762","10.400443","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22763","10.400450","172.30.1.205","172.30.1.104","TCP","54","43636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22764","10.402281","172.30.1.205","172.30.1.104","TCP","54","43636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22765","10.402393","172.30.1.205","172.30.1.104","TCP","74","36274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913628 TSecr=0 WS=128" +"22766","10.402688","172.30.1.104","172.30.1.205","TCP","54","135 > 43636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22767","10.402697","172.30.1.104","172.30.1.205","TCP","54","135 > 43636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22768","10.402703","172.30.1.205","172.30.1.104","TCP","54","43636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22769","10.402708","172.30.1.104","172.30.1.205","TCP","66","49671 > 36274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22770","10.402715","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22771","10.403074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22772","10.403443","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22773","10.403452","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22774","10.405367","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22775","10.405814","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22776","10.405822","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22777","10.407195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22778","10.409488","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22779","10.409503","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22780","10.410531","172.30.1.205","172.30.1.104","TCP","74","43640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913636 TSecr=0 WS=128" +"22781","10.410892","172.30.1.104","172.30.1.205","TCP","66","135 > 43640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22782","10.410905","172.30.1.205","172.30.1.104","TCP","54","43640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22783","10.411261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22784","10.411614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22785","10.411623","172.30.1.205","172.30.1.104","TCP","54","43640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22786","10.413831","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22787","10.414296","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22788","10.414306","172.30.1.205","172.30.1.104","TCP","54","43640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22789","10.416223","172.30.1.205","172.30.1.104","TCP","54","43640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22790","10.416340","172.30.1.205","172.30.1.104","TCP","74","36278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913642 TSecr=0 WS=128" +"22791","10.416558","172.30.1.104","172.30.1.205","TCP","54","135 > 43640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22792","10.416586","172.30.1.104","172.30.1.205","TCP","54","135 > 43640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22793","10.416592","172.30.1.205","172.30.1.104","TCP","54","43640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22794","10.416693","172.30.1.104","172.30.1.205","TCP","66","49671 > 36278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22795","10.416702","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22796","10.417085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22797","10.418073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22798","10.418083","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22799","10.419969","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22800","10.420380","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22801","10.420387","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22802","10.421765","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22803","10.423901","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22804","10.423911","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22805","10.424865","172.30.1.205","172.30.1.104","TCP","74","43644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913651 TSecr=0 WS=128" +"22806","10.425194","172.30.1.104","172.30.1.205","TCP","66","135 > 43644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22807","10.425205","172.30.1.205","172.30.1.104","TCP","54","43644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22808","10.425563","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22809","10.425926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22810","10.425935","172.30.1.205","172.30.1.104","TCP","54","43644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22811","10.428109","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22812","10.428582","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22813","10.428588","172.30.1.205","172.30.1.104","TCP","54","43644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22814","10.430420","172.30.1.205","172.30.1.104","TCP","54","43644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22815","10.430533","172.30.1.205","172.30.1.104","TCP","74","36282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913656 TSecr=0 WS=128" +"22816","10.430726","172.30.1.104","172.30.1.205","TCP","54","135 > 43644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22817","10.430804","172.30.1.104","172.30.1.205","TCP","54","135 > 43644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22818","10.430810","172.30.1.205","172.30.1.104","TCP","54","43644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22819","10.430861","172.30.1.104","172.30.1.205","TCP","66","49671 > 36282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22820","10.430870","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22821","10.431212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22822","10.433717","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22823","10.433725","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22824","10.435609","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22825","10.438243","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22826","10.438250","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22827","10.439616","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22828","10.441816","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22829","10.441826","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22830","10.442792","172.30.1.205","172.30.1.104","TCP","74","43648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913669 TSecr=0 WS=128" +"22831","10.443141","172.30.1.104","172.30.1.205","TCP","66","135 > 43648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22832","10.443152","172.30.1.205","172.30.1.104","TCP","54","43648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22833","10.443500","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22834","10.443831","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22835","10.443840","172.30.1.205","172.30.1.104","TCP","54","43648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22836","10.446056","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22837","10.446532","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22838","10.446538","172.30.1.205","172.30.1.104","TCP","54","43648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22839","10.448344","172.30.1.205","172.30.1.104","TCP","54","43648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22840","10.448456","172.30.1.205","172.30.1.104","TCP","74","36286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913674 TSecr=0 WS=128" +"22841","10.448676","172.30.1.104","172.30.1.205","TCP","54","135 > 43648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22842","10.448722","172.30.1.104","172.30.1.205","TCP","54","135 > 43648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22843","10.448728","172.30.1.205","172.30.1.104","TCP","54","43648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22844","10.448830","172.30.1.104","172.30.1.205","TCP","66","49671 > 36286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22845","10.448840","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22846","10.449189","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22847","10.449547","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22848","10.449555","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22849","10.451428","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22850","10.451890","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22851","10.451896","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22852","10.453279","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22853","10.455977","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22854","10.455988","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22855","10.457011","172.30.1.205","172.30.1.104","TCP","74","43652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913683 TSecr=0 WS=128" +"22856","10.457407","172.30.1.104","172.30.1.205","TCP","66","135 > 43652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22857","10.457420","172.30.1.205","172.30.1.104","TCP","54","43652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22858","10.457807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22859","10.458141","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22860","10.458150","172.30.1.205","172.30.1.104","TCP","54","43652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22861","10.460353","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22862","10.460821","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22863","10.460828","172.30.1.205","172.30.1.104","TCP","54","43652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22864","10.462636","172.30.1.205","172.30.1.104","TCP","54","43652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22865","10.462747","172.30.1.205","172.30.1.104","TCP","74","36290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913689 TSecr=0 WS=128" +"22866","10.462936","172.30.1.104","172.30.1.205","TCP","54","135 > 43652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22867","10.463010","172.30.1.104","172.30.1.205","TCP","54","135 > 43652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22868","10.463015","172.30.1.205","172.30.1.104","TCP","54","43652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22869","10.463106","172.30.1.104","172.30.1.205","TCP","66","49671 > 36290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22870","10.463114","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22871","10.463474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22872","10.463808","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22873","10.463816","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22874","10.465707","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22875","10.466127","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22876","10.466134","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22877","10.467484","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22878","10.469696","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22879","10.469706","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22880","10.470648","172.30.1.205","172.30.1.104","TCP","74","43656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913697 TSecr=0 WS=128" +"22881","10.470989","172.30.1.104","172.30.1.205","TCP","66","135 > 43656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22882","10.470999","172.30.1.205","172.30.1.104","TCP","54","43656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22883","10.471348","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22884","10.471697","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22885","10.471706","172.30.1.205","172.30.1.104","TCP","54","43656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22886","10.473927","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22887","10.474367","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22888","10.474373","172.30.1.205","172.30.1.104","TCP","54","43656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22889","10.476178","172.30.1.205","172.30.1.104","TCP","54","43656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22890","10.476288","172.30.1.205","172.30.1.104","TCP","74","36294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913702 TSecr=0 WS=128" +"22891","10.476492","172.30.1.104","172.30.1.205","TCP","54","135 > 43656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22892","10.476519","172.30.1.104","172.30.1.205","TCP","54","135 > 43656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22893","10.476524","172.30.1.205","172.30.1.104","TCP","54","43656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22894","10.476642","172.30.1.104","172.30.1.205","TCP","66","49671 > 36294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22895","10.476650","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22896","10.477023","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22897","10.480783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22898","10.480803","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22899","10.482745","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22900","10.483202","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22901","10.483209","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22902","10.484573","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22903","10.486807","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22904","10.486818","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22905","10.487775","172.30.1.205","172.30.1.104","TCP","74","43660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913714 TSecr=0 WS=128" +"22906","10.488125","172.30.1.104","172.30.1.205","TCP","66","135 > 43660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22907","10.488137","172.30.1.205","172.30.1.104","TCP","54","43660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22908","10.488501","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22909","10.488808","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22910","10.488818","172.30.1.205","172.30.1.104","TCP","54","43660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22911","10.491012","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22912","10.491457","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22913","10.491464","172.30.1.205","172.30.1.104","TCP","54","43660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22914","10.493304","172.30.1.205","172.30.1.104","TCP","54","43660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22915","10.493418","172.30.1.205","172.30.1.104","TCP","74","36298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913719 TSecr=0 WS=128" +"22916","10.493561","172.30.1.104","172.30.1.205","TCP","54","135 > 43660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22917","10.493597","172.30.1.104","172.30.1.205","TCP","54","135 > 43660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22918","10.493603","172.30.1.205","172.30.1.104","TCP","54","43660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22919","10.493678","172.30.1.104","172.30.1.205","TCP","66","49671 > 36298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22920","10.493687","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22921","10.494032","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22922","10.494328","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22923","10.494337","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22924","10.496222","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22925","10.496596","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22926","10.496603","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22927","10.497976","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22928","10.500783","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22929","10.500792","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22930","10.501748","172.30.1.205","172.30.1.104","TCP","74","43664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913728 TSecr=0 WS=128" +"22931","10.502109","172.30.1.104","172.30.1.205","TCP","66","135 > 43664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22932","10.502120","172.30.1.205","172.30.1.104","TCP","54","43664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22933","10.502471","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22934","10.502774","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22935","10.502783","172.30.1.205","172.30.1.104","TCP","54","43664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22936","10.505006","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22937","10.505417","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22938","10.505423","172.30.1.205","172.30.1.104","TCP","54","43664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22939","10.507236","172.30.1.205","172.30.1.104","TCP","54","43664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22940","10.507350","172.30.1.205","172.30.1.104","TCP","74","36302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913733 TSecr=0 WS=128" +"22941","10.507524","172.30.1.104","172.30.1.205","TCP","54","135 > 43664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22942","10.507565","172.30.1.104","172.30.1.205","TCP","54","135 > 43664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22943","10.507570","172.30.1.205","172.30.1.104","TCP","54","43664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22944","10.507611","172.30.1.104","172.30.1.205","TCP","66","49671 > 36302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22945","10.507619","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22946","10.507965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22947","10.509325","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22948","10.509334","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22949","10.511263","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22950","10.511638","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22951","10.511645","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22952","10.513043","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22953","10.515137","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22954","10.515149","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22955","10.516140","172.30.1.205","172.30.1.104","TCP","74","43668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913742 TSecr=0 WS=128" +"22956","10.516446","172.30.1.104","172.30.1.205","TCP","66","135 > 43668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22957","10.516458","172.30.1.205","172.30.1.104","TCP","54","43668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22958","10.516838","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22959","10.517155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22960","10.517164","172.30.1.205","172.30.1.104","TCP","54","43668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22961","10.519427","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22962","10.519867","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22963","10.519880","172.30.1.205","172.30.1.104","TCP","54","43668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22964","10.521801","172.30.1.205","172.30.1.104","TCP","54","43668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22965","10.521933","172.30.1.205","172.30.1.104","TCP","74","36306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913748 TSecr=0 WS=128" +"22966","10.522089","172.30.1.104","172.30.1.205","TCP","54","135 > 43668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22967","10.522134","172.30.1.104","172.30.1.205","TCP","54","135 > 43668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"22968","10.522141","172.30.1.205","172.30.1.104","TCP","54","43668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"22969","10.522242","172.30.1.104","172.30.1.205","TCP","66","49671 > 36306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22970","10.522251","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22971","10.522596","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"22972","10.524731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22973","10.524739","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22974","10.526636","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"22975","10.527019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"22976","10.527025","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"22977","10.528376","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"22978","10.530521","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"22979","10.530531","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22980","10.531507","172.30.1.205","172.30.1.104","TCP","74","43672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913757 TSecr=0 WS=128" +"22981","10.531830","172.30.1.104","172.30.1.205","TCP","66","135 > 43672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"22982","10.531841","172.30.1.205","172.30.1.104","TCP","54","43672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"22983","10.532200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"22984","10.532534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"22985","10.532549","172.30.1.205","172.30.1.104","TCP","54","43672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"22986","10.534845","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"22987","10.535259","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"22988","10.535267","172.30.1.205","172.30.1.104","TCP","54","43672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"22989","10.536149","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22990","10.536201","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22991","10.536234","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22992","10.536269","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22993","10.536297","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22994","10.536320","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22995","10.536352","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22996","10.536378","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22997","10.536405","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22998","10.536431","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"22999","10.536458","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23000","10.536526","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23001","10.536753","172.30.1.104","172.30.1.205","TCP","54","49671 > 36266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23002","10.536789","172.30.1.104","172.30.1.205","TCP","54","49671 > 36270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23003","10.536807","172.30.1.104","172.30.1.205","TCP","54","49671 > 36266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23004","10.536814","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23005","10.536833","172.30.1.104","172.30.1.205","TCP","54","49671 > 36274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23006","10.536865","172.30.1.104","172.30.1.205","TCP","54","49671 > 36278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23007","10.536892","172.30.1.104","172.30.1.205","TCP","54","49671 > 36278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23008","10.536897","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23009","10.536918","172.30.1.104","172.30.1.205","TCP","54","49671 > 36282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23010","10.536946","172.30.1.104","172.30.1.205","TCP","54","49671 > 36282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23011","10.536950","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23012","10.536971","172.30.1.104","172.30.1.205","TCP","54","49671 > 36286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23013","10.536998","172.30.1.104","172.30.1.205","TCP","54","49671 > 36286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23014","10.537003","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23015","10.537025","172.30.1.104","172.30.1.205","TCP","54","49671 > 36290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23016","10.537052","172.30.1.104","172.30.1.205","TCP","54","49671 > 36290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23017","10.537056","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23018","10.537077","172.30.1.104","172.30.1.205","TCP","54","49671 > 36294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23019","10.537103","172.30.1.104","172.30.1.205","TCP","54","49671 > 36294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23020","10.537107","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23021","10.537130","172.30.1.104","172.30.1.205","TCP","54","49671 > 36298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23022","10.537156","172.30.1.104","172.30.1.205","TCP","54","49671 > 36302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23023","10.537183","172.30.1.104","172.30.1.205","TCP","54","49671 > 36298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23024","10.537186","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23025","10.537210","172.30.1.104","172.30.1.205","TCP","54","49671 > 36302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23026","10.537213","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23027","10.537387","172.30.1.104","172.30.1.205","TCP","54","49671 > 36306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23028","10.537414","172.30.1.104","172.30.1.205","TCP","54","49671 > 36306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23029","10.537418","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23030","10.537443","172.30.1.104","172.30.1.205","TCP","54","49671 > 36270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23031","10.537446","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23032","10.537470","172.30.1.104","172.30.1.205","TCP","54","49671 > 36274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23033","10.537473","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23034","10.537837","172.30.1.104","172.30.1.205","TCP","54","49671 > 36262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23035","10.537859","172.30.1.104","172.30.1.205","TCP","54","49671 > 36262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23036","10.537864","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23037","10.538187","172.30.1.205","172.30.1.104","TCP","54","43672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23038","10.538305","172.30.1.205","172.30.1.104","TCP","74","36310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913764 TSecr=0 WS=128" +"23039","10.538454","172.30.1.104","172.30.1.205","TCP","54","135 > 43672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23040","10.538504","172.30.1.104","172.30.1.205","TCP","54","135 > 43672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23041","10.538509","172.30.1.205","172.30.1.104","TCP","54","43672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23042","10.538609","172.30.1.104","172.30.1.205","TCP","66","49671 > 36310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23043","10.538618","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23044","10.538984","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23045","10.539303","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23046","10.539310","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23047","10.541222","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23048","10.541647","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23049","10.541653","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23050","10.543015","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23051","10.545213","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23052","10.545223","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23053","10.546190","172.30.1.205","172.30.1.104","TCP","74","43676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913772 TSecr=0 WS=128" +"23054","10.546507","172.30.1.104","172.30.1.205","TCP","66","135 > 43676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23055","10.546517","172.30.1.205","172.30.1.104","TCP","54","43676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23056","10.546875","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23057","10.547195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23058","10.547204","172.30.1.205","172.30.1.104","TCP","54","43676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23059","10.549413","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23060","10.549841","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23061","10.549848","172.30.1.205","172.30.1.104","TCP","54","43676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23062","10.551683","172.30.1.205","172.30.1.104","TCP","54","43676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23063","10.551803","172.30.1.205","172.30.1.104","TCP","74","36314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913778 TSecr=0 WS=128" +"23064","10.551957","172.30.1.104","172.30.1.205","TCP","54","135 > 43676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23065","10.552010","172.30.1.104","172.30.1.205","TCP","54","135 > 43676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23066","10.552016","172.30.1.205","172.30.1.104","TCP","54","43676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23067","10.552135","172.30.1.104","172.30.1.205","TCP","66","49671 > 36314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23068","10.552143","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23069","10.552490","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23070","10.552846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23071","10.552855","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23072","10.554749","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23073","10.555134","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23074","10.555140","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23075","10.556509","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23076","10.558681","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23077","10.558690","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23078","10.559658","172.30.1.205","172.30.1.104","TCP","74","43680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913786 TSecr=0 WS=128" +"23079","10.559958","172.30.1.104","172.30.1.205","TCP","66","135 > 43680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23080","10.559969","172.30.1.205","172.30.1.104","TCP","54","43680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23081","10.560325","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23082","10.560627","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23083","10.560635","172.30.1.205","172.30.1.104","TCP","54","43680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23084","10.562862","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23085","10.563299","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23086","10.563305","172.30.1.205","172.30.1.104","TCP","54","43680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23087","10.565152","172.30.1.205","172.30.1.104","TCP","54","43680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23088","10.565264","172.30.1.205","172.30.1.104","TCP","74","36318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913791 TSecr=0 WS=128" +"23089","10.565434","172.30.1.104","172.30.1.205","TCP","54","135 > 43680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23090","10.565474","172.30.1.104","172.30.1.205","TCP","54","135 > 43680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23091","10.565480","172.30.1.205","172.30.1.104","TCP","54","43680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23092","10.565583","172.30.1.104","172.30.1.205","TCP","66","49671 > 36318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23093","10.565591","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23094","10.565938","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23095","10.566314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23096","10.566321","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23097","10.568196","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23098","10.568636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23099","10.568643","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23100","10.570052","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23101","10.572194","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23102","10.572206","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23103","10.573256","172.30.1.205","172.30.1.104","TCP","74","43684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913799 TSecr=0 WS=128" +"23104","10.573600","172.30.1.104","172.30.1.205","TCP","66","135 > 43684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23105","10.573617","172.30.1.205","172.30.1.104","TCP","54","43684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23106","10.574032","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23107","10.574395","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23108","10.574405","172.30.1.205","172.30.1.104","TCP","54","43684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23109","10.576663","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23110","10.577066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23111","10.577073","172.30.1.205","172.30.1.104","TCP","54","43684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23112","10.578914","172.30.1.205","172.30.1.104","TCP","54","43684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23113","10.579035","172.30.1.205","172.30.1.104","TCP","74","36322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913805 TSecr=0 WS=128" +"23114","10.579202","172.30.1.104","172.30.1.205","TCP","54","135 > 43684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23115","10.579243","172.30.1.104","172.30.1.205","TCP","54","135 > 43684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23116","10.579248","172.30.1.205","172.30.1.104","TCP","54","43684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23117","10.579335","172.30.1.104","172.30.1.205","TCP","66","49671 > 36322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23118","10.579343","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23119","10.579694","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23120","10.580930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23121","10.580939","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23122","10.582848","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23123","10.583272","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23124","10.583278","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23125","10.584672","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23126","10.586899","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23127","10.586909","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23128","10.587873","172.30.1.205","172.30.1.104","TCP","74","43688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913814 TSecr=0 WS=128" +"23129","10.588238","172.30.1.104","172.30.1.205","TCP","66","135 > 43688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23130","10.588248","172.30.1.205","172.30.1.104","TCP","54","43688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23131","10.588600","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23132","10.588900","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23133","10.588909","172.30.1.205","172.30.1.104","TCP","54","43688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23134","10.591112","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23135","10.591550","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23136","10.591556","172.30.1.205","172.30.1.104","TCP","54","43688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23137","10.593399","172.30.1.205","172.30.1.104","TCP","54","43688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23138","10.593516","172.30.1.205","172.30.1.104","TCP","74","36326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913819 TSecr=0 WS=128" +"23139","10.593685","172.30.1.104","172.30.1.205","TCP","54","135 > 43688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23140","10.593713","172.30.1.104","172.30.1.205","TCP","54","135 > 43688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23141","10.593718","172.30.1.205","172.30.1.104","TCP","54","43688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23142","10.593790","172.30.1.104","172.30.1.205","TCP","66","49671 > 36326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23143","10.593798","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23144","10.594202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23145","10.594556","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23146","10.594565","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23147","10.596435","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23148","10.596848","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23149","10.596856","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23150","10.598236","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23151","10.600428","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23152","10.600437","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23153","10.601409","172.30.1.205","172.30.1.104","TCP","74","43692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913827 TSecr=0 WS=128" +"23154","10.601761","172.30.1.104","172.30.1.205","TCP","66","135 > 43692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23155","10.601771","172.30.1.205","172.30.1.104","TCP","54","43692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23156","10.602123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23157","10.602429","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23158","10.602438","172.30.1.205","172.30.1.104","TCP","54","43692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23159","10.604634","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23160","10.605066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23161","10.605074","172.30.1.205","172.30.1.104","TCP","54","43692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23162","10.606930","172.30.1.205","172.30.1.104","TCP","54","43692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23163","10.607043","172.30.1.205","172.30.1.104","TCP","74","36330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913833 TSecr=0 WS=128" +"23164","10.607226","172.30.1.104","172.30.1.205","TCP","54","135 > 43692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23165","10.607293","172.30.1.104","172.30.1.205","TCP","54","135 > 43692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23166","10.607299","172.30.1.205","172.30.1.104","TCP","54","43692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23167","10.607382","172.30.1.104","172.30.1.205","TCP","66","49671 > 36330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23168","10.607390","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23169","10.607737","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23170","10.608060","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23171","10.608069","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23172","10.610001","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23173","10.610395","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23174","10.610402","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23175","10.611805","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23176","10.614036","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23177","10.614046","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23178","10.615007","172.30.1.205","172.30.1.104","TCP","74","43696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913841 TSecr=0 WS=128" +"23179","10.615330","172.30.1.104","172.30.1.205","TCP","66","135 > 43696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23180","10.615343","172.30.1.205","172.30.1.104","TCP","54","43696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23181","10.615701","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23182","10.616020","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23183","10.616029","172.30.1.205","172.30.1.104","TCP","54","43696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23184","10.618253","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23185","10.618685","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23186","10.618692","172.30.1.205","172.30.1.104","TCP","54","43696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23187","10.620501","172.30.1.205","172.30.1.104","TCP","54","43696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23188","10.620613","172.30.1.205","172.30.1.104","TCP","74","36334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913847 TSecr=0 WS=128" +"23189","10.620792","172.30.1.104","172.30.1.205","TCP","54","135 > 43696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23190","10.620826","172.30.1.104","172.30.1.205","TCP","54","135 > 43696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23191","10.620832","172.30.1.205","172.30.1.104","TCP","54","43696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23192","10.620913","172.30.1.104","172.30.1.205","TCP","66","49671 > 36334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23193","10.620921","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23194","10.621274","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23195","10.621608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23196","10.621617","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23197","10.623501","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23198","10.623929","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23199","10.623935","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23200","10.625334","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23201","10.627645","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23202","10.627656","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23203","10.628618","172.30.1.205","172.30.1.104","TCP","74","43700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913855 TSecr=0 WS=128" +"23204","10.628933","172.30.1.104","172.30.1.205","TCP","66","135 > 43700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23205","10.628945","172.30.1.205","172.30.1.104","TCP","54","43700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23206","10.629307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23207","10.629649","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23208","10.629658","172.30.1.205","172.30.1.104","TCP","54","43700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23209","10.631865","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23210","10.632300","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23211","10.632306","172.30.1.205","172.30.1.104","TCP","54","43700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23212","10.634136","172.30.1.205","172.30.1.104","TCP","54","43700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23213","10.634249","172.30.1.205","172.30.1.104","TCP","74","36338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913860 TSecr=0 WS=128" +"23214","10.634412","172.30.1.104","172.30.1.205","TCP","54","135 > 43700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23215","10.634447","172.30.1.104","172.30.1.205","TCP","54","135 > 43700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23216","10.634453","172.30.1.205","172.30.1.104","TCP","54","43700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23217","10.634527","172.30.1.104","172.30.1.205","TCP","66","49671 > 36338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23218","10.634535","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23219","10.634886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23220","10.635218","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23221","10.635229","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23222","10.637291","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23223","10.637695","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23224","10.637703","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23225","10.639107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23226","10.641301","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23227","10.641311","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23228","10.642297","172.30.1.205","172.30.1.104","TCP","74","43704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913868 TSecr=0 WS=128" +"23229","10.642613","172.30.1.104","172.30.1.205","TCP","66","135 > 43704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23230","10.642625","172.30.1.205","172.30.1.104","TCP","54","43704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23231","10.642979","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23232","10.643303","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23233","10.643312","172.30.1.205","172.30.1.104","TCP","54","43704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23234","10.645528","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23235","10.645966","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23236","10.645973","172.30.1.205","172.30.1.104","TCP","54","43704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23237","10.647798","172.30.1.205","172.30.1.104","TCP","54","43704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23238","10.647911","172.30.1.205","172.30.1.104","TCP","74","36342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913874 TSecr=0 WS=128" +"23239","10.648080","172.30.1.104","172.30.1.205","TCP","54","135 > 43704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23240","10.648116","172.30.1.104","172.30.1.205","TCP","54","135 > 43704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23241","10.648122","172.30.1.205","172.30.1.104","TCP","54","43704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23242","10.648204","172.30.1.104","172.30.1.205","TCP","66","49671 > 36342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23243","10.648213","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23244","10.648560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23245","10.648867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23246","10.648876","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23247","10.650776","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23248","10.651171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23249","10.651178","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23250","10.652531","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23251","10.654717","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23252","10.654728","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23253","10.655697","172.30.1.205","172.30.1.104","TCP","74","43708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913882 TSecr=0 WS=128" +"23254","10.656023","172.30.1.104","172.30.1.205","TCP","66","135 > 43708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23255","10.656034","172.30.1.205","172.30.1.104","TCP","54","43708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23256","10.656389","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23257","10.656699","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23258","10.656710","172.30.1.205","172.30.1.104","TCP","54","43708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23259","10.658944","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23260","10.659328","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23261","10.659334","172.30.1.205","172.30.1.104","TCP","54","43708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23262","10.661175","172.30.1.205","172.30.1.104","TCP","54","43708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23263","10.661293","172.30.1.205","172.30.1.104","TCP","74","36346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913887 TSecr=0 WS=128" +"23264","10.661451","172.30.1.104","172.30.1.205","TCP","54","135 > 43708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23265","10.661491","172.30.1.104","172.30.1.205","TCP","54","135 > 43708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23266","10.661498","172.30.1.205","172.30.1.104","TCP","54","43708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23267","10.661602","172.30.1.104","172.30.1.205","TCP","66","49671 > 36346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23268","10.661611","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23269","10.661959","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23270","10.662264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23271","10.662274","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23272","10.664152","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23273","10.664532","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23274","10.664539","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23275","10.665940","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23276","10.668208","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23277","10.668218","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23278","10.669205","172.30.1.205","172.30.1.104","TCP","74","43712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913895 TSecr=0 WS=128" +"23279","10.669510","172.30.1.104","172.30.1.205","TCP","66","135 > 43712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23280","10.669521","172.30.1.205","172.30.1.104","TCP","54","43712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23281","10.669882","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23282","10.670182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23283","10.670191","172.30.1.205","172.30.1.104","TCP","54","43712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23284","10.672379","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23285","10.672808","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23286","10.672815","172.30.1.205","172.30.1.104","TCP","54","43712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23287","10.674627","172.30.1.205","172.30.1.104","TCP","54","43712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23288","10.674741","172.30.1.205","172.30.1.104","TCP","74","36350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913901 TSecr=0 WS=128" +"23289","10.674958","172.30.1.104","172.30.1.205","TCP","54","135 > 43712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23290","10.674990","172.30.1.104","172.30.1.205","TCP","54","135 > 43712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23291","10.674996","172.30.1.205","172.30.1.104","TCP","54","43712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23292","10.675047","172.30.1.104","172.30.1.205","TCP","66","49671 > 36350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23293","10.675056","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23294","10.675403","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23295","10.677884","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23296","10.677894","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23297","10.679801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23298","10.680195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23299","10.680201","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23300","10.681579","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23301","10.683918","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23302","10.683929","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23303","10.684886","172.30.1.205","172.30.1.104","TCP","74","43716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913911 TSecr=0 WS=128" +"23304","10.685226","172.30.1.104","172.30.1.205","TCP","66","135 > 43716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23305","10.685237","172.30.1.205","172.30.1.104","TCP","54","43716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23306","10.685597","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23307","10.685952","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23308","10.685962","172.30.1.205","172.30.1.104","TCP","54","43716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23309","10.688158","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23310","10.688604","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23311","10.688611","172.30.1.205","172.30.1.104","TCP","54","43716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23312","10.690448","172.30.1.205","172.30.1.104","TCP","54","43716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23313","10.690562","172.30.1.205","172.30.1.104","TCP","74","36354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913916 TSecr=0 WS=128" +"23314","10.690746","172.30.1.104","172.30.1.205","TCP","54","135 > 43716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23315","10.690782","172.30.1.104","172.30.1.205","TCP","54","135 > 43716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23316","10.690788","172.30.1.205","172.30.1.104","TCP","54","43716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23317","10.690862","172.30.1.104","172.30.1.205","TCP","66","49671 > 36354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23318","10.690871","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23319","10.691216","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23320","10.691534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23321","10.691543","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23322","10.693461","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23323","10.693844","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23324","10.693850","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23325","10.695198","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23326","10.697416","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23327","10.697426","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23328","10.698395","172.30.1.205","172.30.1.104","TCP","74","43720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913924 TSecr=0 WS=128" +"23329","10.698703","172.30.1.104","172.30.1.205","TCP","66","135 > 43720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23330","10.698714","172.30.1.205","172.30.1.104","TCP","54","43720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23331","10.699072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23332","10.699374","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23333","10.699383","172.30.1.205","172.30.1.104","TCP","54","43720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23334","10.701668","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23335","10.702118","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23336","10.702125","172.30.1.205","172.30.1.104","TCP","54","43720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23337","10.703058","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23338","10.703108","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23339","10.703145","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23340","10.703173","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23341","10.703207","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23342","10.703232","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23343","10.703260","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23344","10.703287","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23345","10.703326","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23346","10.703357","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23347","10.703383","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23348","10.703462","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23349","10.703722","172.30.1.104","172.30.1.205","TCP","54","49671 > 36314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23350","10.703758","172.30.1.104","172.30.1.205","TCP","54","49671 > 36318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23351","10.703783","172.30.1.104","172.30.1.205","TCP","54","49671 > 36314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23352","10.703790","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23353","10.703823","172.30.1.104","172.30.1.205","TCP","54","49671 > 36322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23354","10.703849","172.30.1.104","172.30.1.205","TCP","54","49671 > 36326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23355","10.703873","172.30.1.104","172.30.1.205","TCP","54","49671 > 36326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23356","10.703877","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23357","10.703928","172.30.1.104","172.30.1.205","TCP","54","49671 > 36330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23358","10.703964","172.30.1.104","172.30.1.205","TCP","54","49671 > 36334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23359","10.703998","172.30.1.104","172.30.1.205","TCP","54","49671 > 36330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23360","10.704003","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23361","10.704021","172.30.1.104","172.30.1.205","TCP","54","49671 > 36334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23362","10.704023","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23363","10.704071","172.30.1.104","172.30.1.205","TCP","54","49671 > 36338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23364","10.704097","172.30.1.104","172.30.1.205","TCP","54","49671 > 36318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23365","10.704101","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23366","10.704120","172.30.1.104","172.30.1.205","TCP","54","49671 > 36342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23367","10.704143","172.30.1.104","172.30.1.205","TCP","54","49671 > 36342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23368","10.704147","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23369","10.704171","172.30.1.104","172.30.1.205","TCP","54","49671 > 36346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23370","10.704273","172.30.1.104","172.30.1.205","TCP","54","49671 > 36322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23371","10.704278","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23372","10.704299","172.30.1.104","172.30.1.205","TCP","54","49671 > 36346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23373","10.704302","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23374","10.704323","172.30.1.104","172.30.1.205","TCP","54","49671 > 36350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23375","10.704348","172.30.1.104","172.30.1.205","TCP","54","49671 > 36350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23376","10.704351","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23377","10.704372","172.30.1.104","172.30.1.205","TCP","54","49671 > 36354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23378","10.704396","172.30.1.104","172.30.1.205","TCP","54","49671 > 36354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23379","10.704412","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23380","10.704422","172.30.1.104","172.30.1.205","TCP","54","49671 > 36338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23381","10.704424","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23382","10.704930","172.30.1.104","172.30.1.205","TCP","54","49671 > 36310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23383","10.704970","172.30.1.104","172.30.1.205","TCP","54","49671 > 36310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23384","10.704976","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23385","10.705215","172.30.1.205","172.30.1.104","TCP","54","43720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23386","10.705327","172.30.1.205","172.30.1.104","TCP","74","36358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913931 TSecr=0 WS=128" +"23387","10.705499","172.30.1.104","172.30.1.205","TCP","54","135 > 43720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23388","10.705554","172.30.1.104","172.30.1.205","TCP","54","135 > 43720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23389","10.705561","172.30.1.205","172.30.1.104","TCP","54","43720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23390","10.705630","172.30.1.104","172.30.1.205","TCP","66","49671 > 36358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23391","10.705640","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23392","10.706027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23393","10.706350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23394","10.706359","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23395","10.708246","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23396","10.708633","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23397","10.708640","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23398","10.710038","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23399","10.712312","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23400","10.712322","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23401","10.713297","172.30.1.205","172.30.1.104","TCP","74","43724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913939 TSecr=0 WS=128" +"23402","10.713610","172.30.1.104","172.30.1.205","TCP","66","135 > 43724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23403","10.713621","172.30.1.205","172.30.1.104","TCP","54","43724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23404","10.713972","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23405","10.714274","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23406","10.714283","172.30.1.205","172.30.1.104","TCP","54","43724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23407","10.716481","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23408","10.716929","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23409","10.716936","172.30.1.205","172.30.1.104","TCP","54","43724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23410","10.718730","172.30.1.205","172.30.1.104","TCP","54","43724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23411","10.718844","172.30.1.205","172.30.1.104","TCP","74","36362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913945 TSecr=0 WS=128" +"23412","10.719019","172.30.1.104","172.30.1.205","TCP","54","135 > 43724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23413","10.719053","172.30.1.104","172.30.1.205","TCP","54","135 > 43724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23414","10.719058","172.30.1.205","172.30.1.104","TCP","54","43724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23415","10.719128","172.30.1.104","172.30.1.205","TCP","66","49671 > 36362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23416","10.719136","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23417","10.719481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23418","10.719792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23419","10.719800","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23420","10.721725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23421","10.722131","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23422","10.722138","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23423","10.723484","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23424","10.725659","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23425","10.725668","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23426","10.726613","172.30.1.205","172.30.1.104","TCP","74","43728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913953 TSecr=0 WS=128" +"23427","10.726924","172.30.1.104","172.30.1.205","TCP","66","135 > 43728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23428","10.726935","172.30.1.205","172.30.1.104","TCP","54","43728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23429","10.727285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23430","10.727609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23431","10.727618","172.30.1.205","172.30.1.104","TCP","54","43728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23432","10.729839","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23433","10.730250","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23434","10.730257","172.30.1.205","172.30.1.104","TCP","54","43728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23435","10.732074","172.30.1.205","172.30.1.104","TCP","54","43728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23436","10.732191","172.30.1.205","172.30.1.104","TCP","74","36366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913958 TSecr=0 WS=128" +"23437","10.732343","172.30.1.104","172.30.1.205","TCP","54","135 > 43728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23438","10.732460","172.30.1.104","172.30.1.205","TCP","66","49671 > 36366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23439","10.732469","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23440","10.732842","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23441","10.733469","172.30.1.104","172.30.1.205","TCP","54","135 > 43728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23442","10.733476","172.30.1.205","172.30.1.104","TCP","54","43728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23443","10.733592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23444","10.733607","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23445","10.735516","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23446","10.735889","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23447","10.735895","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23448","10.737348","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23449","10.739541","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23450","10.739550","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23451","10.740495","172.30.1.205","172.30.1.104","TCP","74","43732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913966 TSecr=0 WS=128" +"23452","10.740806","172.30.1.104","172.30.1.205","TCP","66","135 > 43732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23453","10.740817","172.30.1.205","172.30.1.104","TCP","54","43732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23454","10.741174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23455","10.741464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23456","10.741473","172.30.1.205","172.30.1.104","TCP","54","43732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23457","10.743657","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23458","10.744066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23459","10.744073","172.30.1.205","172.30.1.104","TCP","54","43732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23460","10.745919","172.30.1.205","172.30.1.104","TCP","54","43732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23461","10.746034","172.30.1.205","172.30.1.104","TCP","74","36370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913972 TSecr=0 WS=128" +"23462","10.746228","172.30.1.104","172.30.1.205","TCP","54","135 > 43732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23463","10.746314","172.30.1.104","172.30.1.205","TCP","54","135 > 43732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23464","10.746321","172.30.1.205","172.30.1.104","TCP","54","43732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23465","10.746387","172.30.1.104","172.30.1.205","TCP","66","49671 > 36370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23466","10.746396","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23467","10.746747","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23468","10.748617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23469","10.748624","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23470","10.750536","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23471","10.750933","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23472","10.750939","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23473","10.752305","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23474","10.754447","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23475","10.754457","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23476","10.755425","172.30.1.205","172.30.1.104","TCP","74","43736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913981 TSecr=0 WS=128" +"23477","10.755792","172.30.1.104","172.30.1.205","TCP","66","135 > 43736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23478","10.755805","172.30.1.205","172.30.1.104","TCP","54","43736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23479","10.756167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23480","10.756486","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23481","10.756495","172.30.1.205","172.30.1.104","TCP","54","43736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23482","10.758698","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23483","10.759137","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23484","10.759144","172.30.1.205","172.30.1.104","TCP","54","43736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23485","10.760985","172.30.1.205","172.30.1.104","TCP","54","43736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23486","10.761096","172.30.1.205","172.30.1.104","TCP","74","36374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913987 TSecr=0 WS=128" +"23487","10.761285","172.30.1.104","172.30.1.205","TCP","54","135 > 43736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23488","10.761295","172.30.1.104","172.30.1.205","TCP","54","135 > 43736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23489","10.761301","172.30.1.205","172.30.1.104","TCP","54","43736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23490","10.761386","172.30.1.104","172.30.1.205","TCP","66","49671 > 36374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23491","10.761395","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23492","10.761738","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23493","10.762077","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23494","10.762086","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23495","10.763962","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23496","10.764370","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23497","10.764384","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23498","10.765759","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23499","10.768029","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23500","10.768038","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23501","10.768990","172.30.1.205","172.30.1.104","TCP","74","43740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913995 TSecr=0 WS=128" +"23502","10.769292","172.30.1.104","172.30.1.205","TCP","66","135 > 43740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23503","10.769302","172.30.1.205","172.30.1.104","TCP","54","43740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23504","10.769656","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23505","10.769982","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23506","10.769991","172.30.1.205","172.30.1.104","TCP","54","43740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23507","10.772168","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23508","10.772581","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23509","10.772588","172.30.1.205","172.30.1.104","TCP","54","43740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23510","10.774432","172.30.1.205","172.30.1.104","TCP","54","43740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23511","10.774554","172.30.1.205","172.30.1.104","TCP","74","36378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914000 TSecr=0 WS=128" +"23512","10.774707","172.30.1.104","172.30.1.205","TCP","54","135 > 43740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23513","10.774751","172.30.1.104","172.30.1.205","TCP","54","135 > 43740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23514","10.774757","172.30.1.205","172.30.1.104","TCP","54","43740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23515","10.774895","172.30.1.104","172.30.1.205","TCP","66","49671 > 36378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23516","10.774904","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23517","10.775253","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23518","10.776807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23519","10.776816","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23520","10.778708","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23521","10.781840","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23522","10.781847","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23523","10.783234","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23524","10.785510","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23525","10.785521","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23526","10.786524","172.30.1.205","172.30.1.104","TCP","74","43744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914012 TSecr=0 WS=128" +"23527","10.786840","172.30.1.104","172.30.1.205","TCP","66","135 > 43744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23528","10.786852","172.30.1.205","172.30.1.104","TCP","54","43744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23529","10.787214","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23530","10.787573","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23531","10.787582","172.30.1.205","172.30.1.104","TCP","54","43744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23532","10.789822","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23533","10.790244","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23534","10.790251","172.30.1.205","172.30.1.104","TCP","54","43744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23535","10.792076","172.30.1.205","172.30.1.104","TCP","54","43744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23536","10.792190","172.30.1.205","172.30.1.104","TCP","74","36382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914018 TSecr=0 WS=128" +"23537","10.792369","172.30.1.104","172.30.1.205","TCP","54","135 > 43744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23538","10.792412","172.30.1.104","172.30.1.205","TCP","54","135 > 43744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23539","10.792418","172.30.1.205","172.30.1.104","TCP","54","43744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23540","10.792500","172.30.1.104","172.30.1.205","TCP","66","49671 > 36382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23541","10.792509","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23542","10.792883","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23543","10.793197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23544","10.793204","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23545","10.795075","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23546","10.795479","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23547","10.795485","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23548","10.796903","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23549","10.799549","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23550","10.799558","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23551","10.800518","172.30.1.205","172.30.1.104","TCP","74","43748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914026 TSecr=0 WS=128" +"23552","10.800873","172.30.1.104","172.30.1.205","TCP","66","135 > 43748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23553","10.800885","172.30.1.205","172.30.1.104","TCP","54","43748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23554","10.801245","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23555","10.801556","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23556","10.801565","172.30.1.205","172.30.1.104","TCP","54","43748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23557","10.803758","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23558","10.804164","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23559","10.804171","172.30.1.205","172.30.1.104","TCP","54","43748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23560","10.805997","172.30.1.205","172.30.1.104","TCP","54","43748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23561","10.806108","172.30.1.205","172.30.1.104","TCP","74","36386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914032 TSecr=0 WS=128" +"23562","10.806292","172.30.1.104","172.30.1.205","TCP","54","135 > 43748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23563","10.806332","172.30.1.104","172.30.1.205","TCP","54","135 > 43748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23564","10.806337","172.30.1.205","172.30.1.104","TCP","54","43748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23565","10.806408","172.30.1.104","172.30.1.205","TCP","66","49671 > 36386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23566","10.806416","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23567","10.806767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23568","10.807073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23569","10.807082","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23570","10.808997","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23571","10.809383","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23572","10.809389","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23573","10.810743","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23574","10.813234","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23575","10.813243","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23576","10.814202","172.30.1.205","172.30.1.104","TCP","74","43752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914040 TSecr=0 WS=128" +"23577","10.814540","172.30.1.104","172.30.1.205","TCP","66","135 > 43752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23578","10.814551","172.30.1.205","172.30.1.104","TCP","54","43752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23579","10.814906","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23580","10.815237","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23581","10.815246","172.30.1.205","172.30.1.104","TCP","54","43752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23582","10.817465","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23583","10.817890","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23584","10.817897","172.30.1.205","172.30.1.104","TCP","54","43752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23585","10.819710","172.30.1.205","172.30.1.104","TCP","54","43752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23586","10.819822","172.30.1.205","172.30.1.104","TCP","74","36390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914046 TSecr=0 WS=128" +"23587","10.820031","172.30.1.104","172.30.1.205","TCP","54","135 > 43752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23588","10.820068","172.30.1.104","172.30.1.205","TCP","54","135 > 43752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23589","10.820074","172.30.1.205","172.30.1.104","TCP","54","43752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23590","10.820161","172.30.1.104","172.30.1.205","TCP","66","49671 > 36390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23591","10.820169","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23592","10.820514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23593","10.820941","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23594","10.820952","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23595","10.822926","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23596","10.823339","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23597","10.823346","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23598","10.824724","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23599","10.826860","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23600","10.826869","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23601","10.827810","172.30.1.205","172.30.1.104","TCP","74","43756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914054 TSecr=0 WS=128" +"23602","10.828152","172.30.1.104","172.30.1.205","TCP","66","135 > 43756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23603","10.828164","172.30.1.205","172.30.1.104","TCP","54","43756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23604","10.828515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23605","10.828839","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23606","10.828849","172.30.1.205","172.30.1.104","TCP","54","43756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23607","10.831055","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23608","10.831476","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23609","10.831482","172.30.1.205","172.30.1.104","TCP","54","43756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23610","10.833328","172.30.1.205","172.30.1.104","TCP","54","43756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23611","10.833448","172.30.1.205","172.30.1.104","TCP","74","36394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914059 TSecr=0 WS=128" +"23612","10.833598","172.30.1.104","172.30.1.205","TCP","54","135 > 43756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23613","10.833631","172.30.1.104","172.30.1.205","TCP","54","135 > 43756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23614","10.833638","172.30.1.205","172.30.1.104","TCP","54","43756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23615","10.833738","172.30.1.104","172.30.1.205","TCP","66","49671 > 36394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23616","10.833746","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23617","10.834092","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23618","10.834391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23619","10.834400","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23620","10.836312","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23621","10.836721","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23622","10.836728","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23623","10.838117","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23624","10.840385","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23625","10.840396","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23626","10.841421","172.30.1.205","172.30.1.104","TCP","74","43760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914067 TSecr=0 WS=128" +"23627","10.841755","172.30.1.104","172.30.1.205","TCP","66","135 > 43760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23628","10.841767","172.30.1.205","172.30.1.104","TCP","54","43760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23629","10.842123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23630","10.842455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23631","10.842464","172.30.1.205","172.30.1.104","TCP","54","43760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23632","10.844683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23633","10.845144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23634","10.845152","172.30.1.205","172.30.1.104","TCP","54","43760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23635","10.847005","172.30.1.205","172.30.1.104","TCP","54","43760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23636","10.847124","172.30.1.205","172.30.1.104","TCP","74","36398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914073 TSecr=0 WS=128" +"23637","10.847303","172.30.1.104","172.30.1.205","TCP","54","135 > 43760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23638","10.847349","172.30.1.104","172.30.1.205","TCP","54","135 > 43760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23639","10.847355","172.30.1.205","172.30.1.104","TCP","54","43760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23640","10.847429","172.30.1.104","172.30.1.205","TCP","66","49671 > 36398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23641","10.847438","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23642","10.847787","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23643","10.848097","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23644","10.848106","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23645","10.850038","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23646","10.850430","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23647","10.850436","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23648","10.851781","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23649","10.854140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23650","10.854151","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23651","10.855130","172.30.1.205","172.30.1.104","TCP","74","43764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914081 TSecr=0 WS=128" +"23652","10.855516","172.30.1.104","172.30.1.205","TCP","66","135 > 43764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23653","10.855527","172.30.1.205","172.30.1.104","TCP","54","43764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23654","10.855878","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23655","10.859141","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23656","10.859155","172.30.1.205","172.30.1.104","TCP","54","43764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23657","10.861470","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23658","10.861895","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23659","10.861901","172.30.1.205","172.30.1.104","TCP","54","43764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23660","10.863751","172.30.1.205","172.30.1.104","TCP","54","43764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23661","10.863867","172.30.1.205","172.30.1.104","TCP","74","36402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914090 TSecr=0 WS=128" +"23662","10.864060","172.30.1.104","172.30.1.205","TCP","54","135 > 43764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23663","10.864098","172.30.1.104","172.30.1.205","TCP","54","135 > 43764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23664","10.864105","172.30.1.205","172.30.1.104","TCP","54","43764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23665","10.864192","172.30.1.104","172.30.1.205","TCP","66","49671 > 36402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23666","10.864205","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23667","10.864607","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23668","10.864931","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23669","10.864940","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23670","10.866845","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23671","10.867224","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23672","10.867230","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23673","10.868586","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23674","10.870810","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23675","10.870825","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23676","10.871848","172.30.1.205","172.30.1.104","TCP","74","43768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914098 TSecr=0 WS=128" +"23677","10.872153","172.30.1.104","172.30.1.205","TCP","66","135 > 43768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23678","10.872165","172.30.1.205","172.30.1.104","TCP","54","43768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23679","10.872517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23680","10.872848","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23681","10.872861","172.30.1.205","172.30.1.104","TCP","54","43768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23682","10.875104","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23683","10.875524","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23684","10.875531","172.30.1.205","172.30.1.104","TCP","54","43768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23685","10.876409","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23686","10.876458","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23687","10.876496","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23688","10.876532","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23689","10.876562","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23690","10.876589","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23691","10.876617","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23692","10.876644","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23693","10.876677","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23694","10.876709","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23695","10.876737","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23696","10.876838","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23697","10.877028","172.30.1.104","172.30.1.205","TCP","54","49671 > 36362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23698","10.877063","172.30.1.104","172.30.1.205","TCP","54","49671 > 36366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23699","10.877081","172.30.1.104","172.30.1.205","TCP","54","49671 > 36362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23700","10.877088","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23701","10.877109","172.30.1.104","172.30.1.205","TCP","54","49671 > 36370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23702","10.877171","172.30.1.104","172.30.1.205","TCP","54","49671 > 36374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23703","10.877189","172.30.1.104","172.30.1.205","TCP","54","49671 > 36374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23704","10.877194","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23705","10.877209","172.30.1.104","172.30.1.205","TCP","54","49671 > 36378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23706","10.877231","172.30.1.104","172.30.1.205","TCP","54","49671 > 36378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23707","10.877234","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23708","10.877277","172.30.1.104","172.30.1.205","TCP","54","49671 > 36366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23709","10.877281","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23710","10.877295","172.30.1.104","172.30.1.205","TCP","54","49671 > 36382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23711","10.877314","172.30.1.104","172.30.1.205","TCP","54","49671 > 36370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23712","10.877318","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23713","10.877386","172.30.1.104","172.30.1.205","TCP","54","49671 > 36382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23714","10.877391","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23715","10.877403","172.30.1.104","172.30.1.205","TCP","54","49671 > 36386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23716","10.877447","172.30.1.104","172.30.1.205","TCP","54","49671 > 36390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23717","10.877479","172.30.1.104","172.30.1.205","TCP","54","49671 > 36394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23718","10.877497","172.30.1.104","172.30.1.205","TCP","54","49671 > 36394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23719","10.877500","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23720","10.877515","172.30.1.104","172.30.1.205","TCP","54","49671 > 36398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23721","10.877590","172.30.1.104","172.30.1.205","TCP","54","49671 > 36398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23722","10.877594","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23723","10.877910","172.30.1.104","172.30.1.205","TCP","54","49671 > 36402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23724","10.877931","172.30.1.104","172.30.1.205","TCP","54","49671 > 36402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23725","10.877936","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23726","10.877958","172.30.1.104","172.30.1.205","TCP","54","49671 > 36386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23727","10.877961","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23728","10.878006","172.30.1.104","172.30.1.205","TCP","54","49671 > 36390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23729","10.878009","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23730","10.878036","172.30.1.104","172.30.1.205","TCP","54","49671 > 36358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23731","10.878056","172.30.1.104","172.30.1.205","TCP","54","49671 > 36358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"23732","10.878060","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"23733","10.878508","172.30.1.205","172.30.1.104","TCP","54","43768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23734","10.878619","172.30.1.205","172.30.1.104","TCP","74","36406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914105 TSecr=0 WS=128" +"23735","10.878804","172.30.1.104","172.30.1.205","TCP","54","135 > 43768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23736","10.878825","172.30.1.104","172.30.1.205","TCP","54","135 > 43768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23737","10.878830","172.30.1.205","172.30.1.104","TCP","54","43768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23738","10.878939","172.30.1.104","172.30.1.205","TCP","66","49671 > 36406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23739","10.878947","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23740","10.879301","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23741","10.879633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23742","10.879644","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23743","10.881579","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23744","10.881974","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23745","10.881981","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23746","10.883335","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23747","10.885531","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23748","10.885540","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23749","10.886494","172.30.1.205","172.30.1.104","TCP","74","43772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914112 TSecr=0 WS=128" +"23750","10.886862","172.30.1.104","172.30.1.205","TCP","66","135 > 43772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23751","10.886873","172.30.1.205","172.30.1.104","TCP","54","43772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23752","10.887228","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23753","10.887567","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23754","10.887576","172.30.1.205","172.30.1.104","TCP","54","43772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23755","10.889786","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23756","10.890213","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23757","10.890220","172.30.1.205","172.30.1.104","TCP","54","43772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23758","10.892032","172.30.1.205","172.30.1.104","TCP","54","43772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23759","10.892148","172.30.1.205","172.30.1.104","TCP","74","36410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914118 TSecr=0 WS=128" +"23760","10.892328","172.30.1.104","172.30.1.205","TCP","54","135 > 43772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23761","10.892386","172.30.1.104","172.30.1.205","TCP","54","135 > 43772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23762","10.892391","172.30.1.205","172.30.1.104","TCP","54","43772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23763","10.892464","172.30.1.104","172.30.1.205","TCP","66","49671 > 36410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23764","10.892472","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23765","10.892843","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23766","10.893141","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23767","10.893150","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23768","10.895035","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23769","10.895452","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23770","10.895458","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23771","10.896840","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23772","10.899024","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23773","10.899033","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23774","10.899967","172.30.1.205","172.30.1.104","TCP","74","43776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914126 TSecr=0 WS=128" +"23775","10.900291","172.30.1.104","172.30.1.205","TCP","66","135 > 43776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23776","10.900303","172.30.1.205","172.30.1.104","TCP","54","43776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23777","10.900663","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23778","10.900966","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23779","10.900975","172.30.1.205","172.30.1.104","TCP","54","43776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23780","10.903184","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23781","10.903608","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23782","10.903615","172.30.1.205","172.30.1.104","TCP","54","43776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23783","10.905456","172.30.1.205","172.30.1.104","TCP","54","43776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23784","10.905569","172.30.1.205","172.30.1.104","TCP","74","36414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914131 TSecr=0 WS=128" +"23785","10.905766","172.30.1.104","172.30.1.205","TCP","54","135 > 43776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23786","10.905783","172.30.1.104","172.30.1.205","TCP","54","135 > 43776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23787","10.905788","172.30.1.205","172.30.1.104","TCP","54","43776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23788","10.905859","172.30.1.104","172.30.1.205","TCP","66","49671 > 36414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23789","10.905866","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23790","10.906284","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23791","10.906584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23792","10.906593","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23793","10.908491","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23794","10.908930","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23795","10.908937","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23796","10.910300","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23797","10.913637","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23798","10.913647","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23799","10.914628","172.30.1.205","172.30.1.104","TCP","74","43780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914141 TSecr=0 WS=128" +"23800","10.914933","172.30.1.104","172.30.1.205","TCP","66","135 > 43780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23801","10.914944","172.30.1.205","172.30.1.104","TCP","54","43780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23802","10.915297","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23803","10.915595","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23804","10.915604","172.30.1.205","172.30.1.104","TCP","54","43780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23805","10.917857","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23806","10.918255","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23807","10.918261","172.30.1.205","172.30.1.104","TCP","54","43780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23808","10.920117","172.30.1.205","172.30.1.104","TCP","54","43780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23809","10.920236","172.30.1.205","172.30.1.104","TCP","74","36418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914146 TSecr=0 WS=128" +"23810","10.920408","172.30.1.104","172.30.1.205","TCP","54","135 > 43780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23811","10.920466","172.30.1.104","172.30.1.205","TCP","54","135 > 43780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23812","10.920472","172.30.1.205","172.30.1.104","TCP","54","43780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23813","10.920544","172.30.1.104","172.30.1.205","TCP","66","49671 > 36418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23814","10.920553","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23815","10.920938","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23816","10.921227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23817","10.921237","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23818","10.923133","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23819","10.923511","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23820","10.923516","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23821","10.924921","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23822","10.927165","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23823","10.927176","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23824","10.928144","172.30.1.205","172.30.1.104","TCP","74","43784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914154 TSecr=0 WS=128" +"23825","10.928460","172.30.1.104","172.30.1.205","TCP","66","135 > 43784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23826","10.928470","172.30.1.205","172.30.1.104","TCP","54","43784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23827","10.928851","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23828","10.929152","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23829","10.929161","172.30.1.205","172.30.1.104","TCP","54","43784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23830","10.931350","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23831","10.931752","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23832","10.931759","172.30.1.205","172.30.1.104","TCP","54","43784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23833","10.933593","172.30.1.205","172.30.1.104","TCP","54","43784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23834","10.933710","172.30.1.205","172.30.1.104","TCP","74","36422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914160 TSecr=0 WS=128" +"23835","10.933889","172.30.1.104","172.30.1.205","TCP","54","135 > 43784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23836","10.933951","172.30.1.104","172.30.1.205","TCP","54","135 > 43784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23837","10.933956","172.30.1.205","172.30.1.104","TCP","54","43784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23838","10.934028","172.30.1.104","172.30.1.205","TCP","66","49671 > 36422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23839","10.934037","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23840","10.934388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23841","10.934682","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23842","10.934689","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23843","10.936546","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23844","10.936954","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23845","10.936961","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23846","10.938323","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23847","10.940445","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23848","10.940455","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23849","10.941415","172.30.1.205","172.30.1.104","TCP","74","43788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914167 TSecr=0 WS=128" +"23850","10.941714","172.30.1.104","172.30.1.205","TCP","66","135 > 43788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23851","10.941725","172.30.1.205","172.30.1.104","TCP","54","43788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23852","10.942075","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23853","10.942371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23854","10.942381","172.30.1.205","172.30.1.104","TCP","54","43788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23855","10.944557","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23856","10.944995","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23857","10.945002","172.30.1.205","172.30.1.104","TCP","54","43788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23858","10.946831","172.30.1.205","172.30.1.104","TCP","54","43788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23859","10.946943","172.30.1.205","172.30.1.104","TCP","74","36426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914173 TSecr=0 WS=128" +"23860","10.947115","172.30.1.104","172.30.1.205","TCP","54","135 > 43788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23861","10.947153","172.30.1.104","172.30.1.205","TCP","54","135 > 43788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23862","10.947159","172.30.1.205","172.30.1.104","TCP","54","43788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23863","10.947230","172.30.1.104","172.30.1.205","TCP","66","49671 > 36426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23864","10.947238","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23865","10.947584","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23866","10.947907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23867","10.947916","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23868","10.949829","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23869","10.950196","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23870","10.950202","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23871","10.951557","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23872","10.953707","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23873","10.953717","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23874","10.954669","172.30.1.205","172.30.1.104","TCP","74","43792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914181 TSecr=0 WS=128" +"23875","10.954977","172.30.1.104","172.30.1.205","TCP","66","135 > 43792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23876","10.954987","172.30.1.205","172.30.1.104","TCP","54","43792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23877","10.955331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23878","10.955672","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23879","10.955690","172.30.1.205","172.30.1.104","TCP","54","43792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23880","10.958009","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23881","10.958447","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23882","10.958454","172.30.1.205","172.30.1.104","TCP","54","43792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23883","10.960289","172.30.1.205","172.30.1.104","TCP","54","43792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23884","10.960414","172.30.1.205","172.30.1.104","TCP","74","36430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914186 TSecr=0 WS=128" +"23885","10.960585","172.30.1.104","172.30.1.205","TCP","54","135 > 43792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23886","10.960617","172.30.1.104","172.30.1.205","TCP","54","135 > 43792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23887","10.960622","172.30.1.205","172.30.1.104","TCP","54","43792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23888","10.960704","172.30.1.104","172.30.1.205","TCP","66","49671 > 36430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23889","10.960712","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23890","10.961086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23891","10.961394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23892","10.961405","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23893","10.963307","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23894","10.965078","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23895","10.965086","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23896","10.966475","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23897","10.968670","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23898","10.968685","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23899","10.969727","172.30.1.205","172.30.1.104","TCP","74","43796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914196 TSecr=0 WS=128" +"23900","10.970047","172.30.1.104","172.30.1.205","TCP","66","135 > 43796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23901","10.970059","172.30.1.205","172.30.1.104","TCP","54","43796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23902","10.970421","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23903","10.970743","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23904","10.970752","172.30.1.205","172.30.1.104","TCP","54","43796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23905","10.972990","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23906","10.973404","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23907","10.973410","172.30.1.205","172.30.1.104","TCP","54","43796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23908","10.975234","172.30.1.205","172.30.1.104","TCP","54","43796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23909","10.975348","172.30.1.205","172.30.1.104","TCP","74","36434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914201 TSecr=0 WS=128" +"23910","10.975521","172.30.1.104","172.30.1.205","TCP","54","135 > 43796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23911","10.975558","172.30.1.104","172.30.1.205","TCP","54","135 > 43796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23912","10.975565","172.30.1.205","172.30.1.104","TCP","54","43796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23913","10.975644","172.30.1.104","172.30.1.205","TCP","66","49671 > 36434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23914","10.975653","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23915","10.976012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23916","10.976331","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23917","10.976338","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23918","10.978232","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23919","10.978618","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23920","10.978625","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23921","10.979988","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23922","10.982409","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23923","10.982418","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23924","10.983367","172.30.1.205","172.30.1.104","TCP","74","43800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914209 TSecr=0 WS=128" +"23925","10.983677","172.30.1.104","172.30.1.205","TCP","66","135 > 43800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23926","10.983688","172.30.1.205","172.30.1.104","TCP","54","43800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23927","10.984054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23928","10.984363","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23929","10.984373","172.30.1.205","172.30.1.104","TCP","54","43800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23930","10.986611","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23931","10.987022","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23932","10.987029","172.30.1.205","172.30.1.104","TCP","54","43800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23933","10.988868","172.30.1.205","172.30.1.104","TCP","54","43800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23934","10.988977","172.30.1.205","172.30.1.104","TCP","74","36438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914215 TSecr=0 WS=128" +"23935","10.989144","172.30.1.104","172.30.1.205","TCP","54","135 > 43800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23936","10.989183","172.30.1.104","172.30.1.205","TCP","54","135 > 43800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23937","10.989188","172.30.1.205","172.30.1.104","TCP","54","43800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23938","10.989268","172.30.1.104","172.30.1.205","TCP","66","49671 > 36438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23939","10.989276","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23940","10.989620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23941","10.989927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23942","10.989936","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23943","10.991811","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23944","10.993438","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23945","10.993445","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23946","10.994808","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23947","10.997162","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23948","10.997173","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23949","10.998140","172.30.1.205","172.30.1.104","TCP","74","43804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914224 TSecr=0 WS=128" +"23950","10.998494","172.30.1.104","172.30.1.205","TCP","66","135 > 43804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23951","10.998505","172.30.1.205","172.30.1.104","TCP","54","43804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23952","10.998859","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23953","10.999186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23954","10.999195","172.30.1.205","172.30.1.104","TCP","54","43804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23955","11.001417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23956","11.001864","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23957","11.001870","172.30.1.205","172.30.1.104","TCP","54","43804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23958","11.003691","172.30.1.205","172.30.1.104","TCP","54","43804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23959","11.003809","172.30.1.205","172.30.1.104","TCP","74","36442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914230 TSecr=0 WS=128" +"23960","11.003973","172.30.1.104","172.30.1.205","TCP","54","135 > 43804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23961","11.004018","172.30.1.104","172.30.1.205","TCP","54","135 > 43804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23962","11.004025","172.30.1.205","172.30.1.104","TCP","54","43804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23963","11.004232","172.30.1.104","172.30.1.205","TCP","66","49671 > 36442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23964","11.004248","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23965","11.004658","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23966","11.005004","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23967","11.005014","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23968","11.006911","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23969","11.007329","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23970","11.007337","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23971","11.008712","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23972","11.010967","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23973","11.010975","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23974","11.012015","172.30.1.205","172.30.1.104","TCP","74","43808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914238 TSecr=0 WS=128" +"23975","11.012335","172.30.1.104","172.30.1.205","TCP","66","135 > 43808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23976","11.012349","172.30.1.205","172.30.1.104","TCP","54","43808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23977","11.012718","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"23978","11.013037","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23979","11.013046","172.30.1.205","172.30.1.104","TCP","54","43808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23980","11.015275","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"23981","11.015711","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"23982","11.015720","172.30.1.205","172.30.1.104","TCP","54","43808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23983","11.017630","172.30.1.205","172.30.1.104","TCP","54","43808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"23984","11.017756","172.30.1.205","172.30.1.104","TCP","74","36446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914244 TSecr=0 WS=128" +"23985","11.017915","172.30.1.104","172.30.1.205","TCP","54","135 > 43808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23986","11.017953","172.30.1.104","172.30.1.205","TCP","54","135 > 43808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"23987","11.017960","172.30.1.205","172.30.1.104","TCP","54","43808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"23988","11.018055","172.30.1.104","172.30.1.205","TCP","66","49671 > 36446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"23989","11.018067","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"23990","11.018426","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"23991","11.018762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"23992","11.018772","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"23993","11.020669","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"23994","11.021053","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"23995","11.021060","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"23996","11.022438","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"23997","11.024659","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"23998","11.024668","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"23999","11.025638","172.30.1.205","172.30.1.104","TCP","74","43812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914252 TSecr=0 WS=128" +"24000","11.025956","172.30.1.104","172.30.1.205","TCP","66","135 > 43812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24001","11.025966","172.30.1.205","172.30.1.104","TCP","54","43812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24002","11.026320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24003","11.026710","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24004","11.026719","172.30.1.205","172.30.1.104","TCP","54","43812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24005","11.028903","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24006","11.029306","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24007","11.029313","172.30.1.205","172.30.1.104","TCP","54","43812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24008","11.031111","172.30.1.205","172.30.1.104","TCP","54","43812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24009","11.031220","172.30.1.205","172.30.1.104","TCP","74","36450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914257 TSecr=0 WS=128" +"24010","11.031433","172.30.1.104","172.30.1.205","TCP","54","135 > 43812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24011","11.031468","172.30.1.104","172.30.1.205","TCP","54","135 > 43812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24012","11.031473","172.30.1.205","172.30.1.104","TCP","54","43812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24013","11.031536","172.30.1.104","172.30.1.205","TCP","66","49671 > 36450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24014","11.031545","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24015","11.031884","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24016","11.032185","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24017","11.032194","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24018","11.034070","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24019","11.034446","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24020","11.034451","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24021","11.035803","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24022","11.038925","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24023","11.038937","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24024","11.039912","172.30.1.205","172.30.1.104","TCP","74","43816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914266 TSecr=0 WS=128" +"24025","11.040200","172.30.1.104","172.30.1.205","TCP","66","135 > 43816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24026","11.040211","172.30.1.205","172.30.1.104","TCP","54","43816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24027","11.040565","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24028","11.040857","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24029","11.040867","172.30.1.205","172.30.1.104","TCP","54","43816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24030","11.043059","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24031","11.043478","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24032","11.043485","172.30.1.205","172.30.1.104","TCP","54","43816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24033","11.044335","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24034","11.044384","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24035","11.044421","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24036","11.044453","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24037","11.044485","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24038","11.044513","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24039","11.044540","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24040","11.044572","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24041","11.044599","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24042","11.044628","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24043","11.044654","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24044","11.044681","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24045","11.044729","172.30.1.104","172.30.1.205","TCP","54","49671 > 36406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24046","11.045106","172.30.1.104","172.30.1.205","TCP","54","49671 > 36410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24047","11.045114","172.30.1.104","172.30.1.205","TCP","54","49671 > 36406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24048","11.045122","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24049","11.045128","172.30.1.104","172.30.1.205","TCP","54","49671 > 36410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24050","11.045130","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24051","11.045159","172.30.1.104","172.30.1.205","TCP","54","49671 > 36414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24052","11.045178","172.30.1.104","172.30.1.205","TCP","54","49671 > 36414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24053","11.045181","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24054","11.045211","172.30.1.104","172.30.1.205","TCP","54","49671 > 36418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24055","11.045234","172.30.1.104","172.30.1.205","TCP","54","49671 > 36418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24056","11.045238","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24057","11.045269","172.30.1.104","172.30.1.205","TCP","54","49671 > 36422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24058","11.045290","172.30.1.104","172.30.1.205","TCP","54","49671 > 36422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24059","11.045294","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24060","11.045313","172.30.1.104","172.30.1.205","TCP","54","49671 > 36426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24061","11.045448","172.30.1.104","172.30.1.205","TCP","54","49671 > 36430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24062","11.045470","172.30.1.104","172.30.1.205","TCP","54","49671 > 36426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24063","11.045473","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24064","11.045490","172.30.1.104","172.30.1.205","TCP","54","49671 > 36430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24065","11.045492","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24066","11.045513","172.30.1.104","172.30.1.205","TCP","54","49671 > 36434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24067","11.045533","172.30.1.104","172.30.1.205","TCP","54","49671 > 36438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24068","11.045555","172.30.1.104","172.30.1.205","TCP","54","49671 > 36434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24069","11.045559","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24070","11.045574","172.30.1.104","172.30.1.205","TCP","54","49671 > 36442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24071","11.045595","172.30.1.104","172.30.1.205","TCP","54","49671 > 36438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24072","11.045598","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24073","11.045616","172.30.1.104","172.30.1.205","TCP","54","49671 > 36446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24074","11.045638","172.30.1.104","172.30.1.205","TCP","54","49671 > 36442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24075","11.045641","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24076","11.045659","172.30.1.104","172.30.1.205","TCP","54","49671 > 36446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24077","11.045661","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24078","11.046110","172.30.1.104","172.30.1.205","TCP","54","49671 > 36450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24079","11.046128","172.30.1.104","172.30.1.205","TCP","54","49671 > 36450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24080","11.046133","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24081","11.046301","172.30.1.205","172.30.1.104","TCP","54","43816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24082","11.046411","172.30.1.205","172.30.1.104","TCP","74","36454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914272 TSecr=0 WS=128" +"24083","11.046562","172.30.1.104","172.30.1.205","TCP","54","135 > 43816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24084","11.046592","172.30.1.104","172.30.1.205","TCP","54","135 > 43816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24085","11.046597","172.30.1.205","172.30.1.104","TCP","54","43816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24086","11.046699","172.30.1.104","172.30.1.205","TCP","66","49671 > 36454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24087","11.046708","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24088","11.047058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24089","11.047409","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24090","11.047418","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24091","11.049331","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24092","11.049708","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24093","11.049714","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24094","11.051073","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24095","11.053203","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24096","11.053212","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24097","11.054174","172.30.1.205","172.30.1.104","TCP","74","43820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914280 TSecr=0 WS=128" +"24098","11.054523","172.30.1.104","172.30.1.205","TCP","66","135 > 43820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24099","11.054533","172.30.1.205","172.30.1.104","TCP","54","43820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24100","11.054890","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24101","11.055247","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24102","11.055260","172.30.1.205","172.30.1.104","TCP","54","43820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24103","11.057576","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24104","11.057973","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24105","11.057981","172.30.1.205","172.30.1.104","TCP","54","43820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24106","11.059821","172.30.1.205","172.30.1.104","TCP","54","43820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24107","11.059951","172.30.1.205","172.30.1.104","TCP","74","36458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914286 TSecr=0 WS=128" +"24108","11.060103","172.30.1.104","172.30.1.205","TCP","54","135 > 43820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24109","11.060191","172.30.1.104","172.30.1.205","TCP","54","135 > 43820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24110","11.060198","172.30.1.205","172.30.1.104","TCP","54","43820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24111","11.060249","172.30.1.104","172.30.1.205","TCP","66","49671 > 36458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24112","11.060258","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24113","11.060601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24114","11.060907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24115","11.060917","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24116","11.062813","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24117","11.063176","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24118","11.063182","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24119","11.064540","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24120","11.066858","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24121","11.066868","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24122","11.067840","172.30.1.205","172.30.1.104","TCP","74","43824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914294 TSecr=0 WS=128" +"24123","11.068197","172.30.1.104","172.30.1.205","TCP","66","135 > 43824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24124","11.068208","172.30.1.205","172.30.1.104","TCP","54","43824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24125","11.068561","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24126","11.068889","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24127","11.068898","172.30.1.205","172.30.1.104","TCP","54","43824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24128","11.071126","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24129","11.071553","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24130","11.071560","172.30.1.205","172.30.1.104","TCP","54","43824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24131","11.073420","172.30.1.205","172.30.1.104","TCP","54","43824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24132","11.073548","172.30.1.205","172.30.1.104","TCP","74","36462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914299 TSecr=0 WS=128" +"24133","11.073695","172.30.1.104","172.30.1.205","TCP","54","135 > 43824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24134","11.073784","172.30.1.104","172.30.1.205","TCP","54","135 > 43824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24135","11.073792","172.30.1.205","172.30.1.104","TCP","54","43824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24136","11.073835","172.30.1.104","172.30.1.205","TCP","66","49671 > 36462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24137","11.073844","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24138","11.074189","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24139","11.074498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24140","11.074508","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24141","11.076405","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24142","11.076789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24143","11.076794","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24144","11.078167","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24145","11.080432","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24146","11.080444","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24147","11.081505","172.30.1.205","172.30.1.104","TCP","74","43828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914307 TSecr=0 WS=128" +"24148","11.081834","172.30.1.104","172.30.1.205","TCP","66","135 > 43828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24149","11.081846","172.30.1.205","172.30.1.104","TCP","54","43828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24150","11.082205","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24151","11.082509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24152","11.082518","172.30.1.205","172.30.1.104","TCP","54","43828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24153","11.084757","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24154","11.085239","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24155","11.085246","172.30.1.205","172.30.1.104","TCP","54","43828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24156","11.087089","172.30.1.205","172.30.1.104","TCP","54","43828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24157","11.087216","172.30.1.205","172.30.1.104","TCP","74","36466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914313 TSecr=0 WS=128" +"24158","11.087383","172.30.1.104","172.30.1.205","TCP","54","135 > 43828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24159","11.087418","172.30.1.104","172.30.1.205","TCP","54","135 > 43828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24160","11.087426","172.30.1.205","172.30.1.104","TCP","54","43828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24161","11.087538","172.30.1.104","172.30.1.205","TCP","66","49671 > 36466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24162","11.087546","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24163","11.087895","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24164","11.088202","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24165","11.088211","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24166","11.090122","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24167","11.090513","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24168","11.090519","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24169","11.091887","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24170","11.094114","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24171","11.094127","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24172","11.095182","172.30.1.205","172.30.1.104","TCP","74","43832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914321 TSecr=0 WS=128" +"24173","11.095491","172.30.1.104","172.30.1.205","TCP","66","135 > 43832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24174","11.095503","172.30.1.205","172.30.1.104","TCP","54","43832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24175","11.095859","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24176","11.096182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24177","11.096196","172.30.1.205","172.30.1.104","TCP","54","43832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24178","11.098551","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24179","11.098973","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24180","11.098982","172.30.1.205","172.30.1.104","TCP","54","43832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24181","11.100851","172.30.1.205","172.30.1.104","TCP","54","43832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24182","11.101024","172.30.1.205","172.30.1.104","TCP","74","36470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914327 TSecr=0 WS=128" +"24183","11.101143","172.30.1.104","172.30.1.205","TCP","54","135 > 43832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24184","11.101172","172.30.1.104","172.30.1.205","TCP","54","135 > 43832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24185","11.101181","172.30.1.205","172.30.1.104","TCP","54","43832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24186","11.101301","172.30.1.104","172.30.1.205","TCP","66","49671 > 36470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24187","11.101310","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24188","11.101679","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24189","11.101977","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24190","11.101985","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24191","11.103872","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24192","11.104248","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24193","11.104254","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24194","11.105658","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24195","11.107957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24196","11.107969","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24197","11.108986","172.30.1.205","172.30.1.104","TCP","74","43836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914335 TSecr=0 WS=128" +"24198","11.109342","172.30.1.104","172.30.1.205","TCP","66","135 > 43836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24199","11.109354","172.30.1.205","172.30.1.104","TCP","54","43836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24200","11.109708","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24201","11.110046","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24202","11.110057","172.30.1.205","172.30.1.104","TCP","54","43836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24203","11.112275","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24204","11.112700","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24205","11.112708","172.30.1.205","172.30.1.104","TCP","54","43836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24206","11.114577","172.30.1.205","172.30.1.104","TCP","54","43836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24207","11.114703","172.30.1.205","172.30.1.104","TCP","74","36474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914341 TSecr=0 WS=128" +"24208","11.114858","172.30.1.104","172.30.1.205","TCP","54","135 > 43836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24209","11.114892","172.30.1.104","172.30.1.205","TCP","54","135 > 43836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24210","11.114899","172.30.1.205","172.30.1.104","TCP","54","43836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24211","11.115055","172.30.1.104","172.30.1.205","TCP","66","49671 > 36474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24212","11.115067","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24213","11.115436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24214","11.115740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24215","11.115748","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24216","11.117680","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24217","11.118072","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24218","11.118079","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24219","11.119442","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24220","11.121754","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24221","11.121766","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24222","11.122768","172.30.1.205","172.30.1.104","TCP","74","43840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914349 TSecr=0 WS=128" +"24223","11.123077","172.30.1.104","172.30.1.205","TCP","66","135 > 43840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24224","11.123088","172.30.1.205","172.30.1.104","TCP","54","43840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24225","11.123436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24226","11.123753","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24227","11.123762","172.30.1.205","172.30.1.104","TCP","54","43840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24228","11.126016","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24229","11.126442","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24230","11.126449","172.30.1.205","172.30.1.104","TCP","54","43840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24231","11.128276","172.30.1.205","172.30.1.104","TCP","54","43840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24232","11.128394","172.30.1.205","172.30.1.104","TCP","74","36478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914354 TSecr=0 WS=128" +"24233","11.128554","172.30.1.104","172.30.1.205","TCP","54","135 > 43840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24234","11.128590","172.30.1.104","172.30.1.205","TCP","54","135 > 43840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24235","11.128596","172.30.1.205","172.30.1.104","TCP","54","43840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24236","11.128696","172.30.1.104","172.30.1.205","TCP","66","49671 > 36478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24237","11.128704","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24238","11.129072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24239","11.129385","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24240","11.129394","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24241","11.131276","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24242","11.131671","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24243","11.131677","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24244","11.133072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24245","11.135440","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24246","11.135455","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24247","11.136536","172.30.1.205","172.30.1.104","TCP","74","43844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914362 TSecr=0 WS=128" +"24248","11.136921","172.30.1.104","172.30.1.205","TCP","66","135 > 43844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24249","11.136933","172.30.1.205","172.30.1.104","TCP","54","43844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24250","11.137309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24251","11.137639","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24252","11.137649","172.30.1.205","172.30.1.104","TCP","54","43844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24253","11.139880","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24254","11.140325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24255","11.140332","172.30.1.205","172.30.1.104","TCP","54","43844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24256","11.142197","172.30.1.205","172.30.1.104","TCP","54","43844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24257","11.142315","172.30.1.205","172.30.1.104","TCP","74","36482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914368 TSecr=0 WS=128" +"24258","11.142534","172.30.1.104","172.30.1.205","TCP","54","135 > 43844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24259","11.142586","172.30.1.104","172.30.1.205","TCP","66","49671 > 36482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24260","11.142596","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24261","11.142637","172.30.1.104","172.30.1.205","TCP","54","135 > 43844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24262","11.142644","172.30.1.205","172.30.1.104","TCP","54","43844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24263","11.142970","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24264","11.144528","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24265","11.144536","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24266","11.146436","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24267","11.146817","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24268","11.146824","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24269","11.148197","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24270","11.150446","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24271","11.150456","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24272","11.151436","172.30.1.205","172.30.1.104","TCP","74","43848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914377 TSecr=0 WS=128" +"24273","11.151762","172.30.1.104","172.30.1.205","TCP","66","135 > 43848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24274","11.151772","172.30.1.205","172.30.1.104","TCP","54","43848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24275","11.152128","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24276","11.152457","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24277","11.152467","172.30.1.205","172.30.1.104","TCP","54","43848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24278","11.154702","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24279","11.155107","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24280","11.155114","172.30.1.205","172.30.1.104","TCP","54","43848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24281","11.156962","172.30.1.205","172.30.1.104","TCP","54","43848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24282","11.157081","172.30.1.205","172.30.1.104","TCP","74","36486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914383 TSecr=0 WS=128" +"24283","11.157282","172.30.1.104","172.30.1.205","TCP","54","135 > 43848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24284","11.157348","172.30.1.104","172.30.1.205","TCP","54","135 > 43848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24285","11.157355","172.30.1.205","172.30.1.104","TCP","54","43848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24286","11.157433","172.30.1.104","172.30.1.205","TCP","66","49671 > 36486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24287","11.157442","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24288","11.157792","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24289","11.158156","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24290","11.158165","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24291","11.160062","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24292","11.160457","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24293","11.160463","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24294","11.161855","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24295","11.164052","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24296","11.164064","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24297","11.165150","172.30.1.205","172.30.1.104","TCP","74","43852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914391 TSecr=0 WS=128" +"24298","11.165515","172.30.1.104","172.30.1.205","TCP","66","135 > 43852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24299","11.165527","172.30.1.205","172.30.1.104","TCP","54","43852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24300","11.165878","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24301","11.166194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24302","11.166202","172.30.1.205","172.30.1.104","TCP","54","43852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24303","11.168437","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24304","11.168847","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24305","11.168855","172.30.1.205","172.30.1.104","TCP","54","43852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24306","11.170693","172.30.1.205","172.30.1.104","TCP","54","43852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24307","11.170809","172.30.1.205","172.30.1.104","TCP","74","36490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914397 TSecr=0 WS=128" +"24308","11.170974","172.30.1.104","172.30.1.205","TCP","54","135 > 43852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24309","11.171012","172.30.1.104","172.30.1.205","TCP","54","135 > 43852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24310","11.171019","172.30.1.205","172.30.1.104","TCP","54","43852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24311","11.171100","172.30.1.104","172.30.1.205","TCP","66","49671 > 36490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24312","11.171109","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24313","11.171454","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24314","11.171762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24315","11.171771","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24316","11.173694","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24317","11.174069","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24318","11.174075","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24319","11.175426","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24320","11.177685","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24321","11.177696","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24322","11.178663","172.30.1.205","172.30.1.104","TCP","74","43856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914405 TSecr=0 WS=128" +"24323","11.178996","172.30.1.104","172.30.1.205","TCP","66","135 > 43856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24324","11.179007","172.30.1.205","172.30.1.104","TCP","54","43856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24325","11.179359","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24326","11.179681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24327","11.179691","172.30.1.205","172.30.1.104","TCP","54","43856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24328","11.181915","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24329","11.182311","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24330","11.182318","172.30.1.205","172.30.1.104","TCP","54","43856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24331","11.184173","172.30.1.205","172.30.1.104","TCP","54","43856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24332","11.184286","172.30.1.205","172.30.1.104","TCP","74","36494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914410 TSecr=0 WS=128" +"24333","11.184462","172.30.1.104","172.30.1.205","TCP","54","135 > 43856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24334","11.184534","172.30.1.104","172.30.1.205","TCP","54","135 > 43856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24335","11.184539","172.30.1.205","172.30.1.104","TCP","54","43856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24336","11.184575","172.30.1.104","172.30.1.205","TCP","66","49671 > 36494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24337","11.184583","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24338","11.184999","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24339","11.185313","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24340","11.185322","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24341","11.187266","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24342","11.187727","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24343","11.187733","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24344","11.189172","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24345","11.191418","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24346","11.191427","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24347","11.192362","172.30.1.205","172.30.1.104","TCP","74","43860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914418 TSecr=0 WS=128" +"24348","11.192683","172.30.1.104","172.30.1.205","TCP","66","135 > 43860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24349","11.192693","172.30.1.205","172.30.1.104","TCP","54","43860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24350","11.193066","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24351","11.193368","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24352","11.193377","172.30.1.205","172.30.1.104","TCP","54","43860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24353","11.195575","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24354","11.196034","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24355","11.196041","172.30.1.205","172.30.1.104","TCP","54","43860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24356","11.197889","172.30.1.205","172.30.1.104","TCP","54","43860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24357","11.198000","172.30.1.205","172.30.1.104","TCP","74","36498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914424 TSecr=0 WS=128" +"24358","11.198208","172.30.1.104","172.30.1.205","TCP","54","135 > 43860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24359","11.198267","172.30.1.104","172.30.1.205","TCP","54","135 > 43860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24360","11.198272","172.30.1.205","172.30.1.104","TCP","54","43860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24361","11.198290","172.30.1.104","172.30.1.205","TCP","66","49671 > 36498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24362","11.198299","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24363","11.198644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24364","11.199414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24365","11.199421","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24366","11.201315","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24367","11.201732","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24368","11.201739","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24369","11.203082","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24370","11.205435","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24371","11.205446","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24372","11.206402","172.30.1.205","172.30.1.104","TCP","74","43864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914432 TSecr=0 WS=128" +"24373","11.206699","172.30.1.104","172.30.1.205","TCP","66","135 > 43864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24374","11.206713","172.30.1.205","172.30.1.104","TCP","54","43864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24375","11.207081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24376","11.207430","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24377","11.207439","172.30.1.205","172.30.1.104","TCP","54","43864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24378","11.209652","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24379","11.210057","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24380","11.210064","172.30.1.205","172.30.1.104","TCP","54","43864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24381","11.210920","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24382","11.210969","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24383","11.211007","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24384","11.211036","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24385","11.211069","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24386","11.211102","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24387","11.211134","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24388","11.211161","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24389","11.211194","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24390","11.211220","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24391","11.211247","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24392","11.211304","172.30.1.104","172.30.1.205","TCP","54","49671 > 36458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24393","11.211330","172.30.1.104","172.30.1.205","TCP","54","49671 > 36458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24394","11.211337","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24395","11.211343","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24396","11.211354","172.30.1.104","172.30.1.205","TCP","54","49671 > 36462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24397","11.211373","172.30.1.104","172.30.1.205","TCP","54","49671 > 36466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24398","11.211464","172.30.1.104","172.30.1.205","TCP","54","49671 > 36462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24399","11.211470","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24400","11.211493","172.30.1.104","172.30.1.205","TCP","54","49671 > 36470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24401","11.211812","172.30.1.104","172.30.1.205","TCP","54","49671 > 36474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24402","11.211836","172.30.1.104","172.30.1.205","TCP","54","49671 > 36474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24403","11.211841","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24404","11.211858","172.30.1.104","172.30.1.205","TCP","54","49671 > 36466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24405","11.211861","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24406","11.211910","172.30.1.104","172.30.1.205","TCP","54","49671 > 36470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24407","11.211913","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24408","11.211930","172.30.1.104","172.30.1.205","TCP","54","49671 > 36482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24409","11.211950","172.30.1.104","172.30.1.205","TCP","54","49671 > 36478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24410","11.211971","172.30.1.104","172.30.1.205","TCP","54","49671 > 36482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24411","11.211974","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24412","11.212051","172.30.1.104","172.30.1.205","TCP","54","49671 > 36478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24413","11.212055","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24414","11.212076","172.30.1.104","172.30.1.205","TCP","54","49671 > 36486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24415","11.212099","172.30.1.104","172.30.1.205","TCP","54","49671 > 36490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24416","11.212120","172.30.1.104","172.30.1.205","TCP","54","49671 > 36494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24417","11.212141","172.30.1.104","172.30.1.205","TCP","54","49671 > 36486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24418","11.212145","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24419","11.212169","172.30.1.104","172.30.1.205","TCP","54","49671 > 36498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24420","11.212191","172.30.1.104","172.30.1.205","TCP","54","49671 > 36498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24421","11.212195","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24422","11.212211","172.30.1.104","172.30.1.205","TCP","54","49671 > 36490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24423","11.212214","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24424","11.212232","172.30.1.104","172.30.1.205","TCP","54","49671 > 36494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24425","11.212236","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24426","11.212253","172.30.1.104","172.30.1.205","TCP","54","49671 > 36454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24427","11.212718","172.30.1.104","172.30.1.205","TCP","54","49671 > 36454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24428","11.212724","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24429","11.212937","172.30.1.205","172.30.1.104","TCP","54","43864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24430","11.213049","172.30.1.205","172.30.1.104","TCP","74","36502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914439 TSecr=0 WS=128" +"24431","11.213218","172.30.1.104","172.30.1.205","TCP","54","135 > 43864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24432","11.213318","172.30.1.104","172.30.1.205","TCP","54","135 > 43864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24433","11.213323","172.30.1.205","172.30.1.104","TCP","54","43864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24434","11.213355","172.30.1.104","172.30.1.205","TCP","66","49671 > 36502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24435","11.213363","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24436","11.213719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24437","11.214059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24438","11.214068","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24439","11.215970","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24440","11.217872","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24441","11.217879","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24442","11.219253","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24443","11.221589","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24444","11.221598","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24445","11.222586","172.30.1.205","172.30.1.104","TCP","74","43868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914449 TSecr=0 WS=128" +"24446","11.222906","172.30.1.104","172.30.1.205","TCP","66","135 > 43868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24447","11.222918","172.30.1.205","172.30.1.104","TCP","54","43868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24448","11.223283","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24449","11.223600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24450","11.223614","172.30.1.205","172.30.1.104","TCP","54","43868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24451","11.225938","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24452","11.226352","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24453","11.226360","172.30.1.205","172.30.1.104","TCP","54","43868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24454","11.228220","172.30.1.205","172.30.1.104","TCP","54","43868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24455","11.228352","172.30.1.205","172.30.1.104","TCP","74","36506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914454 TSecr=0 WS=128" +"24456","11.228535","172.30.1.104","172.30.1.205","TCP","54","135 > 43868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24457","11.228555","172.30.1.104","172.30.1.205","TCP","54","135 > 43868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24458","11.228562","172.30.1.205","172.30.1.104","TCP","54","43868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24459","11.228634","172.30.1.104","172.30.1.205","TCP","66","49671 > 36506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24460","11.228643","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24461","11.229023","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24462","11.230568","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24463","11.230575","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24464","11.232463","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24465","11.232865","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24466","11.232872","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24467","11.234253","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24468","11.236467","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24469","11.236478","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24470","11.237514","172.30.1.205","172.30.1.104","TCP","74","43872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914463 TSecr=0 WS=128" +"24471","11.237850","172.30.1.104","172.30.1.205","TCP","66","135 > 43872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24472","11.237861","172.30.1.205","172.30.1.104","TCP","54","43872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24473","11.238215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24474","11.238552","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24475","11.238561","172.30.1.205","172.30.1.104","TCP","54","43872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24476","11.240808","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24477","11.241197","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24478","11.241204","172.30.1.205","172.30.1.104","TCP","54","43872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24479","11.243028","172.30.1.205","172.30.1.104","TCP","54","43872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24480","11.243143","172.30.1.205","172.30.1.104","TCP","74","36510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914469 TSecr=0 WS=128" +"24481","11.243314","172.30.1.104","172.30.1.205","TCP","54","135 > 43872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24482","11.243379","172.30.1.104","172.30.1.205","TCP","54","135 > 43872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24483","11.243386","172.30.1.205","172.30.1.104","TCP","54","43872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24484","11.243426","172.30.1.104","172.30.1.205","TCP","66","49671 > 36510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24485","11.243434","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24486","11.243778","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24487","11.245252","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24488","11.245260","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24489","11.247150","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24490","11.247523","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24491","11.247530","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24492","11.248929","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24493","11.251137","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24494","11.251146","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24495","11.252119","172.30.1.205","172.30.1.104","TCP","74","43876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914478 TSecr=0 WS=128" +"24496","11.252458","172.30.1.104","172.30.1.205","TCP","66","135 > 43876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24497","11.252470","172.30.1.205","172.30.1.104","TCP","54","43876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24498","11.252851","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24499","11.253174","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24500","11.253183","172.30.1.205","172.30.1.104","TCP","54","43876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24501","11.255393","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24502","11.255809","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24503","11.255816","172.30.1.205","172.30.1.104","TCP","54","43876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24504","11.257688","172.30.1.205","172.30.1.104","TCP","54","43876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24505","11.257804","172.30.1.205","172.30.1.104","TCP","74","36514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914484 TSecr=0 WS=128" +"24506","11.257976","172.30.1.104","172.30.1.205","TCP","54","135 > 43876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24507","11.258011","172.30.1.104","172.30.1.205","TCP","54","135 > 43876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24508","11.258018","172.30.1.205","172.30.1.104","TCP","54","43876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24509","11.258151","172.30.1.104","172.30.1.205","TCP","66","49671 > 36514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24510","11.258160","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24511","11.258509","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24512","11.258834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24513","11.258843","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24514","11.260736","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24515","11.261136","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24516","11.261143","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24517","11.262512","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24518","11.265676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24519","11.265685","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24520","11.266642","172.30.1.205","172.30.1.104","TCP","74","43880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914493 TSecr=0 WS=128" +"24521","11.266975","172.30.1.104","172.30.1.205","TCP","66","135 > 43880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24522","11.266986","172.30.1.205","172.30.1.104","TCP","54","43880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24523","11.267335","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24524","11.267650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24525","11.267659","172.30.1.205","172.30.1.104","TCP","54","43880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24526","11.269879","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24527","11.270355","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24528","11.270361","172.30.1.205","172.30.1.104","TCP","54","43880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24529","11.272217","172.30.1.205","172.30.1.104","TCP","54","43880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24530","11.272336","172.30.1.205","172.30.1.104","TCP","74","36518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914498 TSecr=0 WS=128" +"24531","11.272557","172.30.1.104","172.30.1.205","TCP","54","135 > 43880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24532","11.272608","172.30.1.104","172.30.1.205","TCP","54","135 > 43880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24533","11.272617","172.30.1.205","172.30.1.104","TCP","54","43880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24534","11.272638","172.30.1.104","172.30.1.205","TCP","66","49671 > 36518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24535","11.272646","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24536","11.273057","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24537","11.273470","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24538","11.273478","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24539","11.275350","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24540","11.275762","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24541","11.275768","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24542","11.277155","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24543","11.279402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24544","11.279412","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24545","11.280340","172.30.1.205","172.30.1.104","TCP","74","43884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914506 TSecr=0 WS=128" +"24546","11.280665","172.30.1.104","172.30.1.205","TCP","66","135 > 43884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24547","11.280675","172.30.1.205","172.30.1.104","TCP","54","43884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24548","11.281053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24549","11.281375","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24550","11.281384","172.30.1.205","172.30.1.104","TCP","54","43884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24551","11.283563","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24552","11.283954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24553","11.283961","172.30.1.205","172.30.1.104","TCP","54","43884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24554","11.285819","172.30.1.205","172.30.1.104","TCP","54","43884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24555","11.285933","172.30.1.205","172.30.1.104","TCP","74","36522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914512 TSecr=0 WS=128" +"24556","11.286099","172.30.1.104","172.30.1.205","TCP","54","135 > 43884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24557","11.286144","172.30.1.104","172.30.1.205","TCP","54","135 > 43884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24558","11.286149","172.30.1.205","172.30.1.104","TCP","54","43884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24559","11.286225","172.30.1.104","172.30.1.205","TCP","66","49671 > 36522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24560","11.286233","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24561","11.286586","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24562","11.286916","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24563","11.286923","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24564","11.288825","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24565","11.289203","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24566","11.289210","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24567","11.290568","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24568","11.294376","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24569","11.294386","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24570","11.295376","172.30.1.205","172.30.1.104","TCP","74","43888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914521 TSecr=0 WS=128" +"24571","11.295702","172.30.1.104","172.30.1.205","TCP","66","135 > 43888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24572","11.295714","172.30.1.205","172.30.1.104","TCP","54","43888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24573","11.296068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24574","11.296392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24575","11.296401","172.30.1.205","172.30.1.104","TCP","54","43888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24576","11.298656","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24577","11.299100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24578","11.299107","172.30.1.205","172.30.1.104","TCP","54","43888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24579","11.300958","172.30.1.205","172.30.1.104","TCP","54","43888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24580","11.301081","172.30.1.205","172.30.1.104","TCP","74","36526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914527 TSecr=0 WS=128" +"24581","11.301259","172.30.1.104","172.30.1.205","TCP","54","135 > 43888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24582","11.301300","172.30.1.104","172.30.1.205","TCP","54","135 > 43888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24583","11.301307","172.30.1.205","172.30.1.104","TCP","54","43888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24584","11.301415","172.30.1.104","172.30.1.205","TCP","66","49671 > 36526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24585","11.301424","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24586","11.301771","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24587","11.302083","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24588","11.302093","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24589","11.303975","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24590","11.305546","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24591","11.305554","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24592","11.306922","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24593","11.309275","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24594","11.309285","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24595","11.310247","172.30.1.205","172.30.1.104","TCP","74","43892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914536 TSecr=0 WS=128" +"24596","11.310569","172.30.1.104","172.30.1.205","TCP","66","135 > 43892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24597","11.310580","172.30.1.205","172.30.1.104","TCP","54","43892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24598","11.310930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24599","11.311247","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24600","11.311255","172.30.1.205","172.30.1.104","TCP","54","43892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24601","11.313475","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24602","11.313891","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24603","11.313897","172.30.1.205","172.30.1.104","TCP","54","43892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24604","11.315702","172.30.1.205","172.30.1.104","TCP","54","43892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24605","11.315813","172.30.1.205","172.30.1.104","TCP","74","36530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914542 TSecr=0 WS=128" +"24606","11.316005","172.30.1.104","172.30.1.205","TCP","54","135 > 43892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24607","11.316043","172.30.1.104","172.30.1.205","TCP","54","135 > 43892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24608","11.316049","172.30.1.205","172.30.1.104","TCP","54","43892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24609","11.316127","172.30.1.104","172.30.1.205","TCP","66","49671 > 36530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24610","11.316135","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24611","11.316480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24612","11.316786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24613","11.316795","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24614","11.318674","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24615","11.319073","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24616","11.319080","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24617","11.320434","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24618","11.324516","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24619","11.324526","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24620","11.325507","172.30.1.205","172.30.1.104","TCP","74","43896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914551 TSecr=0 WS=128" +"24621","11.325848","172.30.1.104","172.30.1.205","TCP","66","135 > 43896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24622","11.325860","172.30.1.205","172.30.1.104","TCP","54","43896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24623","11.326218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24624","11.326534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24625","11.326543","172.30.1.205","172.30.1.104","TCP","54","43896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24626","11.328717","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24627","11.329161","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24628","11.329168","172.30.1.205","172.30.1.104","TCP","54","43896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24629","11.330979","172.30.1.205","172.30.1.104","TCP","54","43896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24630","11.331092","172.30.1.205","172.30.1.104","TCP","74","36534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914557 TSecr=0 WS=128" +"24631","11.331273","172.30.1.104","172.30.1.205","TCP","54","135 > 43896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24632","11.331340","172.30.1.104","172.30.1.205","TCP","54","135 > 43896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24633","11.331346","172.30.1.205","172.30.1.104","TCP","54","43896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24634","11.331425","172.30.1.104","172.30.1.205","TCP","66","49671 > 36534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24635","11.331433","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24636","11.331777","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24637","11.332094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24638","11.332103","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24639","11.334034","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24640","11.334453","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24641","11.334463","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24642","11.335920","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24643","11.338130","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24644","11.338139","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24645","11.339098","172.30.1.205","172.30.1.104","TCP","74","43900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914565 TSecr=0 WS=128" +"24646","11.339413","172.30.1.104","172.30.1.205","TCP","66","135 > 43900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24647","11.339427","172.30.1.205","172.30.1.104","TCP","54","43900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24648","11.339780","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24649","11.340105","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24650","11.340115","172.30.1.205","172.30.1.104","TCP","54","43900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24651","11.342335","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24652","11.342739","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24653","11.342746","172.30.1.205","172.30.1.104","TCP","54","43900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24654","11.344600","172.30.1.205","172.30.1.104","TCP","54","43900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24655","11.344722","172.30.1.205","172.30.1.104","TCP","74","36538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914571 TSecr=0 WS=128" +"24656","11.344899","172.30.1.104","172.30.1.205","TCP","54","135 > 43900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24657","11.344923","172.30.1.104","172.30.1.205","TCP","54","135 > 43900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24658","11.344929","172.30.1.205","172.30.1.104","TCP","54","43900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24659","11.345013","172.30.1.104","172.30.1.205","TCP","66","49671 > 36538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24660","11.345021","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24661","11.345381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24662","11.346189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24663","11.346199","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24664","11.348121","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24665","11.348508","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24666","11.348515","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24667","11.349903","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24668","11.352118","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24669","11.352128","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24670","11.353130","172.30.1.205","172.30.1.104","TCP","74","43904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914579 TSecr=0 WS=128" +"24671","11.353449","172.30.1.104","172.30.1.205","TCP","66","135 > 43904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24672","11.353462","172.30.1.205","172.30.1.104","TCP","54","43904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24673","11.353822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24674","11.354139","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24675","11.354148","172.30.1.205","172.30.1.104","TCP","54","43904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24676","11.356359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24677","11.356782","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24678","11.356789","172.30.1.205","172.30.1.104","TCP","54","43904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24679","11.358610","172.30.1.205","172.30.1.104","TCP","54","43904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24680","11.358724","172.30.1.205","172.30.1.104","TCP","74","36542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914585 TSecr=0 WS=128" +"24681","11.358900","172.30.1.104","172.30.1.205","TCP","54","135 > 43904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24682","11.358938","172.30.1.104","172.30.1.205","TCP","54","135 > 43904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24683","11.358945","172.30.1.205","172.30.1.104","TCP","54","43904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24684","11.359025","172.30.1.104","172.30.1.205","TCP","66","49671 > 36542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24685","11.359034","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24686","11.359385","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24687","11.359719","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24688","11.359733","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24689","11.361762","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24690","11.362165","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24691","11.362173","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24692","11.363558","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24693","11.365806","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24694","11.365818","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24695","11.366778","172.30.1.205","172.30.1.104","TCP","74","43908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914593 TSecr=0 WS=128" +"24696","11.367103","172.30.1.104","172.30.1.205","TCP","66","135 > 43908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24697","11.367114","172.30.1.205","172.30.1.104","TCP","54","43908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24698","11.367463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24699","11.367788","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24700","11.367797","172.30.1.205","172.30.1.104","TCP","54","43908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24701","11.370081","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24702","11.370522","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24703","11.370529","172.30.1.205","172.30.1.104","TCP","54","43908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24704","11.372342","172.30.1.205","172.30.1.104","TCP","54","43908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24705","11.372452","172.30.1.205","172.30.1.104","TCP","74","36546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914598 TSecr=0 WS=128" +"24706","11.372624","172.30.1.104","172.30.1.205","TCP","54","135 > 43908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24707","11.372666","172.30.1.104","172.30.1.205","TCP","54","135 > 43908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24708","11.372671","172.30.1.205","172.30.1.104","TCP","54","43908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24709","11.372751","172.30.1.104","172.30.1.205","TCP","66","49671 > 36546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24710","11.372759","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24711","11.373124","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24712","11.373448","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24713","11.373457","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24714","11.375377","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24715","11.375788","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24716","11.375795","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24717","11.377177","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24718","11.379467","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24719","11.379477","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24720","11.380408","172.30.1.205","172.30.1.104","TCP","74","43912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914606 TSecr=0 WS=128" +"24721","11.380750","172.30.1.104","172.30.1.205","TCP","66","135 > 43912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24722","11.380761","172.30.1.205","172.30.1.104","TCP","54","43912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24723","11.381135","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24724","11.381480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24725","11.381490","172.30.1.205","172.30.1.104","TCP","54","43912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24726","11.383666","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24727","11.384118","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24728","11.384124","172.30.1.205","172.30.1.104","TCP","54","43912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24729","11.385003","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24730","11.385052","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24731","11.385084","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24732","11.385117","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24733","11.385145","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24734","11.385172","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24735","11.385200","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24736","11.385228","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24737","11.385258","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24738","11.385285","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24739","11.385311","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24740","11.385379","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24741","11.385713","172.30.1.104","172.30.1.205","TCP","54","49671 > 36506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24742","11.385739","172.30.1.104","172.30.1.205","TCP","54","49671 > 36510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24743","11.385769","172.30.1.104","172.30.1.205","TCP","54","49671 > 36506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24744","11.385776","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24745","11.385798","172.30.1.104","172.30.1.205","TCP","54","49671 > 36514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24746","11.385842","172.30.1.104","172.30.1.205","TCP","54","49671 > 36518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24747","11.385879","172.30.1.104","172.30.1.205","TCP","54","49671 > 36518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24748","11.385884","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24749","11.385917","172.30.1.104","172.30.1.205","TCP","54","49671 > 36522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24750","11.385942","172.30.1.104","172.30.1.205","TCP","54","49671 > 36522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24751","11.385947","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24752","11.385970","172.30.1.104","172.30.1.205","TCP","54","49671 > 36526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24753","11.385997","172.30.1.104","172.30.1.205","TCP","54","49671 > 36510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24754","11.386002","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24755","11.386026","172.30.1.104","172.30.1.205","TCP","54","49671 > 36530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24756","11.386052","172.30.1.104","172.30.1.205","TCP","54","49671 > 36530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24757","11.386056","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24758","11.386080","172.30.1.104","172.30.1.205","TCP","54","49671 > 36534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24759","11.386107","172.30.1.104","172.30.1.205","TCP","54","49671 > 36534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24760","11.386111","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24761","11.386134","172.30.1.104","172.30.1.205","TCP","54","49671 > 36538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24762","11.386161","172.30.1.104","172.30.1.205","TCP","54","49671 > 36514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24763","11.386165","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24764","11.386189","172.30.1.104","172.30.1.205","TCP","54","49671 > 36542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24765","11.386216","172.30.1.104","172.30.1.205","TCP","54","49671 > 36542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24766","11.386220","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24767","11.386243","172.30.1.104","172.30.1.205","TCP","54","49671 > 36546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24768","11.386271","172.30.1.104","172.30.1.205","TCP","54","49671 > 36526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24769","11.386274","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24770","11.386485","172.30.1.104","172.30.1.205","TCP","54","49671 > 36502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24771","11.386510","172.30.1.104","172.30.1.205","TCP","54","49671 > 36538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24772","11.386515","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24773","11.386538","172.30.1.104","172.30.1.205","TCP","54","49671 > 36546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24774","11.386541","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24775","11.386567","172.30.1.104","172.30.1.205","TCP","54","49671 > 36502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"24776","11.386570","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"24777","11.386981","172.30.1.205","172.30.1.104","TCP","54","43912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24778","11.387092","172.30.1.205","172.30.1.104","TCP","74","36550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914613 TSecr=0 WS=128" +"24779","11.387320","172.30.1.104","172.30.1.205","TCP","54","135 > 43912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24780","11.387355","172.30.1.104","172.30.1.205","TCP","54","135 > 43912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24781","11.387360","172.30.1.205","172.30.1.104","TCP","54","43912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24782","11.387478","172.30.1.104","172.30.1.205","TCP","66","49671 > 36550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24783","11.387486","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24784","11.387840","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24785","11.388189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24786","11.388198","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24787","11.390130","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24788","11.390580","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24789","11.390586","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24790","11.391944","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24791","11.394200","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24792","11.394211","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24793","11.395180","172.30.1.205","172.30.1.104","TCP","74","43916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914621 TSecr=0 WS=128" +"24794","11.395491","172.30.1.104","172.30.1.205","TCP","66","135 > 43916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24795","11.395502","172.30.1.205","172.30.1.104","TCP","54","43916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24796","11.395856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24797","11.396194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24798","11.396203","172.30.1.205","172.30.1.104","TCP","54","43916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24799","11.398421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24800","11.398847","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24801","11.398855","172.30.1.205","172.30.1.104","TCP","54","43916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24802","11.400673","172.30.1.205","172.30.1.104","TCP","54","43916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24803","11.400809","172.30.1.205","172.30.1.104","TCP","74","36554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914627 TSecr=0 WS=128" +"24804","11.400959","172.30.1.104","172.30.1.205","TCP","54","135 > 43916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24805","11.400995","172.30.1.104","172.30.1.205","TCP","54","135 > 43916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24806","11.401001","172.30.1.205","172.30.1.104","TCP","54","43916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24807","11.401142","172.30.1.104","172.30.1.205","TCP","66","49671 > 36554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24808","11.401150","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24809","11.401493","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24810","11.401806","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24811","11.401815","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24812","11.403689","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24813","11.404097","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24814","11.404103","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24815","11.405476","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24816","11.407735","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24817","11.407745","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24818","11.408691","172.30.1.205","172.30.1.104","TCP","74","43920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914635 TSecr=0 WS=128" +"24819","11.409054","172.30.1.104","172.30.1.205","TCP","66","135 > 43920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24820","11.409066","172.30.1.205","172.30.1.104","TCP","54","43920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24821","11.409434","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24822","11.409753","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24823","11.409762","172.30.1.205","172.30.1.104","TCP","54","43920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24824","11.411975","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24825","11.412427","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24826","11.412434","172.30.1.205","172.30.1.104","TCP","54","43920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24827","11.414286","172.30.1.205","172.30.1.104","TCP","54","43920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24828","11.414406","172.30.1.205","172.30.1.104","TCP","74","36558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914640 TSecr=0 WS=128" +"24829","11.414593","172.30.1.104","172.30.1.205","TCP","54","135 > 43920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24830","11.414662","172.30.1.104","172.30.1.205","TCP","54","135 > 43920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24831","11.414669","172.30.1.205","172.30.1.104","TCP","54","43920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24832","11.414726","172.30.1.104","172.30.1.205","TCP","66","49671 > 36558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24833","11.414734","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24834","11.415078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24835","11.415388","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24836","11.415397","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24837","11.417321","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24838","11.417739","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24839","11.417746","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24840","11.419102","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24841","11.421378","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24842","11.421388","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24843","11.422421","172.30.1.205","172.30.1.104","TCP","74","43924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914648 TSecr=0 WS=128" +"24844","11.422736","172.30.1.104","172.30.1.205","TCP","66","135 > 43924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24845","11.422747","172.30.1.205","172.30.1.104","TCP","54","43924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24846","11.423098","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24847","11.423435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24848","11.423444","172.30.1.205","172.30.1.104","TCP","54","43924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24849","11.425706","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24850","11.426139","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24851","11.426145","172.30.1.205","172.30.1.104","TCP","54","43924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24852","11.427968","172.30.1.205","172.30.1.104","TCP","54","43924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24853","11.428078","172.30.1.205","172.30.1.104","TCP","74","36562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914654 TSecr=0 WS=128" +"24854","11.428335","172.30.1.104","172.30.1.205","TCP","54","135 > 43924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24855","11.428378","172.30.1.104","172.30.1.205","TCP","54","135 > 43924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24856","11.428384","172.30.1.205","172.30.1.104","TCP","54","43924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24857","11.428415","172.30.1.104","172.30.1.205","TCP","66","49671 > 36562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24858","11.428424","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24859","11.428773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24860","11.431041","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24861","11.431048","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24862","11.432945","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24863","11.433361","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24864","11.433368","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24865","11.434778","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24866","11.438474","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24867","11.438484","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24868","11.439443","172.30.1.205","172.30.1.104","TCP","74","43928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914665 TSecr=0 WS=128" +"24869","11.439777","172.30.1.104","172.30.1.205","TCP","66","135 > 43928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24870","11.439790","172.30.1.205","172.30.1.104","TCP","54","43928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24871","11.440148","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24872","11.440489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24873","11.440498","172.30.1.205","172.30.1.104","TCP","54","43928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24874","11.442691","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24875","11.443124","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24876","11.443131","172.30.1.205","172.30.1.104","TCP","54","43928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24877","11.444966","172.30.1.205","172.30.1.104","TCP","54","43928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24878","11.445077","172.30.1.205","172.30.1.104","TCP","74","36566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914671 TSecr=0 WS=128" +"24879","11.445259","172.30.1.104","172.30.1.205","TCP","54","135 > 43928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24880","11.445305","172.30.1.104","172.30.1.205","TCP","54","135 > 43928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24881","11.445311","172.30.1.205","172.30.1.104","TCP","54","43928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24882","11.445395","172.30.1.104","172.30.1.205","TCP","66","49671 > 36566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24883","11.445404","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24884","11.445748","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24885","11.446062","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24886","11.446071","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24887","11.447959","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24888","11.448360","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24889","11.448366","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24890","11.449752","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24891","11.451965","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24892","11.451975","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24893","11.452929","172.30.1.205","172.30.1.104","TCP","74","43932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914679 TSecr=0 WS=128" +"24894","11.453267","172.30.1.104","172.30.1.205","TCP","66","135 > 43932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24895","11.453278","172.30.1.205","172.30.1.104","TCP","54","43932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24896","11.453628","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24897","11.453965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24898","11.453974","172.30.1.205","172.30.1.104","TCP","54","43932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24899","11.456168","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24900","11.456601","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24901","11.456607","172.30.1.205","172.30.1.104","TCP","54","43932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24902","11.458455","172.30.1.205","172.30.1.104","TCP","54","43932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24903","11.458572","172.30.1.205","172.30.1.104","TCP","74","36570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914684 TSecr=0 WS=128" +"24904","11.458739","172.30.1.104","172.30.1.205","TCP","54","135 > 43932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24905","11.458781","172.30.1.104","172.30.1.205","TCP","54","135 > 43932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24906","11.458788","172.30.1.205","172.30.1.104","TCP","54","43932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24907","11.458872","172.30.1.104","172.30.1.205","TCP","66","49671 > 36570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24908","11.458880","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24909","11.459229","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24910","11.459549","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24911","11.459558","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24912","11.461483","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24913","11.461877","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24914","11.461883","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24915","11.463244","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24916","11.465550","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24917","11.465560","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24918","11.466513","172.30.1.205","172.30.1.104","TCP","74","43936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914692 TSecr=0 WS=128" +"24919","11.466835","172.30.1.104","172.30.1.205","TCP","66","135 > 43936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24920","11.466846","172.30.1.205","172.30.1.104","TCP","54","43936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24921","11.467194","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24922","11.467535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24923","11.467544","172.30.1.205","172.30.1.104","TCP","54","43936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24924","11.469768","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24925","11.470187","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24926","11.470194","172.30.1.205","172.30.1.104","TCP","54","43936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24927","11.472023","172.30.1.205","172.30.1.104","TCP","54","43936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24928","11.472135","172.30.1.205","172.30.1.104","TCP","74","36574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914698 TSecr=0 WS=128" +"24929","11.472342","172.30.1.104","172.30.1.205","TCP","54","135 > 43936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24930","11.472369","172.30.1.104","172.30.1.205","TCP","54","135 > 43936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24931","11.472375","172.30.1.205","172.30.1.104","TCP","54","43936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24932","11.472459","172.30.1.104","172.30.1.205","TCP","66","49671 > 36574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24933","11.472468","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24934","11.472837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24935","11.475223","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24936","11.475230","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24937","11.477140","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24938","11.477569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24939","11.477575","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24940","11.478940","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24941","11.481905","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24942","11.481915","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24943","11.482880","172.30.1.205","172.30.1.104","TCP","74","43940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914709 TSecr=0 WS=128" +"24944","11.483198","172.30.1.104","172.30.1.205","TCP","66","135 > 43940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24945","11.483209","172.30.1.205","172.30.1.104","TCP","54","43940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24946","11.483561","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24947","11.483883","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24948","11.483892","172.30.1.205","172.30.1.104","TCP","54","43940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24949","11.486124","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24950","11.486548","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24951","11.486554","172.30.1.205","172.30.1.104","TCP","54","43940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24952","11.488362","172.30.1.205","172.30.1.104","TCP","54","43940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24953","11.488473","172.30.1.205","172.30.1.104","TCP","74","36578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914714 TSecr=0 WS=128" +"24954","11.488641","172.30.1.104","172.30.1.205","TCP","54","135 > 43940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24955","11.488676","172.30.1.104","172.30.1.205","TCP","54","135 > 43940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24956","11.488682","172.30.1.205","172.30.1.104","TCP","54","43940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24957","11.488766","172.30.1.104","172.30.1.205","TCP","66","49671 > 36578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24958","11.488785","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24959","11.489136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24960","11.489464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24961","11.489473","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24962","11.491332","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24963","11.491718","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24964","11.491725","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24965","11.493127","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24966","11.495378","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24967","11.495389","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24968","11.496341","172.30.1.205","172.30.1.104","TCP","74","43944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914722 TSecr=0 WS=128" +"24969","11.496672","172.30.1.104","172.30.1.205","TCP","66","135 > 43944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24970","11.496682","172.30.1.205","172.30.1.104","TCP","54","43944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24971","11.497061","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24972","11.497421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24973","11.497430","172.30.1.205","172.30.1.104","TCP","54","43944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24974","11.499608","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"24975","11.500013","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"24976","11.500020","172.30.1.205","172.30.1.104","TCP","54","43944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24977","11.501859","172.30.1.205","172.30.1.104","TCP","54","43944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"24978","11.501982","172.30.1.205","172.30.1.104","TCP","74","36582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914728 TSecr=0 WS=128" +"24979","11.502137","172.30.1.104","172.30.1.205","TCP","54","135 > 43944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24980","11.502167","172.30.1.104","172.30.1.205","TCP","54","135 > 43944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"24981","11.502173","172.30.1.205","172.30.1.104","TCP","54","43944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"24982","11.502313","172.30.1.104","172.30.1.205","TCP","66","49671 > 36582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24983","11.502321","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24984","11.502671","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"24985","11.502963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24986","11.502972","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24987","11.504865","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"24988","11.505232","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"24989","11.505239","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"24990","11.506600","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"24991","11.508862","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"24992","11.508872","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"24993","11.509860","172.30.1.205","172.30.1.104","TCP","74","43948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914736 TSecr=0 WS=128" +"24994","11.510166","172.30.1.104","172.30.1.205","TCP","66","135 > 43948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"24995","11.510178","172.30.1.205","172.30.1.104","TCP","54","43948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"24996","11.510532","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"24997","11.510880","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"24998","11.510889","172.30.1.205","172.30.1.104","TCP","54","43948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"24999","11.513121","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25000","11.513537","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25001","11.513544","172.30.1.205","172.30.1.104","TCP","54","43948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25002","11.515363","172.30.1.205","172.30.1.104","TCP","54","43948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25003","11.515480","172.30.1.205","172.30.1.104","TCP","74","36586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914741 TSecr=0 WS=128" +"25004","11.515639","172.30.1.104","172.30.1.205","TCP","54","135 > 43948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25005","11.515674","172.30.1.104","172.30.1.205","TCP","54","135 > 43948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25006","11.515681","172.30.1.205","172.30.1.104","TCP","54","43948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25007","11.515752","172.30.1.104","172.30.1.205","TCP","66","49671 > 36586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25008","11.515760","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25009","11.516108","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25010","11.516442","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25011","11.516451","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25012","11.518371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25013","11.518790","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25014","11.518796","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25015","11.520146","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25016","11.522455","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25017","11.522467","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25018","11.523429","172.30.1.205","172.30.1.104","TCP","74","43952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914749 TSecr=0 WS=128" +"25019","11.523743","172.30.1.104","172.30.1.205","TCP","66","135 > 43952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25020","11.523754","172.30.1.205","172.30.1.104","TCP","54","43952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25021","11.524110","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25022","11.524424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25023","11.524433","172.30.1.205","172.30.1.104","TCP","54","43952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25024","11.526673","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25025","11.527083","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25026","11.527091","172.30.1.205","172.30.1.104","TCP","54","43952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25027","11.528957","172.30.1.205","172.30.1.104","TCP","54","43952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25028","11.529071","172.30.1.205","172.30.1.104","TCP","74","36590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914755 TSecr=0 WS=128" +"25029","11.529242","172.30.1.104","172.30.1.205","TCP","54","135 > 43952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25030","11.529277","172.30.1.104","172.30.1.205","TCP","54","135 > 43952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25031","11.529283","172.30.1.205","172.30.1.104","TCP","54","43952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25032","11.529407","172.30.1.104","172.30.1.205","TCP","66","49671 > 36590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25033","11.529415","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25034","11.529765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25035","11.530067","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25036","11.530076","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25037","11.531977","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25038","11.532380","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25039","11.532387","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25040","11.533762","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25041","11.536549","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25042","11.536562","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25043","11.537565","172.30.1.205","172.30.1.104","TCP","74","43956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914763 TSecr=0 WS=128" +"25044","11.537928","172.30.1.104","172.30.1.205","TCP","66","135 > 43956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25045","11.537939","172.30.1.205","172.30.1.104","TCP","54","43956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25046","11.538298","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25047","11.538620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25048","11.538635","172.30.1.205","172.30.1.104","TCP","54","43956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25049","11.540959","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25050","11.541405","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25051","11.541412","172.30.1.205","172.30.1.104","TCP","54","43956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25052","11.543246","172.30.1.205","172.30.1.104","TCP","54","43956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25053","11.543377","172.30.1.205","172.30.1.104","TCP","74","36594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914769 TSecr=0 WS=128" +"25054","11.543562","172.30.1.104","172.30.1.205","TCP","54","135 > 43956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25055","11.543596","172.30.1.104","172.30.1.205","TCP","54","135 > 43956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25056","11.543603","172.30.1.205","172.30.1.104","TCP","54","43956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25057","11.543677","172.30.1.104","172.30.1.205","TCP","66","49671 > 36594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25058","11.543686","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25059","11.544038","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25060","11.544344","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25061","11.544353","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25062","11.546275","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25063","11.546650","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25064","11.546656","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25065","11.548012","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25066","11.550335","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25067","11.550345","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25068","11.551325","172.30.1.205","172.30.1.104","TCP","74","43960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914777 TSecr=0 WS=128" +"25069","11.551633","172.30.1.104","172.30.1.205","TCP","66","135 > 43960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25070","11.551644","172.30.1.205","172.30.1.104","TCP","54","43960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25071","11.552008","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25072","11.552312","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25073","11.552321","172.30.1.205","172.30.1.104","TCP","54","43960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25074","11.554540","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25075","11.554947","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25076","11.554953","172.30.1.205","172.30.1.104","TCP","54","43960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25077","11.555802","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25078","11.555864","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25079","11.555903","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25080","11.555937","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25081","11.555965","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25082","11.555988","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25083","11.556015","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25084","11.556043","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25085","11.556064","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25086","11.556090","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25087","11.556117","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25088","11.556190","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25089","11.556254","172.30.1.104","172.30.1.205","TCP","54","49671 > 36554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25090","11.556605","172.30.1.104","172.30.1.205","TCP","54","49671 > 36558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25091","11.556623","172.30.1.104","172.30.1.205","TCP","54","49671 > 36554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25092","11.556629","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25093","11.556668","172.30.1.104","172.30.1.205","TCP","54","49671 > 36558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25094","11.556672","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25095","11.556688","172.30.1.104","172.30.1.205","TCP","54","49671 > 36562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25096","11.556709","172.30.1.104","172.30.1.205","TCP","54","49671 > 36562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25097","11.556712","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25098","11.556791","172.30.1.104","172.30.1.205","TCP","54","49671 > 36566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25099","11.556808","172.30.1.104","172.30.1.205","TCP","54","49671 > 36570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25100","11.556847","172.30.1.104","172.30.1.205","TCP","54","49671 > 36566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25101","11.556852","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25102","11.556959","172.30.1.104","172.30.1.205","TCP","54","49671 > 36570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25103","11.556962","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25104","11.556967","172.30.1.104","172.30.1.205","TCP","54","49671 > 36574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25105","11.556972","172.30.1.104","172.30.1.205","TCP","54","49671 > 36574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25106","11.556974","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25107","11.557004","172.30.1.104","172.30.1.205","TCP","54","49671 > 36578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25108","11.557024","172.30.1.104","172.30.1.205","TCP","54","49671 > 36578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25109","11.557028","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25110","11.557254","172.30.1.104","172.30.1.205","TCP","54","49671 > 36582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25111","11.557261","172.30.1.104","172.30.1.205","TCP","54","49671 > 36582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25112","11.557266","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25113","11.557271","172.30.1.104","172.30.1.205","TCP","54","49671 > 36586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25114","11.557274","172.30.1.104","172.30.1.205","TCP","54","49671 > 36586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25115","11.557280","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25116","11.557281","172.30.1.104","172.30.1.205","TCP","54","49671 > 36590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25117","11.557284","172.30.1.104","172.30.1.205","TCP","54","49671 > 36590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25118","11.557285","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25119","11.557287","172.30.1.104","172.30.1.205","TCP","54","49671 > 36594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25120","11.557296","172.30.1.104","172.30.1.205","TCP","54","49671 > 36594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25121","11.557298","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25122","11.557746","172.30.1.205","172.30.1.104","TCP","54","43960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25123","11.557778","172.30.1.104","172.30.1.205","TCP","54","49671 > 36550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25124","11.557785","172.30.1.104","172.30.1.205","TCP","54","49671 > 36550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25125","11.557790","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25126","11.557882","172.30.1.205","172.30.1.104","TCP","74","36598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914784 TSecr=0 WS=128" +"25127","11.558044","172.30.1.104","172.30.1.205","TCP","54","135 > 43960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25128","11.558094","172.30.1.104","172.30.1.205","TCP","54","135 > 43960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25129","11.558099","172.30.1.205","172.30.1.104","TCP","54","43960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25130","11.558173","172.30.1.104","172.30.1.205","TCP","66","49671 > 36598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25131","11.558181","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25132","11.558540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25133","11.558845","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25134","11.558854","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25135","11.560723","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25136","11.561115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25137","11.561122","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25138","11.562496","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25139","11.564714","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25140","11.564723","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25141","11.565708","172.30.1.205","172.30.1.104","TCP","74","43964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914792 TSecr=0 WS=128" +"25142","11.566010","172.30.1.104","172.30.1.205","TCP","66","135 > 43964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25143","11.566021","172.30.1.205","172.30.1.104","TCP","54","43964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25144","11.566374","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25145","11.566686","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25146","11.566695","172.30.1.205","172.30.1.104","TCP","54","43964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25147","11.568908","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25148","11.569328","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25149","11.569334","172.30.1.205","172.30.1.104","TCP","54","43964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25150","11.571156","172.30.1.205","172.30.1.104","TCP","54","43964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25151","11.571268","172.30.1.205","172.30.1.104","TCP","74","36602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914797 TSecr=0 WS=128" +"25152","11.571434","172.30.1.104","172.30.1.205","TCP","54","135 > 43964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25153","11.571466","172.30.1.104","172.30.1.205","TCP","54","135 > 43964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25154","11.571471","172.30.1.205","172.30.1.104","TCP","54","43964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25155","11.571555","172.30.1.104","172.30.1.205","TCP","66","49671 > 36602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25156","11.571563","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25157","11.571930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25158","11.572248","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25159","11.572259","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25160","11.574165","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25161","11.574626","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25162","11.574634","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25163","11.576007","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25164","11.578259","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25165","11.578270","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25166","11.579227","172.30.1.205","172.30.1.104","TCP","74","43968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914805 TSecr=0 WS=128" +"25167","11.579615","172.30.1.104","172.30.1.205","TCP","66","135 > 43968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25168","11.579626","172.30.1.205","172.30.1.104","TCP","54","43968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25169","11.579984","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25170","11.580299","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25171","11.580308","172.30.1.205","172.30.1.104","TCP","54","43968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25172","11.582535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25173","11.582949","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25174","11.582956","172.30.1.205","172.30.1.104","TCP","54","43968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25175","11.584769","172.30.1.205","172.30.1.104","TCP","54","43968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25176","11.584891","172.30.1.205","172.30.1.104","TCP","74","36606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914811 TSecr=0 WS=128" +"25177","11.585075","172.30.1.104","172.30.1.205","TCP","54","135 > 43968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25178","11.585105","172.30.1.104","172.30.1.205","TCP","54","135 > 43968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25179","11.585111","172.30.1.205","172.30.1.104","TCP","54","43968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25180","11.585187","172.30.1.104","172.30.1.205","TCP","66","49671 > 36606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25181","11.585195","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25182","11.585544","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25183","11.585844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25184","11.585852","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25185","11.587778","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25186","11.588164","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25187","11.588170","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25188","11.589559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25189","11.591881","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25190","11.591890","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25191","11.592864","172.30.1.205","172.30.1.104","TCP","74","43972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914819 TSecr=0 WS=128" +"25192","11.593175","172.30.1.104","172.30.1.205","TCP","66","135 > 43972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25193","11.593186","172.30.1.205","172.30.1.104","TCP","54","43972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25194","11.593538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25195","11.593846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25196","11.593855","172.30.1.205","172.30.1.104","TCP","54","43972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25197","11.596121","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25198","11.596537","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25199","11.596543","172.30.1.205","172.30.1.104","TCP","54","43972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25200","11.598381","172.30.1.205","172.30.1.104","TCP","54","43972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25201","11.598493","172.30.1.205","172.30.1.104","TCP","74","36610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914824 TSecr=0 WS=128" +"25202","11.598668","172.30.1.104","172.30.1.205","TCP","54","135 > 43972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25203","11.598679","172.30.1.104","172.30.1.205","TCP","54","135 > 43972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25204","11.598684","172.30.1.205","172.30.1.104","TCP","54","43972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25205","11.598765","172.30.1.104","172.30.1.205","TCP","66","49671 > 36610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25206","11.598773","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25207","11.599129","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25208","11.599435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25209","11.599444","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25210","11.601347","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25211","11.601740","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25212","11.601746","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25213","11.603103","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25214","11.605449","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25215","11.605459","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25216","11.606401","172.30.1.205","172.30.1.104","TCP","74","43976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914832 TSecr=0 WS=128" +"25217","11.606739","172.30.1.104","172.30.1.205","TCP","66","135 > 43976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25218","11.606750","172.30.1.205","172.30.1.104","TCP","54","43976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25219","11.607099","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25220","11.607428","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25221","11.607437","172.30.1.205","172.30.1.104","TCP","54","43976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25222","11.609649","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25223","11.610091","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25224","11.610098","172.30.1.205","172.30.1.104","TCP","54","43976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25225","11.611955","172.30.1.205","172.30.1.104","TCP","54","43976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25226","11.612076","172.30.1.205","172.30.1.104","TCP","74","36614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914838 TSecr=0 WS=128" +"25227","11.612252","172.30.1.104","172.30.1.205","TCP","54","135 > 43976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25228","11.612293","172.30.1.104","172.30.1.205","TCP","54","135 > 43976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25229","11.612298","172.30.1.205","172.30.1.104","TCP","54","43976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25230","11.612370","172.30.1.104","172.30.1.205","TCP","66","49671 > 36614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25231","11.612378","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25232","11.612735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25233","11.613069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25234","11.613078","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25235","11.614950","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25236","11.616772","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25237","11.616788","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25238","11.618149","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25239","11.620555","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25240","11.620564","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25241","11.621523","172.30.1.205","172.30.1.104","TCP","74","43980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914847 TSecr=0 WS=128" +"25242","11.621875","172.30.1.104","172.30.1.205","TCP","66","135 > 43980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25243","11.621886","172.30.1.205","172.30.1.104","TCP","54","43980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25244","11.622244","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25245","11.622580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25246","11.622589","172.30.1.205","172.30.1.104","TCP","54","43980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25247","11.624769","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25248","11.625238","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25249","11.625245","172.30.1.205","172.30.1.104","TCP","54","43980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25250","11.627059","172.30.1.205","172.30.1.104","TCP","54","43980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25251","11.627170","172.30.1.205","172.30.1.104","TCP","74","36618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914853 TSecr=0 WS=128" +"25252","11.627456","172.30.1.104","172.30.1.205","TCP","66","49671 > 36618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25253","11.627466","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25254","11.627524","172.30.1.104","172.30.1.205","TCP","54","135 > 43980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25255","11.627532","172.30.1.104","172.30.1.205","TCP","54","135 > 43980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25256","11.627542","172.30.1.205","172.30.1.104","TCP","54","43980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25257","11.628162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25258","11.628510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25259","11.628519","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25260","11.630413","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25261","11.630803","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25262","11.630809","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25263","11.632163","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25264","11.634422","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25265","11.634432","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25266","11.635370","172.30.1.205","172.30.1.104","TCP","74","43984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914861 TSecr=0 WS=128" +"25267","11.635680","172.30.1.104","172.30.1.205","TCP","66","135 > 43984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25268","11.635691","172.30.1.205","172.30.1.104","TCP","54","43984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25269","11.636041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25270","11.636352","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25271","11.636360","172.30.1.205","172.30.1.104","TCP","54","43984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25272","11.638581","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25273","11.638972","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25274","11.638979","172.30.1.205","172.30.1.104","TCP","54","43984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25275","11.640804","172.30.1.205","172.30.1.104","TCP","54","43984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25276","11.640915","172.30.1.205","172.30.1.104","TCP","74","36622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914867 TSecr=0 WS=128" +"25277","11.641095","172.30.1.104","172.30.1.205","TCP","54","135 > 43984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25278","11.641157","172.30.1.104","172.30.1.205","TCP","54","135 > 43984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25279","11.641163","172.30.1.205","172.30.1.104","TCP","54","43984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25280","11.641237","172.30.1.104","172.30.1.205","TCP","66","49671 > 36622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25281","11.641246","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25282","11.641612","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25283","11.641947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25284","11.641955","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25285","11.643817","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25286","11.644205","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25287","11.644211","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25288","11.645600","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25289","11.647842","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25290","11.647852","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25291","11.648805","172.30.1.205","172.30.1.104","TCP","74","43988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914875 TSecr=0 WS=128" +"25292","11.649108","172.30.1.104","172.30.1.205","TCP","66","135 > 43988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25293","11.649118","172.30.1.205","172.30.1.104","TCP","54","43988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25294","11.649463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25295","11.649780","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25296","11.649789","172.30.1.205","172.30.1.104","TCP","54","43988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25297","11.651968","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25298","11.652470","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25299","11.652477","172.30.1.205","172.30.1.104","TCP","54","43988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25300","11.654316","172.30.1.205","172.30.1.104","TCP","54","43988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25301","11.654427","172.30.1.205","172.30.1.104","TCP","74","36626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914880 TSecr=0 WS=128" +"25302","11.654623","172.30.1.104","172.30.1.205","TCP","54","135 > 43988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25303","11.654632","172.30.1.104","172.30.1.205","TCP","54","135 > 43988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25304","11.654637","172.30.1.205","172.30.1.104","TCP","54","43988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25305","11.654709","172.30.1.104","172.30.1.205","TCP","66","49671 > 36626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25306","11.654717","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25307","11.655058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25308","11.655372","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25309","11.655380","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25310","11.657292","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25311","11.657661","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25312","11.657668","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25313","11.659014","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25314","11.662213","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25315","11.662222","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25316","11.663162","172.30.1.205","172.30.1.104","TCP","74","43992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914889 TSecr=0 WS=128" +"25317","11.663462","172.30.1.104","172.30.1.205","TCP","66","135 > 43992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25318","11.663472","172.30.1.205","172.30.1.104","TCP","54","43992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25319","11.663824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25320","11.664154","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25321","11.664168","172.30.1.205","172.30.1.104","TCP","54","43992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25322","11.666484","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25323","11.666917","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25324","11.666924","172.30.1.205","172.30.1.104","TCP","54","43992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25325","11.668763","172.30.1.205","172.30.1.104","TCP","54","43992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25326","11.668899","172.30.1.205","172.30.1.104","TCP","74","36630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914895 TSecr=0 WS=128" +"25327","11.669076","172.30.1.104","172.30.1.205","TCP","54","135 > 43992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25328","11.669086","172.30.1.104","172.30.1.205","TCP","54","135 > 43992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25329","11.669092","172.30.1.205","172.30.1.104","TCP","54","43992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25330","11.669193","172.30.1.104","172.30.1.205","TCP","66","49671 > 36630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25331","11.669202","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25332","11.669548","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25333","11.669867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25334","11.669876","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25335","11.671757","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25336","11.672157","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25337","11.672163","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25338","11.673545","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25339","11.675755","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25340","11.675767","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25341","11.676737","172.30.1.205","172.30.1.104","TCP","74","43996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914903 TSecr=0 WS=128" +"25342","11.677065","172.30.1.104","172.30.1.205","TCP","66","135 > 43996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25343","11.677076","172.30.1.205","172.30.1.104","TCP","54","43996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25344","11.677437","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25345","11.677735","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25346","11.677744","172.30.1.205","172.30.1.104","TCP","54","43996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25347","11.679927","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25348","11.680343","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25349","11.680350","172.30.1.205","172.30.1.104","TCP","54","43996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25350","11.682186","172.30.1.205","172.30.1.104","TCP","54","43996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25351","11.682299","172.30.1.205","172.30.1.104","TCP","74","36634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914908 TSecr=0 WS=128" +"25352","11.682456","172.30.1.104","172.30.1.205","TCP","54","135 > 43996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25353","11.682516","172.30.1.104","172.30.1.205","TCP","54","135 > 43996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25354","11.682522","172.30.1.205","172.30.1.104","TCP","54","43996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25355","11.682649","172.30.1.104","172.30.1.205","TCP","66","49671 > 36634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25356","11.682657","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25357","11.683001","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25358","11.683301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25359","11.683308","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25360","11.685203","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25361","11.685589","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25362","11.685595","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25363","11.686956","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25364","11.689145","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25365","11.689155","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25366","11.690101","172.30.1.205","172.30.1.104","TCP","74","44000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914916 TSecr=0 WS=128" +"25367","11.690417","172.30.1.104","172.30.1.205","TCP","66","135 > 44000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25368","11.690427","172.30.1.205","172.30.1.104","TCP","54","44000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25369","11.690779","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25370","11.691144","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25371","11.691155","172.30.1.205","172.30.1.104","TCP","54","44000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25372","11.693399","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25373","11.693811","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25374","11.693818","172.30.1.205","172.30.1.104","TCP","54","44000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25375","11.695624","172.30.1.205","172.30.1.104","TCP","54","44000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25376","11.695735","172.30.1.205","172.30.1.104","TCP","74","36638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914922 TSecr=0 WS=128" +"25377","11.695897","172.30.1.104","172.30.1.205","TCP","54","135 > 44000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25378","11.695953","172.30.1.104","172.30.1.205","TCP","54","135 > 44000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25379","11.695958","172.30.1.205","172.30.1.104","TCP","54","44000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25380","11.696030","172.30.1.104","172.30.1.205","TCP","66","49671 > 36638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25381","11.696039","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25382","11.696387","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25383","11.697885","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25384","11.697893","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25385","11.699768","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25386","11.700142","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25387","11.700149","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25388","11.701524","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25389","11.703736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25390","11.703747","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25391","11.704685","172.30.1.205","172.30.1.104","TCP","74","44004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914931 TSecr=0 WS=128" +"25392","11.705013","172.30.1.104","172.30.1.205","TCP","66","135 > 44004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25393","11.705025","172.30.1.205","172.30.1.104","TCP","54","44004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25394","11.705387","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25395","11.705716","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25396","11.705725","172.30.1.205","172.30.1.104","TCP","54","44004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25397","11.707937","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25398","11.708331","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25399","11.708341","172.30.1.205","172.30.1.104","TCP","54","44004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25400","11.710289","172.30.1.205","172.30.1.104","TCP","54","44004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25401","11.710421","172.30.1.205","172.30.1.104","TCP","74","36642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914936 TSecr=0 WS=128" +"25402","11.710617","172.30.1.104","172.30.1.205","TCP","54","135 > 44004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25403","11.710627","172.30.1.104","172.30.1.205","TCP","54","135 > 44004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25404","11.710634","172.30.1.205","172.30.1.104","TCP","54","44004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25405","11.710721","172.30.1.104","172.30.1.205","TCP","66","49671 > 36642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25406","11.710730","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25407","11.711081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25408","11.711383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25409","11.711392","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25410","11.713333","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25411","11.713737","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25412","11.713744","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25413","11.715100","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25414","11.717431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25415","11.717442","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25416","11.718414","172.30.1.205","172.30.1.104","TCP","74","44008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914944 TSecr=0 WS=128" +"25417","11.718792","172.30.1.104","172.30.1.205","TCP","66","135 > 44008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25418","11.718802","172.30.1.205","172.30.1.104","TCP","54","44008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25419","11.719152","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25420","11.719501","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25421","11.719514","172.30.1.205","172.30.1.104","TCP","54","44008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25422","11.721731","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25423","11.722155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25424","11.722162","172.30.1.205","172.30.1.104","TCP","54","44008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25425","11.723031","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25426","11.723081","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25427","11.723120","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25428","11.723149","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25429","11.723183","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25430","11.723210","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25431","11.723238","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25432","11.723270","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25433","11.723297","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25434","11.723318","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25435","11.723345","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25436","11.723418","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25437","11.723646","172.30.1.104","172.30.1.205","TCP","54","49671 > 36602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25438","11.723666","172.30.1.104","172.30.1.205","TCP","54","49671 > 36606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25439","11.723694","172.30.1.104","172.30.1.205","TCP","54","49671 > 36610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25440","11.723735","172.30.1.104","172.30.1.205","TCP","54","49671 > 36614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25441","11.723760","172.30.1.104","172.30.1.205","TCP","54","49671 > 36618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25442","11.723796","172.30.1.104","172.30.1.205","TCP","54","49671 > 36622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25443","11.723825","172.30.1.104","172.30.1.205","TCP","54","49671 > 36626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25444","11.723850","172.30.1.104","172.30.1.205","TCP","54","49671 > 36630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25445","11.723874","172.30.1.104","172.30.1.205","TCP","54","49671 > 36634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25446","11.723900","172.30.1.104","172.30.1.205","TCP","54","49671 > 36638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25447","11.723925","172.30.1.104","172.30.1.205","TCP","54","49671 > 36642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25448","11.723958","172.30.1.104","172.30.1.205","TCP","54","49671 > 36598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25449","11.724150","172.30.1.104","172.30.1.205","TCP","54","49671 > 36598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25450","11.724157","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25451","11.724205","172.30.1.104","172.30.1.205","TCP","54","49671 > 36642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25452","11.724209","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25453","11.724291","172.30.1.104","172.30.1.205","TCP","54","49671 > 36638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25454","11.724294","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25455","11.724351","172.30.1.104","172.30.1.205","TCP","54","49671 > 36634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25456","11.724354","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25457","11.724379","172.30.1.104","172.30.1.205","TCP","54","49671 > 36630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25458","11.724381","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25459","11.724415","172.30.1.104","172.30.1.205","TCP","54","49671 > 36626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25460","11.724418","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25461","11.724443","172.30.1.104","172.30.1.205","TCP","54","49671 > 36622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25462","11.724446","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25463","11.724479","172.30.1.104","172.30.1.205","TCP","54","49671 > 36618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25464","11.724483","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25465","11.724517","172.30.1.104","172.30.1.205","TCP","54","49671 > 36614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25466","11.724520","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25467","11.724547","172.30.1.104","172.30.1.205","TCP","54","49671 > 36602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25468","11.724550","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25469","11.724573","172.30.1.104","172.30.1.205","TCP","54","49671 > 36606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25470","11.724576","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25471","11.724598","172.30.1.104","172.30.1.205","TCP","54","49671 > 36610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25472","11.724601","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25473","11.725080","172.30.1.205","172.30.1.104","TCP","54","44008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25474","11.725194","172.30.1.205","172.30.1.104","TCP","74","36646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914951 TSecr=0 WS=128" +"25475","11.725368","172.30.1.104","172.30.1.205","TCP","54","135 > 44008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25476","11.725437","172.30.1.104","172.30.1.205","TCP","54","135 > 44008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25477","11.725442","172.30.1.205","172.30.1.104","TCP","54","44008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25478","11.725522","172.30.1.104","172.30.1.205","TCP","66","49671 > 36646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25479","11.725530","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25480","11.725883","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25481","11.726217","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25482","11.726226","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25483","11.728110","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25484","11.728515","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25485","11.728521","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25486","11.729913","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25487","11.732618","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25488","11.732627","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25489","11.733600","172.30.1.205","172.30.1.104","TCP","74","44012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914960 TSecr=0 WS=128" +"25490","11.733895","172.30.1.104","172.30.1.205","TCP","66","135 > 44012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25491","11.733906","172.30.1.205","172.30.1.104","TCP","54","44012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25492","11.734259","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25493","11.734566","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25494","11.734575","172.30.1.205","172.30.1.104","TCP","54","44012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25495","11.736798","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25496","11.737189","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25497","11.737195","172.30.1.205","172.30.1.104","TCP","54","44012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25498","11.739013","172.30.1.205","172.30.1.104","TCP","54","44012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25499","11.739124","172.30.1.205","172.30.1.104","TCP","74","36650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914965 TSecr=0 WS=128" +"25500","11.739311","172.30.1.104","172.30.1.205","TCP","54","135 > 44012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25501","11.739335","172.30.1.104","172.30.1.205","TCP","54","135 > 44012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25502","11.739340","172.30.1.205","172.30.1.104","TCP","54","44012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25503","11.739428","172.30.1.104","172.30.1.205","TCP","66","49671 > 36650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25504","11.739436","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25505","11.739784","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25506","11.742299","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25507","11.742310","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25508","11.744202","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25509","11.744582","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25510","11.744589","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25511","11.745972","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25512","11.748292","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25513","11.748301","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25514","11.749263","172.30.1.205","172.30.1.104","TCP","74","44016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914975 TSecr=0 WS=128" +"25515","11.749588","172.30.1.104","172.30.1.205","TCP","66","135 > 44016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25516","11.749599","172.30.1.205","172.30.1.104","TCP","54","44016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25517","11.749954","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25518","11.750258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25519","11.750267","172.30.1.205","172.30.1.104","TCP","54","44016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25520","11.752459","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25521","11.752862","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25522","11.752869","172.30.1.205","172.30.1.104","TCP","54","44016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25523","11.754685","172.30.1.205","172.30.1.104","TCP","54","44016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25524","11.754797","172.30.1.205","172.30.1.104","TCP","74","36654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914981 TSecr=0 WS=128" +"25525","11.755000","172.30.1.104","172.30.1.205","TCP","54","135 > 44016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25526","11.755036","172.30.1.104","172.30.1.205","TCP","54","135 > 44016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25527","11.755041","172.30.1.205","172.30.1.104","TCP","54","44016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25528","11.755138","172.30.1.104","172.30.1.205","TCP","66","49671 > 36654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25529","11.755147","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25530","11.755492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25531","11.755805","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25532","11.755814","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25533","11.757717","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25534","11.758136","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25535","11.758142","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25536","11.759490","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25537","11.761702","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25538","11.761712","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25539","11.762671","172.30.1.205","172.30.1.104","TCP","74","44020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914989 TSecr=0 WS=128" +"25540","11.762992","172.30.1.104","172.30.1.205","TCP","66","135 > 44020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25541","11.763003","172.30.1.205","172.30.1.104","TCP","54","44020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25542","11.763354","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25543","11.763648","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25544","11.763657","172.30.1.205","172.30.1.104","TCP","54","44020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25545","11.765885","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25546","11.766302","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25547","11.766308","172.30.1.205","172.30.1.104","TCP","54","44020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25548","11.768135","172.30.1.205","172.30.1.104","TCP","54","44020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25549","11.768247","172.30.1.205","172.30.1.104","TCP","74","36658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914994 TSecr=0 WS=128" +"25550","11.768446","172.30.1.104","172.30.1.205","TCP","54","135 > 44020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25551","11.768476","172.30.1.104","172.30.1.205","TCP","54","135 > 44020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25552","11.768482","172.30.1.205","172.30.1.104","TCP","54","44020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25553","11.768570","172.30.1.104","172.30.1.205","TCP","66","49671 > 36658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25554","11.768579","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25555","11.768957","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25556","11.769284","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25557","11.769291","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25558","11.771160","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25559","11.771561","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25560","11.771567","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25561","11.772953","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25562","11.775329","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25563","11.775338","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25564","11.776285","172.30.1.205","172.30.1.104","TCP","74","44024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915002 TSecr=0 WS=128" +"25565","11.776641","172.30.1.104","172.30.1.205","TCP","66","135 > 44024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25566","11.776652","172.30.1.205","172.30.1.104","TCP","54","44024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25567","11.777040","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25568","11.777413","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25569","11.777422","172.30.1.205","172.30.1.104","TCP","54","44024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25570","11.779598","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25571","11.780032","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25572","11.780039","172.30.1.205","172.30.1.104","TCP","54","44024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25573","11.781870","172.30.1.205","172.30.1.104","TCP","54","44024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25574","11.781986","172.30.1.205","172.30.1.104","TCP","74","36662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915008 TSecr=0 WS=128" +"25575","11.782154","172.30.1.104","172.30.1.205","TCP","54","135 > 44024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25576","11.782189","172.30.1.104","172.30.1.205","TCP","54","135 > 44024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25577","11.782195","172.30.1.205","172.30.1.104","TCP","54","44024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25578","11.782294","172.30.1.104","172.30.1.205","TCP","66","49671 > 36662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25579","11.782303","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25580","11.782686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25581","11.782996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25582","11.783006","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25583","11.784909","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25584","11.785347","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25585","11.785354","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25586","11.786704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25587","11.789059","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25588","11.789068","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25589","11.790008","172.30.1.205","172.30.1.104","TCP","74","44028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915016 TSecr=0 WS=128" +"25590","11.790311","172.30.1.104","172.30.1.205","TCP","66","135 > 44028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25591","11.790321","172.30.1.205","172.30.1.104","TCP","54","44028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25592","11.790681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25593","11.791166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25594","11.791175","172.30.1.205","172.30.1.104","TCP","54","44028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25595","11.793397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25596","11.793872","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25597","11.793879","172.30.1.205","172.30.1.104","TCP","54","44028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25598","11.795705","172.30.1.205","172.30.1.104","TCP","54","44028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25599","11.795837","172.30.1.205","172.30.1.104","TCP","74","36666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915022 TSecr=0 WS=128" +"25600","11.796002","172.30.1.104","172.30.1.205","TCP","54","135 > 44028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25601","11.796033","172.30.1.104","172.30.1.205","TCP","54","135 > 44028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25602","11.796039","172.30.1.205","172.30.1.104","TCP","54","44028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25603","11.796123","172.30.1.104","172.30.1.205","TCP","66","49671 > 36666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25604","11.796132","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25605","11.796480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25606","11.796792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25607","11.796802","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25608","11.798703","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25609","11.799130","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25610","11.799136","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25611","11.800494","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25612","11.802837","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25613","11.802849","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25614","11.803828","172.30.1.205","172.30.1.104","TCP","74","44032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915030 TSecr=0 WS=128" +"25615","11.804156","172.30.1.104","172.30.1.205","TCP","66","135 > 44032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25616","11.804167","172.30.1.205","172.30.1.104","TCP","54","44032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25617","11.804515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25618","11.804857","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25619","11.804866","172.30.1.205","172.30.1.104","TCP","54","44032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25620","11.807081","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25621","11.807562","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25622","11.807569","172.30.1.205","172.30.1.104","TCP","54","44032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25623","11.809411","172.30.1.205","172.30.1.104","TCP","54","44032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25624","11.809523","172.30.1.205","172.30.1.104","TCP","74","36670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915035 TSecr=0 WS=128" +"25625","11.809713","172.30.1.104","172.30.1.205","TCP","54","135 > 44032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25626","11.809760","172.30.1.104","172.30.1.205","TCP","54","135 > 44032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25627","11.809766","172.30.1.205","172.30.1.104","TCP","54","44032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25628","11.809853","172.30.1.104","172.30.1.205","TCP","66","49671 > 36670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25629","11.809861","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25630","11.810208","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25631","11.810577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25632","11.810586","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25633","11.812474","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25634","11.812865","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25635","11.812874","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25636","11.814325","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25637","11.816617","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25638","11.816629","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25639","11.817635","172.30.1.205","172.30.1.104","TCP","74","44036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915044 TSecr=0 WS=128" +"25640","11.817968","172.30.1.104","172.30.1.205","TCP","66","135 > 44036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25641","11.817980","172.30.1.205","172.30.1.104","TCP","54","44036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25642","11.818330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25643","11.818654","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25644","11.818663","172.30.1.205","172.30.1.104","TCP","54","44036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25645","11.820875","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25646","11.821293","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25647","11.821300","172.30.1.205","172.30.1.104","TCP","54","44036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25648","11.823099","172.30.1.205","172.30.1.104","TCP","54","44036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25649","11.823209","172.30.1.205","172.30.1.104","TCP","74","36674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915049 TSecr=0 WS=128" +"25650","11.823389","172.30.1.104","172.30.1.205","TCP","54","135 > 44036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25651","11.823422","172.30.1.104","172.30.1.205","TCP","54","135 > 44036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25652","11.823428","172.30.1.205","172.30.1.104","TCP","54","44036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25653","11.823487","172.30.1.104","172.30.1.205","TCP","66","49671 > 36674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25654","11.823495","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25655","11.823844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25656","11.824162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25657","11.824171","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25658","11.826080","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25659","11.826481","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25660","11.826487","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25661","11.827840","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25662","11.830941","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25663","11.830951","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25664","11.831889","172.30.1.205","172.30.1.104","TCP","74","44040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915058 TSecr=0 WS=128" +"25665","11.832194","172.30.1.104","172.30.1.205","TCP","66","135 > 44040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25666","11.832204","172.30.1.205","172.30.1.104","TCP","54","44040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25667","11.832552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25668","11.832860","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25669","11.832870","172.30.1.205","172.30.1.104","TCP","54","44040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25670","11.835054","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25671","11.835489","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25672","11.835496","172.30.1.205","172.30.1.104","TCP","54","44040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25673","11.837333","172.30.1.205","172.30.1.104","TCP","54","44040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25674","11.837442","172.30.1.205","172.30.1.104","TCP","74","36678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915063 TSecr=0 WS=128" +"25675","11.837700","172.30.1.104","172.30.1.205","TCP","54","135 > 44040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25676","11.837709","172.30.1.104","172.30.1.205","TCP","54","135 > 44040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25677","11.837714","172.30.1.205","172.30.1.104","TCP","54","44040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25678","11.837723","172.30.1.104","172.30.1.205","TCP","66","49671 > 36678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25679","11.837734","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25680","11.838078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25681","11.838417","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25682","11.838433","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25683","11.840299","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25684","11.840709","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25685","11.840715","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25686","11.842074","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25687","11.844351","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25688","11.844360","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25689","11.845312","172.30.1.205","172.30.1.104","TCP","74","44044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915071 TSecr=0 WS=128" +"25690","11.845649","172.30.1.104","172.30.1.205","TCP","66","135 > 44044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25691","11.845659","172.30.1.205","172.30.1.104","TCP","54","44044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25692","11.846004","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25693","11.846318","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25694","11.846327","172.30.1.205","172.30.1.104","TCP","54","44044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25695","11.848505","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25696","11.848960","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25697","11.848967","172.30.1.205","172.30.1.104","TCP","54","44044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25698","11.850787","172.30.1.205","172.30.1.104","TCP","54","44044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25699","11.850896","172.30.1.205","172.30.1.104","TCP","74","36682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915077 TSecr=0 WS=128" +"25700","11.851081","172.30.1.104","172.30.1.205","TCP","54","135 > 44044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25701","11.851112","172.30.1.104","172.30.1.205","TCP","54","135 > 44044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25702","11.851118","172.30.1.205","172.30.1.104","TCP","54","44044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25703","11.851194","172.30.1.104","172.30.1.205","TCP","66","49671 > 36682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25704","11.851202","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25705","11.851545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25706","11.851866","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25707","11.851874","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25708","11.853773","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25709","11.854213","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25710","11.854220","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25711","11.855552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25712","11.857872","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25713","11.857881","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25714","11.858834","172.30.1.205","172.30.1.104","TCP","74","44048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915085 TSecr=0 WS=128" +"25715","11.859228","172.30.1.104","172.30.1.205","TCP","66","135 > 44048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25716","11.859238","172.30.1.205","172.30.1.104","TCP","54","44048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25717","11.859585","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25718","11.859898","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25719","11.859907","172.30.1.205","172.30.1.104","TCP","54","44048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25720","11.862116","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25721","11.862546","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25722","11.862553","172.30.1.205","172.30.1.104","TCP","54","44048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25723","11.864352","172.30.1.205","172.30.1.104","TCP","54","44048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25724","11.864463","172.30.1.205","172.30.1.104","TCP","74","36686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915090 TSecr=0 WS=128" +"25725","11.864673","172.30.1.104","172.30.1.205","TCP","54","135 > 44048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25726","11.864681","172.30.1.104","172.30.1.205","TCP","54","135 > 44048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25727","11.864686","172.30.1.205","172.30.1.104","TCP","54","44048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25728","11.864769","172.30.1.104","172.30.1.205","TCP","66","49671 > 36686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25729","11.864787","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25730","11.865143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25731","11.865450","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25732","11.865459","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25733","11.867334","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25734","11.867721","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25735","11.867727","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25736","11.869119","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25737","11.871455","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25738","11.871466","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25739","11.872404","172.30.1.205","172.30.1.104","TCP","74","44052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915098 TSecr=0 WS=128" +"25740","11.872707","172.30.1.104","172.30.1.205","TCP","66","135 > 44052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25741","11.872718","172.30.1.205","172.30.1.104","TCP","54","44052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25742","11.873108","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25743","11.873408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25744","11.873417","172.30.1.205","172.30.1.104","TCP","54","44052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25745","11.875600","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25746","11.876069","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25747","11.876076","172.30.1.205","172.30.1.104","TCP","54","44052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25748","11.877897","172.30.1.205","172.30.1.104","TCP","54","44052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25749","11.878005","172.30.1.205","172.30.1.104","TCP","74","36690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915104 TSecr=0 WS=128" +"25750","11.878186","172.30.1.104","172.30.1.205","TCP","54","135 > 44052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25751","11.878219","172.30.1.104","172.30.1.205","TCP","54","135 > 44052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25752","11.878224","172.30.1.205","172.30.1.104","TCP","54","44052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25753","11.878312","172.30.1.104","172.30.1.205","TCP","66","49671 > 36690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25754","11.878320","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25755","11.878667","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25756","11.878963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25757","11.878971","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25758","11.880862","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25759","11.881241","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25760","11.881247","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25761","11.882614","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25762","11.884928","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25763","11.884956","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25764","11.885888","172.30.1.205","172.30.1.104","TCP","74","44056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915112 TSecr=0 WS=128" +"25765","11.886232","172.30.1.104","172.30.1.205","TCP","66","135 > 44056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25766","11.886243","172.30.1.205","172.30.1.104","TCP","54","44056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25767","11.886616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25768","11.886913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25769","11.886921","172.30.1.205","172.30.1.104","TCP","54","44056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25770","11.889110","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25771","11.889541","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25772","11.889550","172.30.1.205","172.30.1.104","TCP","54","44056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25773","11.890470","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25774","11.890518","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25775","11.890555","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25776","11.890589","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25777","11.890616","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25778","11.890644","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25779","11.890680","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25780","11.890709","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25781","11.890740","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25782","11.890767","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25783","11.890794","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25784","11.890866","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25785","11.891127","172.30.1.104","172.30.1.205","TCP","54","49671 > 36650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25786","11.891142","172.30.1.104","172.30.1.205","TCP","54","49671 > 36654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25787","11.891177","172.30.1.104","172.30.1.205","TCP","54","49671 > 36650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25788","11.891185","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25789","11.891201","172.30.1.104","172.30.1.205","TCP","54","49671 > 36658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25790","11.891256","172.30.1.104","172.30.1.205","TCP","54","49671 > 36662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25791","11.891275","172.30.1.104","172.30.1.205","TCP","54","49671 > 36654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25792","11.891280","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25793","11.891295","172.30.1.104","172.30.1.205","TCP","54","49671 > 36666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25794","11.891319","172.30.1.104","172.30.1.205","TCP","54","49671 > 36670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25795","11.891339","172.30.1.104","172.30.1.205","TCP","54","49671 > 36666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25796","11.891343","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25797","11.891360","172.30.1.104","172.30.1.205","TCP","54","49671 > 36670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25798","11.891362","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25799","11.891427","172.30.1.104","172.30.1.205","TCP","54","49671 > 36658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25800","11.891430","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25801","11.891447","172.30.1.104","172.30.1.205","TCP","54","49671 > 36674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25802","11.891468","172.30.1.104","172.30.1.205","TCP","54","49671 > 36662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25803","11.891472","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25804","11.891501","172.30.1.104","172.30.1.205","TCP","54","49671 > 36678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25805","11.891522","172.30.1.104","172.30.1.205","TCP","54","49671 > 36674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25806","11.891527","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25807","11.891543","172.30.1.104","172.30.1.205","TCP","54","49671 > 36682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25808","11.891566","172.30.1.104","172.30.1.205","TCP","54","49671 > 36678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25809","11.891569","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25810","11.891588","172.30.1.104","172.30.1.205","TCP","54","49671 > 36686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25811","11.891716","172.30.1.104","172.30.1.205","TCP","54","49671 > 36682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25812","11.891720","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25813","11.891736","172.30.1.104","172.30.1.205","TCP","54","49671 > 36690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25814","11.891760","172.30.1.104","172.30.1.205","TCP","54","49671 > 36686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25815","11.891763","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25816","11.892033","172.30.1.104","172.30.1.205","TCP","54","49671 > 36646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25817","11.892118","172.30.1.104","172.30.1.205","TCP","54","49671 > 36690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25818","11.892125","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25819","11.892156","172.30.1.104","172.30.1.205","TCP","54","49671 > 36646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"25820","11.892159","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"25821","11.892482","172.30.1.205","172.30.1.104","TCP","54","44056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25822","11.892598","172.30.1.205","172.30.1.104","TCP","74","36694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915119 TSecr=0 WS=128" +"25823","11.892747","172.30.1.104","172.30.1.205","TCP","54","135 > 44056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25824","11.892792","172.30.1.104","172.30.1.205","TCP","54","135 > 44056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25825","11.892798","172.30.1.205","172.30.1.104","TCP","54","44056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25826","11.892890","172.30.1.104","172.30.1.205","TCP","66","49671 > 36694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25827","11.892898","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25828","11.893266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25829","11.893567","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25830","11.893574","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25831","11.895448","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25832","11.895831","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25833","11.895837","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25834","11.897220","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25835","11.899553","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25836","11.899562","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25837","11.900491","172.30.1.205","172.30.1.104","TCP","74","44060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915126 TSecr=0 WS=128" +"25838","11.900813","172.30.1.104","172.30.1.205","TCP","66","135 > 44060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25839","11.900836","172.30.1.205","172.30.1.104","TCP","54","44060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25840","11.901377","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25841","11.901716","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25842","11.901725","172.30.1.205","172.30.1.104","TCP","54","44060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25843","11.903893","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25844","11.904281","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25845","11.904288","172.30.1.205","172.30.1.104","TCP","54","44060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25846","11.906125","172.30.1.205","172.30.1.104","TCP","54","44060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25847","11.906233","172.30.1.205","172.30.1.104","TCP","74","36698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915132 TSecr=0 WS=128" +"25848","11.906396","172.30.1.104","172.30.1.205","TCP","54","135 > 44060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25849","11.906427","172.30.1.104","172.30.1.205","TCP","54","135 > 44060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25850","11.906432","172.30.1.205","172.30.1.104","TCP","54","44060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25851","11.906537","172.30.1.104","172.30.1.205","TCP","66","49671 > 36698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25852","11.906545","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25853","11.906886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25854","11.907186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25855","11.907195","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25856","11.909074","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25857","11.909456","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25858","11.909460","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25859","11.910797","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25860","11.913067","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25861","11.913080","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25862","11.914121","172.30.1.205","172.30.1.104","TCP","74","44064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915140 TSecr=0 WS=128" +"25863","11.914434","172.30.1.104","172.30.1.205","TCP","66","135 > 44064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25864","11.914446","172.30.1.205","172.30.1.104","TCP","54","44064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25865","11.914799","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25866","11.915156","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25867","11.915170","172.30.1.205","172.30.1.104","TCP","54","44064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25868","11.917523","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25869","11.917906","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25870","11.917913","172.30.1.205","172.30.1.104","TCP","54","44064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25871","11.919753","172.30.1.205","172.30.1.104","TCP","54","44064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25872","11.919887","172.30.1.205","172.30.1.104","TCP","74","36702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915146 TSecr=0 WS=128" +"25873","11.920026","172.30.1.104","172.30.1.205","TCP","54","135 > 44064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25874","11.920093","172.30.1.104","172.30.1.205","TCP","54","135 > 44064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25875","11.920100","172.30.1.205","172.30.1.104","TCP","54","44064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25876","11.920173","172.30.1.104","172.30.1.205","TCP","66","49671 > 36702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25877","11.920182","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25878","11.920530","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25879","11.920832","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25880","11.920841","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25881","11.922762","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25882","11.923166","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25883","11.923173","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25884","11.924567","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25885","11.927860","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25886","11.927874","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25887","11.928917","172.30.1.205","172.30.1.104","TCP","74","44068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915155 TSecr=0 WS=128" +"25888","11.929252","172.30.1.104","172.30.1.205","TCP","66","135 > 44068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25889","11.929265","172.30.1.205","172.30.1.104","TCP","54","44068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25890","11.929634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25891","11.929955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25892","11.929965","172.30.1.205","172.30.1.104","TCP","54","44068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25893","11.932186","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25894","11.932596","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25895","11.932604","172.30.1.205","172.30.1.104","TCP","54","44068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25896","11.934461","172.30.1.205","172.30.1.104","TCP","54","44068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25897","11.934574","172.30.1.205","172.30.1.104","TCP","74","36706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915160 TSecr=0 WS=128" +"25898","11.934747","172.30.1.104","172.30.1.205","TCP","54","135 > 44068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25899","11.934783","172.30.1.104","172.30.1.205","TCP","54","135 > 44068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25900","11.934789","172.30.1.205","172.30.1.104","TCP","54","44068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25901","11.934907","172.30.1.104","172.30.1.205","TCP","66","49671 > 36706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25902","11.934915","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25903","11.935263","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25904","11.935596","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25905","11.935605","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25906","11.937538","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25907","11.937968","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25908","11.937975","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25909","11.939334","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25910","11.941771","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25911","11.941789","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25912","11.942787","172.30.1.205","172.30.1.104","TCP","74","44072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915169 TSecr=0 WS=128" +"25913","11.943101","172.30.1.104","172.30.1.205","TCP","66","135 > 44072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25914","11.943112","172.30.1.205","172.30.1.104","TCP","54","44072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25915","11.943464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25916","11.943770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25917","11.943779","172.30.1.205","172.30.1.104","TCP","54","44072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25918","11.945999","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25919","11.946444","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25920","11.946451","172.30.1.205","172.30.1.104","TCP","54","44072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25921","11.948258","172.30.1.205","172.30.1.104","TCP","54","44072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25922","11.948368","172.30.1.205","172.30.1.104","TCP","74","36710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915174 TSecr=0 WS=128" +"25923","11.948533","172.30.1.104","172.30.1.205","TCP","54","135 > 44072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25924","11.948566","172.30.1.104","172.30.1.205","TCP","54","135 > 44072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25925","11.948571","172.30.1.205","172.30.1.104","TCP","54","44072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25926","11.948667","172.30.1.104","172.30.1.205","TCP","66","49671 > 36710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25927","11.948675","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25928","11.949056","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25929","11.949378","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25930","11.949385","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25931","11.951260","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25932","11.951642","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25933","11.951648","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25934","11.953037","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25935","11.955453","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25936","11.955464","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25937","11.956430","172.30.1.205","172.30.1.104","TCP","74","44076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915182 TSecr=0 WS=128" +"25938","11.956768","172.30.1.104","172.30.1.205","TCP","66","135 > 44076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25939","11.956788","172.30.1.205","172.30.1.104","TCP","54","44076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25940","11.957152","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25941","11.957472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25942","11.957482","172.30.1.205","172.30.1.104","TCP","54","44076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25943","11.959676","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25944","11.960096","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25945","11.960108","172.30.1.205","172.30.1.104","TCP","54","44076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25946","11.961950","172.30.1.205","172.30.1.104","TCP","54","44076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25947","11.962062","172.30.1.205","172.30.1.104","TCP","74","36714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915188 TSecr=0 WS=128" +"25948","11.962245","172.30.1.104","172.30.1.205","TCP","54","135 > 44076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25949","11.962273","172.30.1.104","172.30.1.205","TCP","54","135 > 44076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25950","11.962279","172.30.1.205","172.30.1.104","TCP","54","44076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25951","11.962318","172.30.1.104","172.30.1.205","TCP","66","49671 > 36714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25952","11.962326","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25953","11.962674","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25954","11.962965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25955","11.962974","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25956","11.964890","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25957","11.965308","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25958","11.965314","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25959","11.966674","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25960","11.969020","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25961","11.969030","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25962","11.969979","172.30.1.205","172.30.1.104","TCP","74","44080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915196 TSecr=0 WS=128" +"25963","11.970270","172.30.1.104","172.30.1.205","TCP","66","135 > 44080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25964","11.970281","172.30.1.205","172.30.1.104","TCP","54","44080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25965","11.970633","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25966","11.970928","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25967","11.970936","172.30.1.205","172.30.1.104","TCP","54","44080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25968","11.973180","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25969","11.973579","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25970","11.973586","172.30.1.205","172.30.1.104","TCP","54","44080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25971","11.975397","172.30.1.205","172.30.1.104","TCP","54","44080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25972","11.975508","172.30.1.205","172.30.1.104","TCP","74","36718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915201 TSecr=0 WS=128" +"25973","11.975683","172.30.1.104","172.30.1.205","TCP","54","135 > 44080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25974","11.975730","172.30.1.104","172.30.1.205","TCP","54","135 > 44080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25975","11.975736","172.30.1.205","172.30.1.104","TCP","54","44080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"25976","11.975815","172.30.1.104","172.30.1.205","TCP","66","49671 > 36718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25977","11.975823","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25978","11.976167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"25979","11.976497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25980","11.976506","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25981","11.978416","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"25982","11.978794","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"25983","11.978800","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"25984","11.980155","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"25985","11.982551","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"25986","11.982560","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"25987","11.983498","172.30.1.205","172.30.1.104","TCP","74","44084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915209 TSecr=0 WS=128" +"25988","11.983813","172.30.1.104","172.30.1.205","TCP","66","135 > 44084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"25989","11.983824","172.30.1.205","172.30.1.104","TCP","54","44084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"25990","11.984177","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"25991","11.984478","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"25992","11.984487","172.30.1.205","172.30.1.104","TCP","54","44084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"25993","11.986800","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"25994","11.987236","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"25995","11.987242","172.30.1.205","172.30.1.104","TCP","54","44084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25996","11.989070","172.30.1.205","172.30.1.104","TCP","54","44084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"25997","11.989183","172.30.1.205","172.30.1.104","TCP","74","36722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915215 TSecr=0 WS=128" +"25998","11.989361","172.30.1.104","172.30.1.205","TCP","54","135 > 44084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"25999","11.989384","172.30.1.104","172.30.1.205","TCP","54","135 > 44084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26000","11.989389","172.30.1.205","172.30.1.104","TCP","54","44084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26001","11.989490","172.30.1.104","172.30.1.205","TCP","66","49671 > 36722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26002","11.989509","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26003","11.989862","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26004","11.990185","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26005","11.990202","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26006","11.992248","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26007","11.992757","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26008","11.992764","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26009","11.994151","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26010","11.996612","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26011","11.996621","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26012","11.997623","172.30.1.205","172.30.1.104","TCP","74","44088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915224 TSecr=0 WS=128" +"26013","11.998005","172.30.1.104","172.30.1.205","TCP","66","135 > 44088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26014","11.998026","172.30.1.205","172.30.1.104","TCP","54","44088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26015","11.998623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26016","11.998946","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26017","11.998954","172.30.1.205","172.30.1.104","TCP","54","44088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26018","12.001155","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26019","12.001581","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26020","12.001588","172.30.1.205","172.30.1.104","TCP","54","44088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26021","12.003414","172.30.1.205","172.30.1.104","TCP","54","44088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26022","12.003525","172.30.1.205","172.30.1.104","TCP","74","36726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915229 TSecr=0 WS=128" +"26023","12.003718","172.30.1.104","172.30.1.205","TCP","54","135 > 44088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26024","12.003775","172.30.1.104","172.30.1.205","TCP","54","135 > 44088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26025","12.003785","172.30.1.205","172.30.1.104","TCP","54","44088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26026","12.003857","172.30.1.104","172.30.1.205","TCP","66","49671 > 36726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26027","12.003868","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26028","12.004289","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26029","12.004601","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26030","12.004613","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26031","12.006535","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26032","12.006916","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26033","12.006929","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26034","12.008294","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26035","12.010659","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26036","12.010670","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26037","12.011648","172.30.1.205","172.30.1.104","TCP","74","44092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915238 TSecr=0 WS=128" +"26038","12.012025","172.30.1.104","172.30.1.205","TCP","66","135 > 44092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26039","12.012036","172.30.1.205","172.30.1.104","TCP","54","44092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26040","12.012388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26041","12.012712","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26042","12.012721","172.30.1.205","172.30.1.104","TCP","54","44092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26043","12.014955","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26044","12.015418","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26045","12.015426","172.30.1.205","172.30.1.104","TCP","54","44092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26046","12.017300","172.30.1.205","172.30.1.104","TCP","54","44092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26047","12.017419","172.30.1.205","172.30.1.104","TCP","74","36730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915243 TSecr=0 WS=128" +"26048","12.017624","172.30.1.104","172.30.1.205","TCP","54","135 > 44092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26049","12.017636","172.30.1.104","172.30.1.205","TCP","54","135 > 44092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26050","12.017643","172.30.1.205","172.30.1.104","TCP","54","44092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26051","12.017725","172.30.1.104","172.30.1.205","TCP","66","49671 > 36730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26052","12.017733","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26053","12.018083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26054","12.018381","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26055","12.018390","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26056","12.020270","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26057","12.022380","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26058","12.022388","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26059","12.023771","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26060","12.026253","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26061","12.026266","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26062","12.027308","172.30.1.205","172.30.1.104","TCP","74","44096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915253 TSecr=0 WS=128" +"26063","12.027647","172.30.1.104","172.30.1.205","TCP","66","135 > 44096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26064","12.027658","172.30.1.205","172.30.1.104","TCP","54","44096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26065","12.028021","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26066","12.028359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26067","12.028368","172.30.1.205","172.30.1.104","TCP","54","44096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26068","12.030604","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26069","12.031019","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26070","12.031026","172.30.1.205","172.30.1.104","TCP","54","44096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26071","12.032856","172.30.1.205","172.30.1.104","TCP","54","44096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26072","12.032975","172.30.1.205","172.30.1.104","TCP","74","36734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915259 TSecr=0 WS=128" +"26073","12.033273","172.30.1.104","172.30.1.205","TCP","54","135 > 44096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26074","12.033282","172.30.1.104","172.30.1.205","TCP","54","135 > 44096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26075","12.033295","172.30.1.205","172.30.1.104","TCP","54","44096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26076","12.033303","172.30.1.104","172.30.1.205","TCP","66","49671 > 36734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26077","12.033311","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26078","12.033661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26079","12.034009","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26080","12.034018","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26081","12.035908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26082","12.036303","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26083","12.036309","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26084","12.037695","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26085","12.041960","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26086","12.041970","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26087","12.042914","172.30.1.205","172.30.1.104","TCP","74","44100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915269 TSecr=0 WS=128" +"26088","12.043256","172.30.1.104","172.30.1.205","TCP","66","135 > 44100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26089","12.043266","172.30.1.205","172.30.1.104","TCP","54","44100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26090","12.043611","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26091","12.043975","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26092","12.043983","172.30.1.205","172.30.1.104","TCP","54","44100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26093","12.046182","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26094","12.046592","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26095","12.046598","172.30.1.205","172.30.1.104","TCP","54","44100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26096","12.048392","172.30.1.205","172.30.1.104","TCP","54","44100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26097","12.048501","172.30.1.205","172.30.1.104","TCP","74","36738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915274 TSecr=0 WS=128" +"26098","12.048687","172.30.1.104","172.30.1.205","TCP","54","135 > 44100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26099","12.048766","172.30.1.104","172.30.1.205","TCP","54","135 > 44100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26100","12.048771","172.30.1.205","172.30.1.104","TCP","54","44100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26101","12.048858","172.30.1.104","172.30.1.205","TCP","66","49671 > 36738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26102","12.048867","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26103","12.049215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26104","12.049524","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26105","12.049533","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26106","12.051391","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26107","12.051784","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26108","12.051791","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26109","12.053173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26110","12.055469","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26111","12.055478","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26112","12.056405","172.30.1.205","172.30.1.104","TCP","74","44104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915282 TSecr=0 WS=128" +"26113","12.056717","172.30.1.104","172.30.1.205","TCP","66","135 > 44104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26114","12.056738","172.30.1.205","172.30.1.104","TCP","54","44104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26115","12.057271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26116","12.057592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26117","12.057604","172.30.1.205","172.30.1.104","TCP","54","44104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26118","12.059790","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26119","12.060224","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26120","12.060231","172.30.1.205","172.30.1.104","TCP","54","44104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26121","12.061090","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26122","12.061137","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26123","12.061181","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26124","12.061212","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26125","12.061243","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26126","12.061269","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26127","12.061297","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26128","12.061323","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26129","12.061350","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26130","12.061376","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26131","12.061408","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26132","12.061477","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26133","12.061726","172.30.1.104","172.30.1.205","TCP","54","49671 > 36698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26134","12.061747","172.30.1.104","172.30.1.205","TCP","54","49671 > 36702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26135","12.061771","172.30.1.104","172.30.1.205","TCP","54","49671 > 36702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26136","12.061778","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26137","12.061796","172.30.1.104","172.30.1.205","TCP","54","49671 > 36706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26138","12.061822","172.30.1.104","172.30.1.205","TCP","54","49671 > 36710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26139","12.061873","172.30.1.104","172.30.1.205","TCP","54","49671 > 36698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26140","12.061878","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26141","12.061896","172.30.1.104","172.30.1.205","TCP","54","49671 > 36714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26142","12.061924","172.30.1.104","172.30.1.205","TCP","54","49671 > 36718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26143","12.061947","172.30.1.104","172.30.1.205","TCP","54","49671 > 36714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26144","12.061951","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26145","12.061973","172.30.1.104","172.30.1.205","TCP","54","49671 > 36722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26146","12.061996","172.30.1.104","172.30.1.205","TCP","54","49671 > 36710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26147","12.061999","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26148","12.062033","172.30.1.104","172.30.1.205","TCP","54","49671 > 36726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26149","12.062060","172.30.1.104","172.30.1.205","TCP","54","49671 > 36726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26150","12.062064","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26151","12.062098","172.30.1.104","172.30.1.205","TCP","54","49671 > 36730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26152","12.062124","172.30.1.104","172.30.1.205","TCP","54","49671 > 36722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26153","12.062131","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26154","12.062241","172.30.1.104","172.30.1.205","TCP","54","49671 > 36718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26155","12.062245","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26156","12.062267","172.30.1.104","172.30.1.205","TCP","54","49671 > 36734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26157","12.062293","172.30.1.104","172.30.1.205","TCP","54","49671 > 36738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26158","12.062324","172.30.1.104","172.30.1.205","TCP","54","49671 > 36734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26159","12.062328","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26160","12.062352","172.30.1.104","172.30.1.205","TCP","54","49671 > 36730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26161","12.062355","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26162","12.062505","172.30.1.104","172.30.1.205","TCP","54","49671 > 36694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26163","12.062529","172.30.1.104","172.30.1.205","TCP","54","49671 > 36694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26164","12.062533","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26165","12.062555","172.30.1.104","172.30.1.205","TCP","54","49671 > 36738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26166","12.062558","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26167","12.062585","172.30.1.104","172.30.1.205","TCP","54","49671 > 36706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26168","12.062589","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26169","12.063062","172.30.1.205","172.30.1.104","TCP","54","44104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26170","12.063171","172.30.1.205","172.30.1.104","TCP","74","36742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915289 TSecr=0 WS=128" +"26171","12.063349","172.30.1.104","172.30.1.205","TCP","54","135 > 44104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26172","12.063373","172.30.1.104","172.30.1.205","TCP","54","135 > 44104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26173","12.063378","172.30.1.205","172.30.1.104","TCP","54","44104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26174","12.063461","172.30.1.104","172.30.1.205","TCP","66","49671 > 36742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26175","12.063470","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26176","12.063827","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26177","12.064146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26178","12.064154","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26179","12.066067","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26180","12.066456","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26181","12.066462","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26182","12.067814","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26183","12.070145","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26184","12.070155","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26185","12.071090","172.30.1.205","172.30.1.104","TCP","74","44108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915297 TSecr=0 WS=128" +"26186","12.071396","172.30.1.104","172.30.1.205","TCP","66","135 > 44108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26187","12.071406","172.30.1.205","172.30.1.104","TCP","54","44108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26188","12.071754","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26189","12.072087","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26190","12.072101","172.30.1.205","172.30.1.104","TCP","54","44108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26191","12.074420","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26192","12.074885","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26193","12.074892","172.30.1.205","172.30.1.104","TCP","54","44108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26194","12.076732","172.30.1.205","172.30.1.104","TCP","54","44108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26195","12.076877","172.30.1.205","172.30.1.104","TCP","74","36746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915303 TSecr=0 WS=128" +"26196","12.077055","172.30.1.104","172.30.1.205","TCP","54","135 > 44108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26197","12.077091","172.30.1.104","172.30.1.205","TCP","54","135 > 44108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26198","12.077097","172.30.1.205","172.30.1.104","TCP","54","44108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26199","12.077175","172.30.1.104","172.30.1.205","TCP","66","49671 > 36746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26200","12.077184","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26201","12.077531","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26202","12.077861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26203","12.077870","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26204","12.079757","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26205","12.080139","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26206","12.080144","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26207","12.081530","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26208","12.083885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26209","12.083895","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26210","12.084857","172.30.1.205","172.30.1.104","TCP","74","44112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915311 TSecr=0 WS=128" +"26211","12.085187","172.30.1.104","172.30.1.205","TCP","66","135 > 44112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26212","12.085198","172.30.1.205","172.30.1.104","TCP","54","44112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26213","12.085555","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26214","12.085860","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26215","12.085869","172.30.1.205","172.30.1.104","TCP","54","44112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26216","12.088072","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26217","12.088500","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26218","12.088507","172.30.1.205","172.30.1.104","TCP","54","44112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26219","12.090336","172.30.1.205","172.30.1.104","TCP","54","44112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26220","12.090457","172.30.1.205","172.30.1.104","TCP","74","36750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915316 TSecr=0 WS=128" +"26221","12.090639","172.30.1.104","172.30.1.205","TCP","54","135 > 44112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26222","12.090669","172.30.1.104","172.30.1.205","TCP","54","135 > 44112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26223","12.090676","172.30.1.205","172.30.1.104","TCP","54","44112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26224","12.090758","172.30.1.104","172.30.1.205","TCP","66","49671 > 36750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26225","12.090767","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26226","12.091114","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26227","12.091441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26228","12.091450","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26229","12.093355","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26230","12.093744","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26231","12.093751","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26232","12.095105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26233","12.097488","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26234","12.097499","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26235","12.098453","172.30.1.205","172.30.1.104","TCP","74","44116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915324 TSecr=0 WS=128" +"26236","12.098760","172.30.1.104","172.30.1.205","TCP","66","135 > 44116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26237","12.098771","172.30.1.205","172.30.1.104","TCP","54","44116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26238","12.099120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26239","12.099428","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26240","12.099437","172.30.1.205","172.30.1.104","TCP","54","44116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26241","12.101661","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26242","12.102097","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26243","12.102104","172.30.1.205","172.30.1.104","TCP","54","44116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26244","12.103925","172.30.1.205","172.30.1.104","TCP","54","44116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26245","12.104037","172.30.1.205","172.30.1.104","TCP","74","36754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915330 TSecr=0 WS=128" +"26246","12.104216","172.30.1.104","172.30.1.205","TCP","54","135 > 44116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26247","12.104246","172.30.1.104","172.30.1.205","TCP","54","135 > 44116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26248","12.104252","172.30.1.205","172.30.1.104","TCP","54","44116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26249","12.104289","172.30.1.104","172.30.1.205","TCP","66","49671 > 36754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26250","12.104297","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26251","12.104647","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26252","12.105812","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26253","12.105823","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26254","12.107731","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26255","12.108156","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26256","12.108162","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26257","12.109559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26258","12.112002","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26259","12.112013","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26260","12.112992","172.30.1.205","172.30.1.104","TCP","74","44120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915339 TSecr=0 WS=128" +"26261","12.113308","172.30.1.104","172.30.1.205","TCP","66","135 > 44120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26262","12.113319","172.30.1.205","172.30.1.104","TCP","54","44120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26263","12.113669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26264","12.113987","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26265","12.114001","172.30.1.205","172.30.1.104","TCP","54","44120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26266","12.116190","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26267","12.116690","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26268","12.116698","172.30.1.205","172.30.1.104","TCP","54","44120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26269","12.118568","172.30.1.205","172.30.1.104","TCP","54","44120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26270","12.118682","172.30.1.205","172.30.1.104","TCP","74","36758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915345 TSecr=0 WS=128" +"26271","12.118867","172.30.1.104","172.30.1.205","TCP","54","135 > 44120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26272","12.118894","172.30.1.104","172.30.1.205","TCP","54","135 > 44120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26273","12.118900","172.30.1.205","172.30.1.104","TCP","54","44120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26274","12.118971","172.30.1.104","172.30.1.205","TCP","66","49671 > 36758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26275","12.118980","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26276","12.119326","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26277","12.119637","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26278","12.119646","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26279","12.121559","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26280","12.123693","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26281","12.123699","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26282","12.125092","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26283","12.127497","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26284","12.127516","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26285","12.128471","172.30.1.205","172.30.1.104","TCP","74","44124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915354 TSecr=0 WS=128" +"26286","12.128821","172.30.1.104","172.30.1.205","TCP","66","135 > 44124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26287","12.128833","172.30.1.205","172.30.1.104","TCP","54","44124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26288","12.129199","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26289","12.129522","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26290","12.129531","172.30.1.205","172.30.1.104","TCP","54","44124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26291","12.131750","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26292","12.132171","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26293","12.132178","172.30.1.205","172.30.1.104","TCP","54","44124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26294","12.134023","172.30.1.205","172.30.1.104","TCP","54","44124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26295","12.134135","172.30.1.205","172.30.1.104","TCP","74","36762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915360 TSecr=0 WS=128" +"26296","12.134462","172.30.1.104","172.30.1.205","TCP","66","49671 > 36762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26297","12.134474","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26298","12.134486","172.30.1.104","172.30.1.205","TCP","54","135 > 44124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26299","12.134557","172.30.1.104","172.30.1.205","TCP","54","135 > 44124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26300","12.134563","172.30.1.205","172.30.1.104","TCP","54","44124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26301","12.134879","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26302","12.135259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26303","12.135269","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26304","12.137201","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26305","12.137613","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26306","12.137623","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26307","12.139093","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26308","12.141415","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26309","12.141427","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26310","12.142398","172.30.1.205","172.30.1.104","TCP","74","44128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915368 TSecr=0 WS=128" +"26311","12.142784","172.30.1.104","172.30.1.205","TCP","66","135 > 44128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26312","12.142794","172.30.1.205","172.30.1.104","TCP","54","44128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26313","12.143151","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26314","12.143487","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26315","12.143498","172.30.1.205","172.30.1.104","TCP","54","44128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26316","12.145742","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26317","12.146163","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26318","12.146170","172.30.1.205","172.30.1.104","TCP","54","44128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26319","12.148001","172.30.1.205","172.30.1.104","TCP","54","44128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26320","12.148113","172.30.1.205","172.30.1.104","TCP","74","36766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915374 TSecr=0 WS=128" +"26321","12.148311","172.30.1.104","172.30.1.205","TCP","54","135 > 44128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26322","12.148342","172.30.1.104","172.30.1.205","TCP","54","135 > 44128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26323","12.148348","172.30.1.205","172.30.1.104","TCP","54","44128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26324","12.148442","172.30.1.104","172.30.1.205","TCP","66","49671 > 36766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26325","12.148450","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26326","12.148822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26327","12.149145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26328","12.149154","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26329","12.151048","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26330","12.151424","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26331","12.151430","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26332","12.152815","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26333","12.155034","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26334","12.155043","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26335","12.156002","172.30.1.205","172.30.1.104","TCP","74","44132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915382 TSecr=0 WS=128" +"26336","12.156312","172.30.1.104","172.30.1.205","TCP","66","135 > 44132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26337","12.156323","172.30.1.205","172.30.1.104","TCP","54","44132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26338","12.156670","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26339","12.156980","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26340","12.156990","172.30.1.205","172.30.1.104","TCP","54","44132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26341","12.159187","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26342","12.159592","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26343","12.159599","172.30.1.205","172.30.1.104","TCP","54","44132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26344","12.161433","172.30.1.205","172.30.1.104","TCP","54","44132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26345","12.161544","172.30.1.205","172.30.1.104","TCP","74","36770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915387 TSecr=0 WS=128" +"26346","12.161745","172.30.1.104","172.30.1.205","TCP","54","135 > 44132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26347","12.161778","172.30.1.104","172.30.1.205","TCP","54","135 > 44132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26348","12.161784","172.30.1.205","172.30.1.104","TCP","54","44132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26349","12.161820","172.30.1.104","172.30.1.205","TCP","66","49671 > 36770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26350","12.161828","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26351","12.162169","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26352","12.162483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26353","12.162492","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26354","12.164375","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26355","12.164812","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26356","12.164820","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26357","12.166191","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26358","12.168632","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26359","12.168642","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26360","12.169603","172.30.1.205","172.30.1.104","TCP","74","44136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915396 TSecr=0 WS=128" +"26361","12.169891","172.30.1.104","172.30.1.205","TCP","66","135 > 44136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26362","12.169902","172.30.1.205","172.30.1.104","TCP","54","44136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26363","12.170258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26364","12.170553","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26365","12.170562","172.30.1.205","172.30.1.104","TCP","54","44136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26366","12.172743","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26367","12.173179","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26368","12.173187","172.30.1.205","172.30.1.104","TCP","54","44136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26369","12.175017","172.30.1.205","172.30.1.104","TCP","54","44136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26370","12.175130","172.30.1.205","172.30.1.104","TCP","74","36774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915401 TSecr=0 WS=128" +"26371","12.175325","172.30.1.104","172.30.1.205","TCP","54","135 > 44136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26372","12.175354","172.30.1.104","172.30.1.205","TCP","54","135 > 44136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26373","12.175359","172.30.1.205","172.30.1.104","TCP","54","44136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26374","12.175452","172.30.1.104","172.30.1.205","TCP","66","49671 > 36774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26375","12.175460","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26376","12.175811","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26377","12.176139","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26378","12.176148","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26379","12.178045","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26380","12.178433","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26381","12.178439","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26382","12.179794","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26383","12.182181","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26384","12.182191","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26385","12.183134","172.30.1.205","172.30.1.104","TCP","74","44140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915409 TSecr=0 WS=128" +"26386","12.183453","172.30.1.104","172.30.1.205","TCP","66","135 > 44140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26387","12.183464","172.30.1.205","172.30.1.104","TCP","54","44140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26388","12.183816","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26389","12.184225","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26390","12.184240","172.30.1.205","172.30.1.104","TCP","54","44140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26391","12.186548","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26392","12.186962","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26393","12.186968","172.30.1.205","172.30.1.104","TCP","54","44140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26394","12.188800","172.30.1.205","172.30.1.104","TCP","54","44140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26395","12.188918","172.30.1.205","172.30.1.104","TCP","74","36778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915415 TSecr=0 WS=128" +"26396","12.189110","172.30.1.104","172.30.1.205","TCP","54","135 > 44140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26397","12.189125","172.30.1.104","172.30.1.205","TCP","54","135 > 44140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26398","12.189130","172.30.1.205","172.30.1.104","TCP","54","44140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26399","12.189271","172.30.1.104","172.30.1.205","TCP","66","49671 > 36778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26400","12.189280","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26401","12.189628","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26402","12.189936","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26403","12.189947","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26404","12.191830","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26405","12.192278","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26406","12.192290","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26407","12.193660","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26408","12.196028","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26409","12.196051","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26410","12.197064","172.30.1.205","172.30.1.104","TCP","74","44144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915423 TSecr=0 WS=128" +"26411","12.197412","172.30.1.104","172.30.1.205","TCP","66","135 > 44144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26412","12.197422","172.30.1.205","172.30.1.104","TCP","54","44144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26413","12.197773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26414","12.198062","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26415","12.198071","172.30.1.205","172.30.1.104","TCP","54","44144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26416","12.200260","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26417","12.200656","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26418","12.200663","172.30.1.205","172.30.1.104","TCP","54","44144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26419","12.202484","172.30.1.205","172.30.1.104","TCP","54","44144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26420","12.202592","172.30.1.205","172.30.1.104","TCP","74","36782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915429 TSecr=0 WS=128" +"26421","12.202753","172.30.1.104","172.30.1.205","TCP","54","135 > 44144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26422","12.202795","172.30.1.104","172.30.1.205","TCP","54","135 > 44144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26423","12.202800","172.30.1.205","172.30.1.104","TCP","54","44144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26424","12.202888","172.30.1.104","172.30.1.205","TCP","66","49671 > 36782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26425","12.202897","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26426","12.203245","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26427","12.203533","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26428","12.203540","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26429","12.205437","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26430","12.205814","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26431","12.205820","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26432","12.207159","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26433","12.209450","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26434","12.209459","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26435","12.210405","172.30.1.205","172.30.1.104","TCP","74","44148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915436 TSecr=0 WS=128" +"26436","12.210730","172.30.1.104","172.30.1.205","TCP","66","135 > 44148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26437","12.210740","172.30.1.205","172.30.1.104","TCP","54","44148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26438","12.211089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26439","12.211509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26440","12.211518","172.30.1.205","172.30.1.104","TCP","54","44148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26441","12.213724","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26442","12.214141","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26443","12.214147","172.30.1.205","172.30.1.104","TCP","54","44148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26444","12.215947","172.30.1.205","172.30.1.104","TCP","54","44148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26445","12.216056","172.30.1.205","172.30.1.104","TCP","74","36786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915442 TSecr=0 WS=128" +"26446","12.216262","172.30.1.104","172.30.1.205","TCP","54","135 > 44148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26447","12.216375","172.30.1.104","172.30.1.205","TCP","66","49671 > 36786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26448","12.216393","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26449","12.216733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26450","12.218487","172.30.1.104","172.30.1.205","TCP","54","135 > 44148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26451","12.218495","172.30.1.205","172.30.1.104","TCP","54","44148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26452","12.218507","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26453","12.218518","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26454","12.220381","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26455","12.220796","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26456","12.220802","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26457","12.222173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26458","12.224540","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26459","12.224549","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26460","12.225508","172.30.1.205","172.30.1.104","TCP","74","44152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915451 TSecr=0 WS=128" +"26461","12.225848","172.30.1.104","172.30.1.205","TCP","66","135 > 44152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26462","12.225859","172.30.1.205","172.30.1.104","TCP","54","44152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26463","12.226218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26464","12.226536","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26465","12.226545","172.30.1.205","172.30.1.104","TCP","54","44152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26466","12.228702","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26467","12.229131","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26468","12.229143","172.30.1.205","172.30.1.104","TCP","54","44152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26469","12.230175","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26470","12.230224","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26471","12.230261","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26472","12.230292","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26473","12.230324","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26474","12.230351","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26475","12.230378","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26476","12.230404","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26477","12.230426","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26478","12.230456","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26479","12.230481","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26480","12.230550","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26481","12.230806","172.30.1.104","172.30.1.205","TCP","54","49671 > 36746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26482","12.230827","172.30.1.104","172.30.1.205","TCP","54","49671 > 36750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26483","12.230847","172.30.1.104","172.30.1.205","TCP","54","49671 > 36754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26484","12.230890","172.30.1.104","172.30.1.205","TCP","54","49671 > 36758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26485","12.230922","172.30.1.104","172.30.1.205","TCP","54","49671 > 36762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26486","12.230941","172.30.1.104","172.30.1.205","TCP","54","49671 > 36766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26487","12.230960","172.30.1.104","172.30.1.205","TCP","54","49671 > 36770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26488","12.231035","172.30.1.104","172.30.1.205","TCP","54","49671 > 36774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26489","12.231054","172.30.1.104","172.30.1.205","TCP","54","49671 > 36770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26490","12.231060","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26491","12.231097","172.30.1.104","172.30.1.205","TCP","54","49671 > 36778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26492","12.231116","172.30.1.104","172.30.1.205","TCP","54","49671 > 36782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26493","12.231137","172.30.1.104","172.30.1.205","TCP","54","49671 > 36762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26494","12.231142","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26495","12.231208","172.30.1.104","172.30.1.205","TCP","54","49671 > 36786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26496","12.231234","172.30.1.104","172.30.1.205","TCP","54","49671 > 36758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26497","12.231238","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26498","12.231286","172.30.1.104","172.30.1.205","TCP","54","49671 > 36742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26499","12.231306","172.30.1.104","172.30.1.205","TCP","54","49671 > 36754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26500","12.231309","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26501","12.231351","172.30.1.104","172.30.1.205","TCP","54","49671 > 36750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26502","12.231354","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26503","12.231371","172.30.1.104","172.30.1.205","TCP","54","49671 > 36742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26504","12.231373","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26505","12.231437","172.30.1.104","172.30.1.205","TCP","54","49671 > 36786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26506","12.231440","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26507","12.231458","172.30.1.104","172.30.1.205","TCP","54","49671 > 36782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26508","12.231461","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26509","12.231486","172.30.1.104","172.30.1.205","TCP","54","49671 > 36778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26510","12.231489","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26511","12.231514","172.30.1.104","172.30.1.205","TCP","54","49671 > 36774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26512","12.231517","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26513","12.231541","172.30.1.104","172.30.1.205","TCP","54","49671 > 36746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26514","12.231544","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26515","12.231600","172.30.1.104","172.30.1.205","TCP","54","49671 > 36766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26516","12.231603","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26517","12.232148","172.30.1.205","172.30.1.104","TCP","54","44152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26518","12.232256","172.30.1.205","172.30.1.104","TCP","74","36790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915458 TSecr=0 WS=128" +"26519","12.232411","172.30.1.104","172.30.1.205","TCP","54","135 > 44152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26520","12.232447","172.30.1.104","172.30.1.205","TCP","54","135 > 44152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26521","12.232452","172.30.1.205","172.30.1.104","TCP","54","44152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26522","12.232580","172.30.1.104","172.30.1.205","TCP","66","49671 > 36790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26523","12.232589","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26524","12.232988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26525","12.233342","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26526","12.233350","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26527","12.235238","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26528","12.235631","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26529","12.235637","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26530","12.237046","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26531","12.239401","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26532","12.239410","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26533","12.240333","172.30.1.205","172.30.1.104","TCP","74","44156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915466 TSecr=0 WS=128" +"26534","12.240659","172.30.1.104","172.30.1.205","TCP","66","135 > 44156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26535","12.240669","172.30.1.205","172.30.1.104","TCP","54","44156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26536","12.241082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26537","12.241436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26538","12.241445","172.30.1.205","172.30.1.104","TCP","54","44156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26539","12.243645","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26540","12.244086","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26541","12.244092","172.30.1.205","172.30.1.104","TCP","54","44156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26542","12.245925","172.30.1.205","172.30.1.104","TCP","54","44156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26543","12.246066","172.30.1.205","172.30.1.104","TCP","74","36794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915472 TSecr=0 WS=128" +"26544","12.246204","172.30.1.104","172.30.1.205","TCP","54","135 > 44156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26545","12.246217","172.30.1.104","172.30.1.205","TCP","54","135 > 44156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26546","12.246230","172.30.1.205","172.30.1.104","TCP","54","44156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26547","12.246368","172.30.1.104","172.30.1.205","TCP","66","49671 > 36794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26548","12.246376","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26549","12.246716","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26550","12.247032","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26551","12.247040","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26552","12.248984","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26553","12.249361","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26554","12.249367","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26555","12.250706","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26556","12.253198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26557","12.253207","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26558","12.254133","172.30.1.205","172.30.1.104","TCP","74","44160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915480 TSecr=0 WS=128" +"26559","12.254478","172.30.1.104","172.30.1.205","TCP","66","135 > 44160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26560","12.254489","172.30.1.205","172.30.1.104","TCP","54","44160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26561","12.254836","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26562","12.255172","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26563","12.255181","172.30.1.205","172.30.1.104","TCP","54","44160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26564","12.257397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26565","12.257843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26566","12.257849","172.30.1.205","172.30.1.104","TCP","54","44160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26567","12.259643","172.30.1.205","172.30.1.104","TCP","54","44160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26568","12.259754","172.30.1.205","172.30.1.104","TCP","74","36798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915486 TSecr=0 WS=128" +"26569","12.259925","172.30.1.104","172.30.1.205","TCP","54","135 > 44160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26570","12.259957","172.30.1.104","172.30.1.205","TCP","54","135 > 44160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26571","12.259962","172.30.1.205","172.30.1.104","TCP","54","44160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26572","12.260048","172.30.1.104","172.30.1.205","TCP","66","49671 > 36798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26573","12.260056","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26574","12.260412","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26575","12.260814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26576","12.260822","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26577","12.262690","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26578","12.263106","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26579","12.263112","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26580","12.264455","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26581","12.266902","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26582","12.266911","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26583","12.267858","172.30.1.205","172.30.1.104","TCP","74","44164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915494 TSecr=0 WS=128" +"26584","12.268216","172.30.1.104","172.30.1.205","TCP","66","135 > 44164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26585","12.268227","172.30.1.205","172.30.1.104","TCP","54","44164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26586","12.268572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26587","12.268888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26588","12.268897","172.30.1.205","172.30.1.104","TCP","54","44164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26589","12.271093","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26590","12.271548","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26591","12.271555","172.30.1.205","172.30.1.104","TCP","54","44164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26592","12.273385","172.30.1.205","172.30.1.104","TCP","54","44164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26593","12.273496","172.30.1.205","172.30.1.104","TCP","74","36802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915499 TSecr=0 WS=128" +"26594","12.273699","172.30.1.104","172.30.1.205","TCP","54","135 > 44164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26595","12.273707","172.30.1.104","172.30.1.205","TCP","54","135 > 44164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26596","12.273713","172.30.1.205","172.30.1.104","TCP","54","44164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26597","12.273786","172.30.1.104","172.30.1.205","TCP","66","49671 > 36802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26598","12.273796","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26599","12.274139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26600","12.274440","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26601","12.274448","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26602","12.276325","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26603","12.276739","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26604","12.276745","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26605","12.278107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26606","12.280535","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26607","12.280544","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26608","12.281495","172.30.1.205","172.30.1.104","TCP","74","44168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915507 TSecr=0 WS=128" +"26609","12.281788","172.30.1.104","172.30.1.205","TCP","66","135 > 44168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26610","12.281798","172.30.1.205","172.30.1.104","TCP","54","44168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26611","12.282145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26612","12.282441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26613","12.282450","172.30.1.205","172.30.1.104","TCP","54","44168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26614","12.284611","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26615","12.285045","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26616","12.285052","172.30.1.205","172.30.1.104","TCP","54","44168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26617","12.286859","172.30.1.205","172.30.1.104","TCP","54","44168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26618","12.286969","172.30.1.205","172.30.1.104","TCP","74","36806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915513 TSecr=0 WS=128" +"26619","12.287143","172.30.1.104","172.30.1.205","TCP","54","135 > 44168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26620","12.287170","172.30.1.104","172.30.1.205","TCP","54","135 > 44168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26621","12.287176","172.30.1.205","172.30.1.104","TCP","54","44168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26622","12.287251","172.30.1.104","172.30.1.205","TCP","66","49671 > 36806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26623","12.287259","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26624","12.287620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26625","12.287940","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26626","12.287948","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26627","12.289831","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26628","12.290257","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26629","12.290263","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26630","12.291596","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26631","12.293987","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26632","12.293996","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26633","12.294941","172.30.1.205","172.30.1.104","TCP","74","44172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915521 TSecr=0 WS=128" +"26634","12.295249","172.30.1.104","172.30.1.205","TCP","66","135 > 44172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26635","12.295260","172.30.1.205","172.30.1.104","TCP","54","44172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26636","12.295604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26637","12.295909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26638","12.295917","172.30.1.205","172.30.1.104","TCP","54","44172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26639","12.298119","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26640","12.298585","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26641","12.298592","172.30.1.205","172.30.1.104","TCP","54","44172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26642","12.300392","172.30.1.205","172.30.1.104","TCP","54","44172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26643","12.300501","172.30.1.205","172.30.1.104","TCP","74","36810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915526 TSecr=0 WS=128" +"26644","12.300660","172.30.1.104","172.30.1.205","TCP","54","135 > 44172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26645","12.300695","172.30.1.104","172.30.1.205","TCP","54","135 > 44172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26646","12.300701","172.30.1.205","172.30.1.104","TCP","54","44172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26647","12.300817","172.30.1.104","172.30.1.205","TCP","66","49671 > 36810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26648","12.300826","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26649","12.301182","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26650","12.301483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26651","12.301492","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26652","12.303380","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26653","12.303769","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26654","12.303775","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26655","12.305161","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26656","12.307577","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26657","12.307588","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26658","12.308552","172.30.1.205","172.30.1.104","TCP","74","44176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915534 TSecr=0 WS=128" +"26659","12.308909","172.30.1.104","172.30.1.205","TCP","66","135 > 44176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26660","12.308920","172.30.1.205","172.30.1.104","TCP","54","44176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26661","12.309276","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26662","12.309585","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26663","12.309594","172.30.1.205","172.30.1.104","TCP","54","44176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26664","12.311778","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26665","12.312208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26666","12.312215","172.30.1.205","172.30.1.104","TCP","54","44176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26667","12.314044","172.30.1.205","172.30.1.104","TCP","54","44176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26668","12.314163","172.30.1.205","172.30.1.104","TCP","74","36814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915540 TSecr=0 WS=128" +"26669","12.314331","172.30.1.104","172.30.1.205","TCP","54","135 > 44176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26670","12.314369","172.30.1.104","172.30.1.205","TCP","54","135 > 44176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26671","12.314376","172.30.1.205","172.30.1.104","TCP","54","44176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26672","12.314460","172.30.1.104","172.30.1.205","TCP","66","49671 > 36814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26673","12.314468","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26674","12.314810","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26675","12.315173","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26676","12.315184","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26677","12.317138","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26678","12.317539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26679","12.317545","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26680","12.318896","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26681","12.321235","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26682","12.321249","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26683","12.322293","172.30.1.205","172.30.1.104","TCP","74","44180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915548 TSecr=0 WS=128" +"26684","12.322602","172.30.1.104","172.30.1.205","TCP","66","135 > 44180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26685","12.322613","172.30.1.205","172.30.1.104","TCP","54","44180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26686","12.322969","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26687","12.323340","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26688","12.323349","172.30.1.205","172.30.1.104","TCP","54","44180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26689","12.325601","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26690","12.326046","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26691","12.326053","172.30.1.205","172.30.1.104","TCP","54","44180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26692","12.327870","172.30.1.205","172.30.1.104","TCP","54","44180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26693","12.327984","172.30.1.205","172.30.1.104","TCP","74","36818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915554 TSecr=0 WS=128" +"26694","12.328156","172.30.1.104","172.30.1.205","TCP","54","135 > 44180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26695","12.328224","172.30.1.104","172.30.1.205","TCP","54","135 > 44180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26696","12.328231","172.30.1.205","172.30.1.104","TCP","54","44180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26697","12.328307","172.30.1.104","172.30.1.205","TCP","66","49671 > 36818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26698","12.328315","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26699","12.328660","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26700","12.328971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26701","12.328980","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26702","12.330854","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26703","12.331284","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26704","12.331291","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26705","12.332646","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26706","12.335011","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26707","12.335021","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26708","12.335966","172.30.1.205","172.30.1.104","TCP","74","44184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915562 TSecr=0 WS=128" +"26709","12.336276","172.30.1.104","172.30.1.205","TCP","66","135 > 44184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26710","12.336286","172.30.1.205","172.30.1.104","TCP","54","44184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26711","12.336633","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26712","12.336949","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26713","12.336958","172.30.1.205","172.30.1.104","TCP","54","44184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26714","12.339143","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26715","12.339557","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26716","12.339564","172.30.1.205","172.30.1.104","TCP","54","44184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26717","12.341388","172.30.1.205","172.30.1.104","TCP","54","44184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26718","12.341498","172.30.1.205","172.30.1.104","TCP","74","36822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915567 TSecr=0 WS=128" +"26719","12.341681","172.30.1.104","172.30.1.205","TCP","54","135 > 44184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26720","12.341712","172.30.1.104","172.30.1.205","TCP","54","135 > 44184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26721","12.341718","172.30.1.205","172.30.1.104","TCP","54","44184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26722","12.341795","172.30.1.104","172.30.1.205","TCP","66","49671 > 36822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26723","12.341804","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26724","12.342146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26725","12.342449","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26726","12.342461","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26727","12.344615","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26728","12.345002","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26729","12.345009","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26730","12.346359","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26731","12.348768","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26732","12.348788","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26733","12.349725","172.30.1.205","172.30.1.104","TCP","74","44188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915576 TSecr=0 WS=128" +"26734","12.350015","172.30.1.104","172.30.1.205","TCP","66","135 > 44188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26735","12.350026","172.30.1.205","172.30.1.104","TCP","54","44188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26736","12.350378","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26737","12.350710","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26738","12.350720","172.30.1.205","172.30.1.104","TCP","54","44188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26739","12.352917","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26740","12.353303","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26741","12.353310","172.30.1.205","172.30.1.104","TCP","54","44188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26742","12.355132","172.30.1.205","172.30.1.104","TCP","54","44188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26743","12.355242","172.30.1.205","172.30.1.104","TCP","74","36826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915581 TSecr=0 WS=128" +"26744","12.355404","172.30.1.104","172.30.1.205","TCP","54","135 > 44188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26745","12.355439","172.30.1.104","172.30.1.205","TCP","54","135 > 44188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26746","12.355444","172.30.1.205","172.30.1.104","TCP","54","44188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26747","12.355604","172.30.1.104","172.30.1.205","TCP","66","49671 > 36826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26748","12.355612","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26749","12.355957","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26750","12.356275","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26751","12.356284","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26752","12.358171","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26753","12.358555","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26754","12.358561","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26755","12.359907","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26756","12.362263","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26757","12.362272","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26758","12.363209","172.30.1.205","172.30.1.104","TCP","74","44192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915589 TSecr=0 WS=128" +"26759","12.363506","172.30.1.104","172.30.1.205","TCP","66","135 > 44192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26760","12.363517","172.30.1.205","172.30.1.104","TCP","54","44192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26761","12.363871","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26762","12.364199","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26763","12.364208","172.30.1.205","172.30.1.104","TCP","54","44192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26764","12.366418","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26765","12.366841","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26766","12.366848","172.30.1.205","172.30.1.104","TCP","54","44192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26767","12.368650","172.30.1.205","172.30.1.104","TCP","54","44192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26768","12.368761","172.30.1.205","172.30.1.104","TCP","74","36830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915595 TSecr=0 WS=128" +"26769","12.368947","172.30.1.104","172.30.1.205","TCP","54","135 > 44192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26770","12.368976","172.30.1.104","172.30.1.205","TCP","54","135 > 44192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26771","12.368982","172.30.1.205","172.30.1.104","TCP","54","44192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26772","12.369058","172.30.1.104","172.30.1.205","TCP","66","49671 > 36830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26773","12.369066","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26774","12.369415","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26775","12.369728","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26776","12.369736","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26777","12.371633","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26778","12.372067","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26779","12.372074","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26780","12.373486","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26781","12.375850","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26782","12.375861","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26783","12.376831","172.30.1.205","172.30.1.104","TCP","74","44196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915603 TSecr=0 WS=128" +"26784","12.377149","172.30.1.104","172.30.1.205","TCP","66","135 > 44196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26785","12.377160","172.30.1.205","172.30.1.104","TCP","54","44196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26786","12.377512","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26787","12.377825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26788","12.377843","172.30.1.205","172.30.1.104","TCP","54","44196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26789","12.380270","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26790","12.380680","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26791","12.380687","172.30.1.205","172.30.1.104","TCP","54","44196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26792","12.382543","172.30.1.205","172.30.1.104","TCP","54","44196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26793","12.382654","172.30.1.205","172.30.1.104","TCP","74","36834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915609 TSecr=0 WS=128" +"26794","12.382818","172.30.1.104","172.30.1.205","TCP","54","135 > 44196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26795","12.382853","172.30.1.104","172.30.1.205","TCP","54","135 > 44196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26796","12.382858","172.30.1.205","172.30.1.104","TCP","54","44196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26797","12.382944","172.30.1.104","172.30.1.205","TCP","66","49671 > 36834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26798","12.382952","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26799","12.383296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26800","12.383605","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26801","12.383613","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26802","12.385561","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26803","12.385955","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26804","12.385961","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26805","12.387364","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26806","12.389686","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26807","12.389696","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26808","12.390655","172.30.1.205","172.30.1.104","TCP","74","44200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915617 TSecr=0 WS=128" +"26809","12.390945","172.30.1.104","172.30.1.205","TCP","66","135 > 44200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26810","12.390956","172.30.1.205","172.30.1.104","TCP","54","44200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26811","12.391334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26812","12.391641","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26813","12.391649","172.30.1.205","172.30.1.104","TCP","54","44200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26814","12.393928","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26815","12.394383","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26816","12.394393","172.30.1.205","172.30.1.104","TCP","54","44200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26817","12.395313","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26818","12.395365","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26819","12.395402","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26820","12.395435","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26821","12.395467","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26822","12.395501","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26823","12.395527","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26824","12.395560","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26825","12.395593","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26826","12.395622","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26827","12.395640","172.30.1.104","172.30.1.205","TCP","54","49671 > 36794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26828","12.395661","172.30.1.104","172.30.1.205","TCP","54","49671 > 36798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26829","12.395679","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26830","12.395683","172.30.1.104","172.30.1.205","TCP","54","49671 > 36802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26831","12.395762","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26832","12.395938","172.30.1.104","172.30.1.205","TCP","54","49671 > 36794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26833","12.395946","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26834","12.395954","172.30.1.104","172.30.1.205","TCP","54","49671 > 36806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26835","12.395981","172.30.1.104","172.30.1.205","TCP","54","49671 > 36806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26836","12.395984","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26837","12.396001","172.30.1.104","172.30.1.205","TCP","54","49671 > 36798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26838","12.396004","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26839","12.396069","172.30.1.104","172.30.1.205","TCP","54","49671 > 36802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26840","12.396074","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26841","12.396089","172.30.1.104","172.30.1.205","TCP","54","49671 > 36810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26842","12.396110","172.30.1.104","172.30.1.205","TCP","54","49671 > 36814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26843","12.396132","172.30.1.104","172.30.1.205","TCP","54","49671 > 36810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26844","12.396136","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26845","12.396155","172.30.1.104","172.30.1.205","TCP","54","49671 > 36818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26846","12.396174","172.30.1.104","172.30.1.205","TCP","54","49671 > 36814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26847","12.396178","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26848","12.396195","172.30.1.104","172.30.1.205","TCP","54","49671 > 36822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26849","12.396215","172.30.1.104","172.30.1.205","TCP","54","49671 > 36826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26850","12.396235","172.30.1.104","172.30.1.205","TCP","54","49671 > 36826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26851","12.396239","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26852","12.396257","172.30.1.104","172.30.1.205","TCP","54","49671 > 36830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26853","12.396394","172.30.1.104","172.30.1.205","TCP","54","49671 > 36830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26854","12.396399","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26855","12.396440","172.30.1.104","172.30.1.205","TCP","54","49671 > 36834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26856","12.396491","172.30.1.104","172.30.1.205","TCP","54","49671 > 36834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26857","12.396495","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26858","12.396511","172.30.1.104","172.30.1.205","TCP","54","49671 > 36818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26859","12.396514","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26860","12.396534","172.30.1.104","172.30.1.205","TCP","54","49671 > 36822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26861","12.396537","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26862","12.396554","172.30.1.104","172.30.1.205","TCP","54","49671 > 36790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26863","12.396873","172.30.1.104","172.30.1.205","TCP","54","49671 > 36790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"26864","12.396880","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"26865","12.397382","172.30.1.205","172.30.1.104","TCP","54","44200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26866","12.397500","172.30.1.205","172.30.1.104","TCP","74","36838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915623 TSecr=0 WS=128" +"26867","12.397654","172.30.1.104","172.30.1.205","TCP","54","135 > 44200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26868","12.397716","172.30.1.104","172.30.1.205","TCP","54","135 > 44200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26869","12.397721","172.30.1.205","172.30.1.104","TCP","54","44200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26870","12.397793","172.30.1.104","172.30.1.205","TCP","66","49671 > 36838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26871","12.397801","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26872","12.398175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26873","12.399171","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26874","12.399183","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26875","12.401115","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26876","12.402582","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26877","12.402589","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26878","12.403958","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26879","12.406404","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26880","12.406413","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26881","12.407369","172.30.1.205","172.30.1.104","TCP","74","44204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915633 TSecr=0 WS=128" +"26882","12.407687","172.30.1.104","172.30.1.205","TCP","66","135 > 44204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26883","12.407699","172.30.1.205","172.30.1.104","TCP","54","44204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26884","12.408051","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26885","12.408432","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26886","12.408444","172.30.1.205","172.30.1.104","TCP","54","44204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26887","12.410653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26888","12.411071","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26889","12.411078","172.30.1.205","172.30.1.104","TCP","54","44204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26890","12.412901","172.30.1.205","172.30.1.104","TCP","54","44204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26891","12.413018","172.30.1.205","172.30.1.104","TCP","74","36842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915639 TSecr=0 WS=128" +"26892","12.413171","172.30.1.104","172.30.1.205","TCP","54","135 > 44204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26893","12.413198","172.30.1.104","172.30.1.205","TCP","54","135 > 44204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26894","12.413204","172.30.1.205","172.30.1.104","TCP","54","44204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26895","12.413279","172.30.1.104","172.30.1.205","TCP","66","49671 > 36842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26896","12.413288","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26897","12.413647","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26898","12.413955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26899","12.413963","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26900","12.415821","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26901","12.416198","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26902","12.416204","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26903","12.417577","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26904","12.420113","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26905","12.420123","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26906","12.421093","172.30.1.205","172.30.1.104","TCP","74","44208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915647 TSecr=0 WS=128" +"26907","12.421429","172.30.1.104","172.30.1.205","TCP","66","135 > 44208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26908","12.421442","172.30.1.205","172.30.1.104","TCP","54","44208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26909","12.421799","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26910","12.422123","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26911","12.422132","172.30.1.205","172.30.1.104","TCP","54","44208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26912","12.424331","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26913","12.424768","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26914","12.424785","172.30.1.205","172.30.1.104","TCP","54","44208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26915","12.426623","172.30.1.205","172.30.1.104","TCP","54","44208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26916","12.426736","172.30.1.205","172.30.1.104","TCP","74","36846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915653 TSecr=0 WS=128" +"26917","12.426914","172.30.1.104","172.30.1.205","TCP","54","135 > 44208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26918","12.426950","172.30.1.104","172.30.1.205","TCP","54","135 > 44208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26919","12.426956","172.30.1.205","172.30.1.104","TCP","54","44208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26920","12.427044","172.30.1.104","172.30.1.205","TCP","66","49671 > 36846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26921","12.427053","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26922","12.427394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26923","12.427694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26924","12.427703","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26925","12.429589","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26926","12.429981","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26927","12.429987","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26928","12.431334","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26929","12.433802","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26930","12.433812","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26931","12.434770","172.30.1.205","172.30.1.104","TCP","74","44212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915661 TSecr=0 WS=128" +"26932","12.435109","172.30.1.104","172.30.1.205","TCP","66","135 > 44212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26933","12.435119","172.30.1.205","172.30.1.104","TCP","54","44212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26934","12.435466","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26935","12.435801","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26936","12.435810","172.30.1.205","172.30.1.104","TCP","54","44212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26937","12.438025","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26938","12.438434","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26939","12.438441","172.30.1.205","172.30.1.104","TCP","54","44212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26940","12.440254","172.30.1.205","172.30.1.104","TCP","54","44212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26941","12.440362","172.30.1.205","172.30.1.104","TCP","74","36850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915666 TSecr=0 WS=128" +"26942","12.440529","172.30.1.104","172.30.1.205","TCP","54","135 > 44212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26943","12.440571","172.30.1.104","172.30.1.205","TCP","54","135 > 44212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26944","12.440576","172.30.1.205","172.30.1.104","TCP","54","44212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26945","12.440667","172.30.1.104","172.30.1.205","TCP","66","49671 > 36850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26946","12.440675","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26947","12.441054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26948","12.441366","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26949","12.441386","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26950","12.443252","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26951","12.443644","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26952","12.443650","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26953","12.445025","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26954","12.447425","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26955","12.447434","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26956","12.448361","172.30.1.205","172.30.1.104","TCP","74","44216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915674 TSecr=0 WS=128" +"26957","12.449043","172.30.1.104","172.30.1.205","TCP","66","135 > 44216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26958","12.449054","172.30.1.205","172.30.1.104","TCP","54","44216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26959","12.449411","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26960","12.449789","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26961","12.449798","172.30.1.205","172.30.1.104","TCP","54","44216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26962","12.451970","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26963","12.452379","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26964","12.452385","172.30.1.205","172.30.1.104","TCP","54","44216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26965","12.454200","172.30.1.205","172.30.1.104","TCP","54","44216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26966","12.454314","172.30.1.205","172.30.1.104","TCP","74","36854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915680 TSecr=0 WS=128" +"26967","12.454500","172.30.1.104","172.30.1.205","TCP","54","135 > 44216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26968","12.454534","172.30.1.104","172.30.1.205","TCP","54","135 > 44216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26969","12.454539","172.30.1.205","172.30.1.104","TCP","54","44216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26970","12.454615","172.30.1.104","172.30.1.205","TCP","66","49671 > 36854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26971","12.454623","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26972","12.454965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26973","12.455273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26974","12.455280","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26975","12.457176","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"26976","12.457549","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"26977","12.457555","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"26978","12.458893","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"26979","12.462450","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"26980","12.462460","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"26981","12.463402","172.30.1.205","172.30.1.104","TCP","74","44220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915689 TSecr=0 WS=128" +"26982","12.463705","172.30.1.104","172.30.1.205","TCP","66","135 > 44220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26983","12.463715","172.30.1.205","172.30.1.104","TCP","54","44220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26984","12.464062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"26985","12.464371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26986","12.464379","172.30.1.205","172.30.1.104","TCP","54","44220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"26987","12.466671","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"26988","12.467123","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"26989","12.467129","172.30.1.205","172.30.1.104","TCP","54","44220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26990","12.468981","172.30.1.205","172.30.1.104","TCP","54","44220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"26991","12.469087","172.30.1.205","172.30.1.104","TCP","74","36858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915695 TSecr=0 WS=128" +"26992","12.469272","172.30.1.104","172.30.1.205","TCP","54","135 > 44220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26993","12.469397","172.30.1.104","172.30.1.205","TCP","54","135 > 44220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"26994","12.469402","172.30.1.205","172.30.1.104","TCP","54","44220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"26995","12.469503","172.30.1.104","172.30.1.205","TCP","66","49671 > 36858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"26996","12.469520","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"26997","12.469940","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"26998","12.470271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"26999","12.470280","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27000","12.472208","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27001","12.472610","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27002","12.472617","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27003","12.474014","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27004","12.476398","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27005","12.476409","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27006","12.477390","172.30.1.205","172.30.1.104","TCP","74","44224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915703 TSecr=0 WS=128" +"27007","12.477682","172.30.1.104","172.30.1.205","TCP","66","135 > 44224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27008","12.477697","172.30.1.205","172.30.1.104","TCP","54","44224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27009","12.478079","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27010","12.478388","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27011","12.478397","172.30.1.205","172.30.1.104","TCP","54","44224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27012","12.480597","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27013","12.481036","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27014","12.481043","172.30.1.205","172.30.1.104","TCP","54","44224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27015","12.482851","172.30.1.205","172.30.1.104","TCP","54","44224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27016","12.482963","172.30.1.205","172.30.1.104","TCP","74","36862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915709 TSecr=0 WS=128" +"27017","12.483155","172.30.1.104","172.30.1.205","TCP","54","135 > 44224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27018","12.483190","172.30.1.104","172.30.1.205","TCP","54","135 > 44224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27019","12.483196","172.30.1.205","172.30.1.104","TCP","54","44224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27020","12.483313","172.30.1.104","172.30.1.205","TCP","66","49671 > 36862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27021","12.483321","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27022","12.483669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27023","12.483968","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27024","12.483977","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27025","12.485914","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27026","12.486349","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27027","12.486355","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27028","12.487704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27029","12.490104","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27030","12.490114","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27031","12.491064","172.30.1.205","172.30.1.104","TCP","74","44228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915717 TSecr=0 WS=128" +"27032","12.491402","172.30.1.104","172.30.1.205","TCP","66","135 > 44228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27033","12.491413","172.30.1.205","172.30.1.104","TCP","54","44228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27034","12.491766","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27035","12.492064","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27036","12.492073","172.30.1.205","172.30.1.104","TCP","54","44228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27037","12.494274","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27038","12.494715","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27039","12.494724","172.30.1.205","172.30.1.104","TCP","54","44228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27040","12.496609","172.30.1.205","172.30.1.104","TCP","54","44228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27041","12.496730","172.30.1.205","172.30.1.104","TCP","74","36866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915723 TSecr=0 WS=128" +"27042","12.496905","172.30.1.104","172.30.1.205","TCP","54","135 > 44228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27043","12.496931","172.30.1.104","172.30.1.205","TCP","54","135 > 44228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27044","12.496938","172.30.1.205","172.30.1.104","TCP","54","44228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27045","12.497029","172.30.1.104","172.30.1.205","TCP","66","49671 > 36866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27046","12.497038","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27047","12.497408","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27048","12.497738","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27049","12.497746","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27050","12.499614","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27051","12.500075","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27052","12.500081","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27053","12.501463","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27054","12.503750","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27055","12.503762","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27056","12.504728","172.30.1.205","172.30.1.104","TCP","74","44232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915731 TSecr=0 WS=128" +"27057","12.505020","172.30.1.104","172.30.1.205","TCP","66","135 > 44232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27058","12.505031","172.30.1.205","172.30.1.104","TCP","54","44232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27059","12.505389","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27060","12.505689","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27061","12.505698","172.30.1.205","172.30.1.104","TCP","54","44232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27062","12.507877","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27063","12.508277","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27064","12.508289","172.30.1.205","172.30.1.104","TCP","54","44232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27065","12.510342","172.30.1.205","172.30.1.104","TCP","54","44232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27066","12.510452","172.30.1.205","172.30.1.104","TCP","74","36870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915736 TSecr=0 WS=128" +"27067","12.510609","172.30.1.104","172.30.1.205","TCP","54","135 > 44232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27068","12.510644","172.30.1.104","172.30.1.205","TCP","54","135 > 44232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27069","12.510649","172.30.1.205","172.30.1.104","TCP","54","44232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27070","12.510754","172.30.1.104","172.30.1.205","TCP","66","49671 > 36870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27071","12.510762","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27072","12.511111","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27073","12.511907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27074","12.511925","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27075","12.514007","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27076","12.515974","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27077","12.515980","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27078","12.517356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27079","12.519751","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27080","12.519759","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27081","12.520688","172.30.1.205","172.30.1.104","TCP","74","44236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915747 TSecr=0 WS=128" +"27082","12.520977","172.30.1.104","172.30.1.205","TCP","66","135 > 44236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27083","12.520991","172.30.1.205","172.30.1.104","TCP","54","44236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27084","12.521349","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27085","12.521748","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27086","12.521757","172.30.1.205","172.30.1.104","TCP","54","44236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27087","12.523946","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27088","12.524356","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27089","12.524364","172.30.1.205","172.30.1.104","TCP","54","44236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27090","12.526194","172.30.1.205","172.30.1.104","TCP","54","44236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27091","12.526309","172.30.1.205","172.30.1.104","TCP","74","36874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915752 TSecr=0 WS=128" +"27092","12.526506","172.30.1.104","172.30.1.205","TCP","54","135 > 44236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27093","12.526526","172.30.1.104","172.30.1.205","TCP","54","135 > 44236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27094","12.526536","172.30.1.205","172.30.1.104","TCP","54","44236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27095","12.526583","172.30.1.104","172.30.1.205","TCP","66","49671 > 36874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27096","12.526599","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27097","12.527148","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27098","12.527524","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27099","12.527533","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27100","12.529437","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27101","12.529851","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27102","12.529857","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27103","12.531195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27104","12.533564","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27105","12.533574","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27106","12.534509","172.30.1.205","172.30.1.104","TCP","74","44240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915760 TSecr=0 WS=128" +"27107","12.534802","172.30.1.104","172.30.1.205","TCP","66","135 > 44240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27108","12.534812","172.30.1.205","172.30.1.104","TCP","54","44240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27109","12.535160","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27110","12.535448","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27111","12.535458","172.30.1.205","172.30.1.104","TCP","54","44240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27112","12.537667","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27113","12.538071","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27114","12.538077","172.30.1.205","172.30.1.104","TCP","54","44240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27115","12.539893","172.30.1.205","172.30.1.104","TCP","54","44240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27116","12.540006","172.30.1.205","172.30.1.104","TCP","74","36878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915766 TSecr=0 WS=128" +"27117","12.540166","172.30.1.104","172.30.1.205","TCP","54","135 > 44240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27118","12.540198","172.30.1.104","172.30.1.205","TCP","54","135 > 44240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27119","12.540204","172.30.1.205","172.30.1.104","TCP","54","44240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27120","12.540271","172.30.1.104","172.30.1.205","TCP","66","49671 > 36878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27121","12.540280","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27122","12.540626","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27123","12.540936","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27124","12.540945","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27125","12.542840","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27126","12.543240","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27127","12.543246","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27128","12.544637","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27129","12.547090","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27130","12.547101","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27131","12.548051","172.30.1.205","172.30.1.104","TCP","74","44244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915774 TSecr=0 WS=128" +"27132","12.548401","172.30.1.104","172.30.1.205","TCP","66","135 > 44244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27133","12.548415","172.30.1.205","172.30.1.104","TCP","54","44244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27134","12.548799","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27135","12.549106","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27136","12.549115","172.30.1.205","172.30.1.104","TCP","54","44244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27137","12.551292","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27138","12.551706","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27139","12.551713","172.30.1.205","172.30.1.104","TCP","54","44244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27140","12.553531","172.30.1.205","172.30.1.104","TCP","54","44244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27141","12.553641","172.30.1.205","172.30.1.104","TCP","74","36882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915780 TSecr=0 WS=128" +"27142","12.553815","172.30.1.104","172.30.1.205","TCP","54","135 > 44244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27143","12.553883","172.30.1.104","172.30.1.205","TCP","54","135 > 44244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27144","12.553888","172.30.1.205","172.30.1.104","TCP","54","44244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27145","12.553963","172.30.1.104","172.30.1.205","TCP","66","49671 > 36882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27146","12.553971","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27147","12.554319","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27148","12.554610","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27149","12.554617","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27150","12.556470","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27151","12.556874","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27152","12.556881","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27153","12.558231","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27154","12.560792","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27155","12.560801","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27156","12.561738","172.30.1.205","172.30.1.104","TCP","74","44248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915788 TSecr=0 WS=128" +"27157","12.562051","172.30.1.104","172.30.1.205","TCP","66","135 > 44248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27158","12.562062","172.30.1.205","172.30.1.104","TCP","54","44248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27159","12.562409","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27160","12.562756","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27161","12.562765","172.30.1.205","172.30.1.104","TCP","54","44248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27162","12.564949","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27163","12.565387","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27164","12.565394","172.30.1.205","172.30.1.104","TCP","54","44248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27165","12.566236","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27166","12.566283","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27167","12.566330","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27168","12.566363","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27169","12.566395","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27170","12.566427","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27171","12.566458","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27172","12.566485","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27173","12.566511","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27174","12.566541","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27175","12.566563","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27176","12.566634","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27177","12.566924","172.30.1.104","172.30.1.205","TCP","54","49671 > 36842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27178","12.566939","172.30.1.104","172.30.1.205","TCP","54","49671 > 36846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27179","12.566967","172.30.1.104","172.30.1.205","TCP","54","49671 > 36842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27180","12.566973","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27181","12.566991","172.30.1.104","172.30.1.205","TCP","54","49671 > 36850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27182","12.567038","172.30.1.104","172.30.1.205","TCP","54","49671 > 36854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27183","12.567057","172.30.1.104","172.30.1.205","TCP","54","49671 > 36846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27184","12.567060","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27185","12.567080","172.30.1.104","172.30.1.205","TCP","54","49671 > 36858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27186","12.567105","172.30.1.104","172.30.1.205","TCP","54","49671 > 36858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27187","12.567108","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27188","12.567148","172.30.1.104","172.30.1.205","TCP","54","49671 > 36862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27189","12.567166","172.30.1.104","172.30.1.205","TCP","54","49671 > 36862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27190","12.567169","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27191","12.567211","172.30.1.104","172.30.1.205","TCP","54","49671 > 36866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27192","12.567230","172.30.1.104","172.30.1.205","TCP","54","49671 > 36866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27193","12.567234","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27194","12.567256","172.30.1.104","172.30.1.205","TCP","54","49671 > 36850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27195","12.567259","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27196","12.567331","172.30.1.104","172.30.1.205","TCP","54","49671 > 36870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27197","12.567350","172.30.1.104","172.30.1.205","TCP","54","49671 > 36854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27198","12.567354","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27199","12.567398","172.30.1.104","172.30.1.205","TCP","54","49671 > 36874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27200","12.567419","172.30.1.104","172.30.1.205","TCP","54","49671 > 36870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27201","12.567422","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27202","12.567436","172.30.1.104","172.30.1.205","TCP","54","49671 > 36878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27203","12.567502","172.30.1.104","172.30.1.205","TCP","54","49671 > 36882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27204","12.567519","172.30.1.104","172.30.1.205","TCP","54","49671 > 36874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27205","12.567531","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27206","12.567551","172.30.1.104","172.30.1.205","TCP","54","49671 > 36878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27207","12.567554","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27208","12.567986","172.30.1.104","172.30.1.205","TCP","54","49671 > 36838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27209","12.568003","172.30.1.104","172.30.1.205","TCP","54","49671 > 36882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27210","12.568008","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27211","12.568031","172.30.1.104","172.30.1.205","TCP","54","49671 > 36838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27212","12.568033","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27213","12.568218","172.30.1.205","172.30.1.104","TCP","54","44248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27214","12.568334","172.30.1.205","172.30.1.104","TCP","74","36886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915794 TSecr=0 WS=128" +"27215","12.568477","172.30.1.104","172.30.1.205","TCP","54","135 > 44248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27216","12.568514","172.30.1.104","172.30.1.205","TCP","54","135 > 44248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27217","12.568518","172.30.1.205","172.30.1.104","TCP","54","44248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27218","12.568593","172.30.1.104","172.30.1.205","TCP","66","49671 > 36886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27219","12.568601","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27220","12.568983","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27221","12.569275","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27222","12.569283","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27223","12.571134","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27224","12.571554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27225","12.571560","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27226","12.572925","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27227","12.575361","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27228","12.575379","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27229","12.576500","172.30.1.205","172.30.1.104","TCP","74","44252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915802 TSecr=0 WS=128" +"27230","12.576804","172.30.1.104","172.30.1.205","TCP","66","135 > 44252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27231","12.576815","172.30.1.205","172.30.1.104","TCP","54","44252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27232","12.577171","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27233","12.577480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27234","12.577489","172.30.1.205","172.30.1.104","TCP","54","44252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27235","12.579682","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27236","12.580073","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27237","12.580080","172.30.1.205","172.30.1.104","TCP","54","44252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27238","12.581942","172.30.1.205","172.30.1.104","TCP","54","44252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27239","12.582052","172.30.1.205","172.30.1.104","TCP","74","36890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915808 TSecr=0 WS=128" +"27240","12.582235","172.30.1.104","172.30.1.205","TCP","54","135 > 44252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27241","12.582268","172.30.1.104","172.30.1.205","TCP","54","135 > 44252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27242","12.582274","172.30.1.205","172.30.1.104","TCP","54","44252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27243","12.582345","172.30.1.104","172.30.1.205","TCP","66","49671 > 36890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27244","12.582353","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27245","12.582691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27246","12.582993","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27247","12.583001","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27248","12.584898","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27249","12.585271","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27250","12.585277","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27251","12.586611","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27252","12.589508","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27253","12.589520","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27254","12.590540","172.30.1.205","172.30.1.104","TCP","74","44256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915816 TSecr=0 WS=128" +"27255","12.590866","172.30.1.104","172.30.1.205","TCP","66","135 > 44256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27256","12.590877","172.30.1.205","172.30.1.104","TCP","54","44256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27257","12.591234","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27258","12.591566","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27259","12.591584","172.30.1.205","172.30.1.104","TCP","54","44256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27260","12.594145","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27261","12.594541","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27262","12.594547","172.30.1.205","172.30.1.104","TCP","54","44256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27263","12.596368","172.30.1.205","172.30.1.104","TCP","54","44256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27264","12.596480","172.30.1.205","172.30.1.104","TCP","74","36894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915822 TSecr=0 WS=128" +"27265","12.596685","172.30.1.104","172.30.1.205","TCP","54","135 > 44256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27266","12.596767","172.30.1.104","172.30.1.205","TCP","66","49671 > 36894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27267","12.596787","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27268","12.596797","172.30.1.104","172.30.1.205","TCP","54","135 > 44256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27269","12.596805","172.30.1.205","172.30.1.104","TCP","54","44256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27270","12.597162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27271","12.597482","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27272","12.597491","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27273","12.599370","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27274","12.599753","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27275","12.599759","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27276","12.601152","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27277","12.603494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27278","12.603504","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27279","12.604440","172.30.1.205","172.30.1.104","TCP","74","44260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915830 TSecr=0 WS=128" +"27280","12.604770","172.30.1.104","172.30.1.205","TCP","66","135 > 44260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27281","12.604790","172.30.1.205","172.30.1.104","TCP","54","44260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27282","12.605153","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27283","12.605473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27284","12.605483","172.30.1.205","172.30.1.104","TCP","54","44260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27285","12.607675","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27286","12.608097","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27287","12.608103","172.30.1.205","172.30.1.104","TCP","54","44260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27288","12.610006","172.30.1.205","172.30.1.104","TCP","54","44260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27289","12.610117","172.30.1.205","172.30.1.104","TCP","74","36898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915836 TSecr=0 WS=128" +"27290","12.610290","172.30.1.104","172.30.1.205","TCP","54","135 > 44260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27291","12.610348","172.30.1.104","172.30.1.205","TCP","54","135 > 44260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27292","12.610354","172.30.1.205","172.30.1.104","TCP","54","44260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27293","12.610435","172.30.1.104","172.30.1.205","TCP","66","49671 > 36898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27294","12.610443","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27295","12.610791","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27296","12.611117","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27297","12.611126","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27298","12.613042","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27299","12.613437","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27300","12.613443","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27301","12.614795","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27302","12.617136","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27303","12.617147","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27304","12.618105","172.30.1.205","172.30.1.104","TCP","74","44264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915844 TSecr=0 WS=128" +"27305","12.618389","172.30.1.104","172.30.1.205","TCP","66","135 > 44264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27306","12.618401","172.30.1.205","172.30.1.104","TCP","54","44264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27307","12.618765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27308","12.619095","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27309","12.619113","172.30.1.205","172.30.1.104","TCP","54","44264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27310","12.621461","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27311","12.621905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27312","12.621912","172.30.1.205","172.30.1.104","TCP","54","44264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27313","12.623754","172.30.1.205","172.30.1.104","TCP","54","44264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27314","12.623863","172.30.1.205","172.30.1.104","TCP","74","36902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915850 TSecr=0 WS=128" +"27315","12.624030","172.30.1.104","172.30.1.205","TCP","54","135 > 44264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27316","12.624061","172.30.1.104","172.30.1.205","TCP","54","135 > 44264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27317","12.624067","172.30.1.205","172.30.1.104","TCP","54","44264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27318","12.624139","172.30.1.104","172.30.1.205","TCP","66","49671 > 36902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27319","12.624147","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27320","12.624505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27321","12.624821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27322","12.624829","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27323","12.626709","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27324","12.627140","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27325","12.627147","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27326","12.628495","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27327","12.630871","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27328","12.630880","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27329","12.631817","172.30.1.205","172.30.1.104","TCP","74","44268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915858 TSecr=0 WS=128" +"27330","12.632122","172.30.1.104","172.30.1.205","TCP","66","135 > 44268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27331","12.632133","172.30.1.205","172.30.1.104","TCP","54","44268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27332","12.632481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27333","12.632792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27334","12.632802","172.30.1.205","172.30.1.104","TCP","54","44268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27335","12.634998","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27336","12.635432","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27337","12.635439","172.30.1.205","172.30.1.104","TCP","54","44268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27338","12.637276","172.30.1.205","172.30.1.104","TCP","54","44268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27339","12.637398","172.30.1.205","172.30.1.104","TCP","74","36906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915863 TSecr=0 WS=128" +"27340","12.637562","172.30.1.104","172.30.1.205","TCP","54","135 > 44268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27341","12.637604","172.30.1.104","172.30.1.205","TCP","54","135 > 44268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27342","12.637610","172.30.1.205","172.30.1.104","TCP","54","44268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27343","12.637697","172.30.1.104","172.30.1.205","TCP","66","49671 > 36906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27344","12.637705","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27345","12.638057","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27346","12.638389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27347","12.638406","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27348","12.640501","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27349","12.642588","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27350","12.642596","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27351","12.643974","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27352","12.646391","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27353","12.646401","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27354","12.647340","172.30.1.205","172.30.1.104","TCP","74","44272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915873 TSecr=0 WS=128" +"27355","12.647636","172.30.1.104","172.30.1.205","TCP","66","135 > 44272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27356","12.647647","172.30.1.205","172.30.1.104","TCP","54","44272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27357","12.647993","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27358","12.648303","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27359","12.648312","172.30.1.205","172.30.1.104","TCP","54","44272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27360","12.650534","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27361","12.650959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27362","12.650965","172.30.1.205","172.30.1.104","TCP","54","44272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27363","12.652773","172.30.1.205","172.30.1.104","TCP","54","44272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27364","12.652896","172.30.1.205","172.30.1.104","TCP","74","36910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915879 TSecr=0 WS=128" +"27365","12.653075","172.30.1.104","172.30.1.205","TCP","54","135 > 44272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27366","12.653106","172.30.1.104","172.30.1.205","TCP","54","135 > 44272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27367","12.653112","172.30.1.205","172.30.1.104","TCP","54","44272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27368","12.653200","172.30.1.104","172.30.1.205","TCP","66","49671 > 36910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27369","12.653208","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27370","12.653556","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27371","12.653850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27372","12.653859","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27373","12.655737","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27374","12.656147","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27375","12.656152","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27376","12.657533","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27377","12.659952","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27378","12.659963","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27379","12.660930","172.30.1.205","172.30.1.104","TCP","74","44276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915887 TSecr=0 WS=128" +"27380","12.661296","172.30.1.104","172.30.1.205","TCP","66","135 > 44276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27381","12.661307","172.30.1.205","172.30.1.104","TCP","54","44276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27382","12.661655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27383","12.661961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27384","12.661970","172.30.1.205","172.30.1.104","TCP","54","44276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27385","12.664152","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27386","12.664610","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27387","12.664617","172.30.1.205","172.30.1.104","TCP","54","44276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27388","12.666445","172.30.1.205","172.30.1.104","TCP","54","44276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27389","12.666563","172.30.1.205","172.30.1.104","TCP","74","36914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915892 TSecr=0 WS=128" +"27390","12.666723","172.30.1.104","172.30.1.205","TCP","54","135 > 44276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27391","12.666756","172.30.1.104","172.30.1.205","TCP","54","135 > 44276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27392","12.666761","172.30.1.205","172.30.1.104","TCP","54","44276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27393","12.666836","172.30.1.104","172.30.1.205","TCP","66","49671 > 36914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27394","12.666844","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27395","12.667190","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27396","12.667529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27397","12.667536","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27398","12.669422","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27399","12.669796","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27400","12.669803","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27401","12.671150","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27402","12.673506","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27403","12.673515","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27404","12.674468","172.30.1.205","172.30.1.104","TCP","74","44280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915900 TSecr=0 WS=128" +"27405","12.674815","172.30.1.104","172.30.1.205","TCP","66","135 > 44280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27406","12.674826","172.30.1.205","172.30.1.104","TCP","54","44280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27407","12.675175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27408","12.675490","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27409","12.675500","172.30.1.205","172.30.1.104","TCP","54","44280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27410","12.677698","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27411","12.678126","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27412","12.678133","172.30.1.205","172.30.1.104","TCP","54","44280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27413","12.679941","172.30.1.205","172.30.1.104","TCP","54","44280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27414","12.680051","172.30.1.205","172.30.1.104","TCP","74","36918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915906 TSecr=0 WS=128" +"27415","12.680232","172.30.1.104","172.30.1.205","TCP","54","135 > 44280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27416","12.680243","172.30.1.104","172.30.1.205","TCP","54","135 > 44280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27417","12.680249","172.30.1.205","172.30.1.104","TCP","54","44280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27418","12.680355","172.30.1.104","172.30.1.205","TCP","66","49671 > 36918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27419","12.680363","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27420","12.680708","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27421","12.681021","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27422","12.681031","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27423","12.682895","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27424","12.683900","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27425","12.683907","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27426","12.685281","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27427","12.687780","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27428","12.687798","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27429","12.688845","172.30.1.205","172.30.1.104","TCP","74","44284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915915 TSecr=0 WS=128" +"27430","12.689162","172.30.1.104","172.30.1.205","TCP","66","135 > 44284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27431","12.689173","172.30.1.205","172.30.1.104","TCP","54","44284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27432","12.689523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27433","12.689842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27434","12.689851","172.30.1.205","172.30.1.104","TCP","54","44284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27435","12.692026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27436","12.692515","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27437","12.692522","172.30.1.205","172.30.1.104","TCP","54","44284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27438","12.694345","172.30.1.205","172.30.1.104","TCP","54","44284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27439","12.694456","172.30.1.205","172.30.1.104","TCP","74","36922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915920 TSecr=0 WS=128" +"27440","12.694639","172.30.1.104","172.30.1.205","TCP","54","135 > 44284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27441","12.694702","172.30.1.104","172.30.1.205","TCP","54","135 > 44284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27442","12.694707","172.30.1.205","172.30.1.104","TCP","54","44284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27443","12.694791","172.30.1.104","172.30.1.205","TCP","66","49671 > 36922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27444","12.694799","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27445","12.695144","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27446","12.696209","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27447","12.696217","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27448","12.698100","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27449","12.698488","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27450","12.698495","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27451","12.699840","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27452","12.702213","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27453","12.702222","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27454","12.703153","172.30.1.205","172.30.1.104","TCP","74","44288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915929 TSecr=0 WS=128" +"27455","12.703449","172.30.1.104","172.30.1.205","TCP","66","135 > 44288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27456","12.703459","172.30.1.205","172.30.1.104","TCP","54","44288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27457","12.703837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27458","12.704135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27459","12.704144","172.30.1.205","172.30.1.104","TCP","54","44288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27460","12.706358","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27461","12.706756","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27462","12.706762","172.30.1.205","172.30.1.104","TCP","54","44288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27463","12.708567","172.30.1.205","172.30.1.104","TCP","54","44288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27464","12.708678","172.30.1.205","172.30.1.104","TCP","74","36926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915935 TSecr=0 WS=128" +"27465","12.708887","172.30.1.104","172.30.1.205","TCP","54","135 > 44288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27466","12.708916","172.30.1.104","172.30.1.205","TCP","54","135 > 44288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27467","12.708922","172.30.1.205","172.30.1.104","TCP","54","44288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27468","12.709015","172.30.1.104","172.30.1.205","TCP","66","49671 > 36926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27469","12.709023","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27470","12.709398","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27471","12.709705","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27472","12.709714","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27473","12.711584","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27474","12.711965","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27475","12.711971","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27476","12.713350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27477","12.715800","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27478","12.715809","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27479","12.716731","172.30.1.205","172.30.1.104","TCP","74","44292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915943 TSecr=0 WS=128" +"27480","12.717087","172.30.1.104","172.30.1.205","TCP","66","135 > 44292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27481","12.717098","172.30.1.205","172.30.1.104","TCP","54","44292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27482","12.717458","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27483","12.717917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27484","12.717935","172.30.1.205","172.30.1.104","TCP","54","44292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27485","12.720326","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27486","12.720727","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27487","12.720734","172.30.1.205","172.30.1.104","TCP","54","44292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27488","12.722544","172.30.1.205","172.30.1.104","TCP","54","44292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27489","12.722655","172.30.1.205","172.30.1.104","TCP","74","36930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915949 TSecr=0 WS=128" +"27490","12.722820","172.30.1.104","172.30.1.205","TCP","54","135 > 44292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27491","12.722888","172.30.1.104","172.30.1.205","TCP","54","135 > 44292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27492","12.722894","172.30.1.205","172.30.1.104","TCP","54","44292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27493","12.722993","172.30.1.104","172.30.1.205","TCP","66","49671 > 36930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27494","12.723002","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27495","12.723347","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27496","12.723650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27497","12.723666","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27498","12.725765","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27499","12.726131","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27500","12.726137","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27501","12.727479","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27502","12.729880","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27503","12.729890","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27504","12.730832","172.30.1.205","172.30.1.104","TCP","74","44296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915957 TSecr=0 WS=128" +"27505","12.731157","172.30.1.104","172.30.1.205","TCP","66","135 > 44296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27506","12.731168","172.30.1.205","172.30.1.104","TCP","54","44296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27507","12.731533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27508","12.731834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27509","12.731843","172.30.1.205","172.30.1.104","TCP","54","44296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27510","12.734051","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27511","12.734445","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27512","12.734451","172.30.1.205","172.30.1.104","TCP","54","44296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27513","12.735299","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27514","12.735349","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27515","12.735386","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27516","12.735418","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27517","12.735452","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27518","12.735480","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27519","12.735517","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27520","12.735552","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27521","12.735579","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27522","12.735612","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27523","12.735639","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27524","12.735715","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27525","12.735948","172.30.1.104","172.30.1.205","TCP","54","49671 > 36890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27526","12.735958","172.30.1.104","172.30.1.205","TCP","54","49671 > 36894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27527","12.735961","172.30.1.104","172.30.1.205","TCP","54","49671 > 36890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27528","12.735967","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27529","12.736087","172.30.1.104","172.30.1.205","TCP","54","49671 > 36898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27530","12.736094","172.30.1.104","172.30.1.205","TCP","54","49671 > 36902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27531","12.736097","172.30.1.104","172.30.1.205","TCP","54","49671 > 36902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27532","12.736102","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27533","12.736274","172.30.1.104","172.30.1.205","TCP","54","49671 > 36894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27534","12.736279","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27535","12.736285","172.30.1.104","172.30.1.205","TCP","54","49671 > 36910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27536","12.736290","172.30.1.104","172.30.1.205","TCP","54","49671 > 36906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27537","12.736294","172.30.1.104","172.30.1.205","TCP","54","49671 > 36914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27538","12.736296","172.30.1.104","172.30.1.205","TCP","54","49671 > 36914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27539","12.736298","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27540","12.736300","172.30.1.104","172.30.1.205","TCP","54","49671 > 36906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27541","12.736302","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27542","12.736303","172.30.1.104","172.30.1.205","TCP","54","49671 > 36918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27543","12.736453","172.30.1.104","172.30.1.205","TCP","54","49671 > 36918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27544","12.736456","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27545","12.736462","172.30.1.104","172.30.1.205","TCP","54","49671 > 36922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27546","12.736467","172.30.1.104","172.30.1.205","TCP","54","49671 > 36922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27547","12.736472","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27548","12.736474","172.30.1.104","172.30.1.205","TCP","54","49671 > 36926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27549","12.736476","172.30.1.104","172.30.1.205","TCP","54","49671 > 36898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27550","12.736479","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27551","12.736820","172.30.1.104","172.30.1.205","TCP","54","49671 > 36930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27552","12.736827","172.30.1.104","172.30.1.205","TCP","54","49671 > 36930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27553","12.736833","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27554","12.736838","172.30.1.104","172.30.1.205","TCP","54","49671 > 36910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27555","12.736840","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27556","12.736912","172.30.1.104","172.30.1.205","TCP","54","49671 > 36926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27557","12.736917","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27558","12.736925","172.30.1.104","172.30.1.205","TCP","54","49671 > 36886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27559","12.736934","172.30.1.104","172.30.1.205","TCP","54","49671 > 36886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27560","12.736936","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27561","12.737291","172.30.1.205","172.30.1.104","TCP","54","44296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27562","12.737416","172.30.1.205","172.30.1.104","TCP","74","36934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915963 TSecr=0 WS=128" +"27563","12.737600","172.30.1.104","172.30.1.205","TCP","54","135 > 44296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27564","12.737607","172.30.1.104","172.30.1.205","TCP","54","135 > 44296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27565","12.737612","172.30.1.205","172.30.1.104","TCP","54","44296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27566","12.737685","172.30.1.104","172.30.1.205","TCP","66","49671 > 36934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27567","12.737694","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27568","12.738049","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27569","12.738424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27570","12.738433","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27571","12.740315","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27572","12.740720","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27573","12.740727","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27574","12.742118","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27575","12.744510","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27576","12.744520","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27577","12.745497","172.30.1.205","172.30.1.104","TCP","74","44300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915971 TSecr=0 WS=128" +"27578","12.745792","172.30.1.104","172.30.1.205","TCP","66","135 > 44300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27579","12.745802","172.30.1.205","172.30.1.104","TCP","54","44300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27580","12.746155","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27581","12.746464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27582","12.746475","172.30.1.205","172.30.1.104","TCP","54","44300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27583","12.748665","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27584","12.749053","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27585","12.749060","172.30.1.205","172.30.1.104","TCP","54","44300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27586","12.750884","172.30.1.205","172.30.1.104","TCP","54","44300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27587","12.751034","172.30.1.205","172.30.1.104","TCP","74","36938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915977 TSecr=0 WS=128" +"27588","12.751162","172.30.1.104","172.30.1.205","TCP","54","135 > 44300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27589","12.751195","172.30.1.104","172.30.1.205","TCP","54","135 > 44300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27590","12.751201","172.30.1.205","172.30.1.104","TCP","54","44300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27591","12.751276","172.30.1.104","172.30.1.205","TCP","66","49671 > 36938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27592","12.751285","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27593","12.751632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27594","12.751923","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27595","12.751932","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27596","12.753861","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27597","12.754284","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27598","12.754290","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27599","12.755646","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27600","12.757965","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27601","12.757978","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27602","12.758998","172.30.1.205","172.30.1.104","TCP","74","44304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915985 TSecr=0 WS=128" +"27603","12.759319","172.30.1.104","172.30.1.205","TCP","66","135 > 44304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27604","12.759330","172.30.1.205","172.30.1.104","TCP","54","44304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27605","12.759689","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27606","12.759983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27607","12.760001","172.30.1.205","172.30.1.104","TCP","54","44304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27608","12.762471","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27609","12.762886","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27610","12.762896","172.30.1.205","172.30.1.104","TCP","54","44304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27611","12.764816","172.30.1.205","172.30.1.104","TCP","54","44304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27612","12.764948","172.30.1.205","172.30.1.104","TCP","74","36942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915991 TSecr=0 WS=128" +"27613","12.765176","172.30.1.104","172.30.1.205","TCP","54","135 > 44304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27614","12.765186","172.30.1.104","172.30.1.205","TCP","54","135 > 44304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27615","12.765192","172.30.1.205","172.30.1.104","TCP","54","44304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27616","12.765273","172.30.1.104","172.30.1.205","TCP","66","49671 > 36942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27617","12.765282","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27618","12.765636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27619","12.765955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27620","12.765962","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27621","12.767857","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27622","12.768242","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27623","12.768254","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27624","12.769799","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27625","12.772141","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27626","12.772151","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27627","12.773116","172.30.1.205","172.30.1.104","TCP","74","44308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915999 TSecr=0 WS=128" +"27628","12.773404","172.30.1.104","172.30.1.205","TCP","66","135 > 44308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27629","12.773415","172.30.1.205","172.30.1.104","TCP","54","44308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27630","12.773766","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27631","12.774083","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27632","12.774092","172.30.1.205","172.30.1.104","TCP","54","44308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27633","12.776286","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27634","12.776669","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27635","12.776675","172.30.1.205","172.30.1.104","TCP","54","44308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27636","12.778520","172.30.1.205","172.30.1.104","TCP","54","44308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27637","12.778632","172.30.1.205","172.30.1.104","TCP","74","36946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916005 TSecr=0 WS=128" +"27638","12.778819","172.30.1.104","172.30.1.205","TCP","54","135 > 44308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27639","12.778836","172.30.1.104","172.30.1.205","TCP","54","135 > 44308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27640","12.778845","172.30.1.205","172.30.1.104","TCP","54","44308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27641","12.778945","172.30.1.104","172.30.1.205","TCP","66","49671 > 36946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27642","12.778962","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27643","12.779498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27644","12.779786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27645","12.779795","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27646","12.781747","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27647","12.782115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27648","12.782121","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27649","12.783497","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27650","12.785942","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27651","12.785952","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27652","12.786902","172.30.1.205","172.30.1.104","TCP","74","44312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916013 TSecr=0 WS=128" +"27653","12.787221","172.30.1.104","172.30.1.205","TCP","66","135 > 44312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27654","12.787232","172.30.1.205","172.30.1.104","TCP","54","44312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27655","12.787601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27656","12.787890","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27657","12.787899","172.30.1.205","172.30.1.104","TCP","54","44312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27658","12.790208","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27659","12.790630","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27660","12.790637","172.30.1.205","172.30.1.104","TCP","54","44312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27661","12.792465","172.30.1.205","172.30.1.104","TCP","54","44312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27662","12.792577","172.30.1.205","172.30.1.104","TCP","74","36950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916019 TSecr=0 WS=128" +"27663","12.792730","172.30.1.104","172.30.1.205","TCP","54","135 > 44312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27664","12.792771","172.30.1.104","172.30.1.205","TCP","54","135 > 44312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27665","12.792788","172.30.1.205","172.30.1.104","TCP","54","44312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27666","12.792885","172.30.1.104","172.30.1.205","TCP","66","49671 > 36950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27667","12.792894","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27668","12.793242","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27669","12.793538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27670","12.793547","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27671","12.795434","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27672","12.795851","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27673","12.795857","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27674","12.797241","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27675","12.799708","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27676","12.799718","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27677","12.800651","172.30.1.205","172.30.1.104","TCP","74","44316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916027 TSecr=0 WS=128" +"27678","12.800966","172.30.1.104","172.30.1.205","TCP","66","135 > 44316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27679","12.800977","172.30.1.205","172.30.1.104","TCP","54","44316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27680","12.801340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27681","12.801628","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27682","12.801637","172.30.1.205","172.30.1.104","TCP","54","44316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27683","12.803844","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27684","12.804255","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27685","12.804262","172.30.1.205","172.30.1.104","TCP","54","44316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27686","12.806121","172.30.1.205","172.30.1.104","TCP","54","44316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27687","12.806237","172.30.1.205","172.30.1.104","TCP","74","36954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916032 TSecr=0 WS=128" +"27688","12.806396","172.30.1.104","172.30.1.205","TCP","54","135 > 44316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27689","12.806416","172.30.1.104","172.30.1.205","TCP","54","135 > 44316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27690","12.806427","172.30.1.205","172.30.1.104","TCP","54","44316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27691","12.806526","172.30.1.104","172.30.1.205","TCP","66","49671 > 36954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27692","12.806542","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27693","12.807083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27694","12.807427","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27695","12.807435","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27696","12.809339","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27697","12.809749","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27698","12.809755","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27699","12.811113","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27700","12.813579","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27701","12.813598","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27702","12.814664","172.30.1.205","172.30.1.104","TCP","74","44320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916041 TSecr=0 WS=128" +"27703","12.814990","172.30.1.104","172.30.1.205","TCP","66","135 > 44320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27704","12.815001","172.30.1.205","172.30.1.104","TCP","54","44320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27705","12.815352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27706","12.815635","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27707","12.815644","172.30.1.205","172.30.1.104","TCP","54","44320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27708","12.817866","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27709","12.818257","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27710","12.818264","172.30.1.205","172.30.1.104","TCP","54","44320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27711","12.820080","172.30.1.205","172.30.1.104","TCP","54","44320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27712","12.820192","172.30.1.205","172.30.1.104","TCP","74","36958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916046 TSecr=0 WS=128" +"27713","12.820364","172.30.1.104","172.30.1.205","TCP","54","135 > 44320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27714","12.820429","172.30.1.104","172.30.1.205","TCP","54","135 > 44320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27715","12.820435","172.30.1.205","172.30.1.104","TCP","54","44320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27716","12.820496","172.30.1.104","172.30.1.205","TCP","66","49671 > 36958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27717","12.820504","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27718","12.820896","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27719","12.821217","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27720","12.821225","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27721","12.823099","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27722","12.823488","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27723","12.823495","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27724","12.824876","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27725","12.827266","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27726","12.827276","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27727","12.828211","172.30.1.205","172.30.1.104","TCP","74","44324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916054 TSecr=0 WS=128" +"27728","12.828503","172.30.1.104","172.30.1.205","TCP","66","135 > 44324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27729","12.828513","172.30.1.205","172.30.1.104","TCP","54","44324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27730","12.828893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27731","12.829190","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27732","12.829199","172.30.1.205","172.30.1.104","TCP","54","44324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27733","12.831417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27734","12.831814","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27735","12.831821","172.30.1.205","172.30.1.104","TCP","54","44324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27736","12.833693","172.30.1.205","172.30.1.104","TCP","54","44324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27737","12.833803","172.30.1.205","172.30.1.104","TCP","74","36962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916060 TSecr=0 WS=128" +"27738","12.833980","172.30.1.104","172.30.1.205","TCP","54","135 > 44324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27739","12.834013","172.30.1.104","172.30.1.205","TCP","54","135 > 44324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27740","12.834018","172.30.1.205","172.30.1.104","TCP","54","44324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27741","12.834092","172.30.1.104","172.30.1.205","TCP","66","49671 > 36962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27742","12.834100","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27743","12.834453","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27744","12.834762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27745","12.834771","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27746","12.836680","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27747","12.837061","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27748","12.837074","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27749","12.838688","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27750","12.841140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27751","12.841150","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27752","12.842112","172.30.1.205","172.30.1.104","TCP","74","44328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916068 TSecr=0 WS=128" +"27753","12.842417","172.30.1.104","172.30.1.205","TCP","66","135 > 44328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27754","12.842428","172.30.1.205","172.30.1.104","TCP","54","44328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27755","12.842778","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27756","12.843070","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27757","12.843079","172.30.1.205","172.30.1.104","TCP","54","44328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27758","12.845322","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27759","12.845721","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27760","12.845728","172.30.1.205","172.30.1.104","TCP","54","44328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27761","12.847543","172.30.1.205","172.30.1.104","TCP","54","44328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27762","12.847654","172.30.1.205","172.30.1.104","TCP","74","36966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916074 TSecr=0 WS=128" +"27763","12.847850","172.30.1.104","172.30.1.205","TCP","54","135 > 44328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27764","12.847858","172.30.1.104","172.30.1.205","TCP","54","135 > 44328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27765","12.847863","172.30.1.205","172.30.1.104","TCP","54","44328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27766","12.847929","172.30.1.104","172.30.1.205","TCP","66","49671 > 36966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27767","12.847937","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27768","12.848282","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27769","12.848574","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27770","12.848583","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27771","12.850527","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27772","12.850906","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27773","12.850911","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27774","12.852320","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27775","12.854675","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27776","12.854685","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27777","12.855629","172.30.1.205","172.30.1.104","TCP","74","44332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916082 TSecr=0 WS=128" +"27778","12.855937","172.30.1.104","172.30.1.205","TCP","66","135 > 44332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27779","12.855948","172.30.1.205","172.30.1.104","TCP","54","44332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27780","12.856300","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27781","12.856610","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27782","12.856619","172.30.1.205","172.30.1.104","TCP","54","44332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27783","12.858823","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27784","12.859276","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27785","12.859283","172.30.1.205","172.30.1.104","TCP","54","44332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27786","12.861150","172.30.1.205","172.30.1.104","TCP","54","44332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27787","12.861284","172.30.1.205","172.30.1.104","TCP","74","36970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916087 TSecr=0 WS=128" +"27788","12.861429","172.30.1.104","172.30.1.205","TCP","54","135 > 44332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27789","12.861506","172.30.1.104","172.30.1.205","TCP","54","135 > 44332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27790","12.861512","172.30.1.205","172.30.1.104","TCP","54","44332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27791","12.861583","172.30.1.104","172.30.1.205","TCP","66","49671 > 36970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27792","12.861596","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27793","12.861965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27794","12.862291","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27795","12.862300","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27796","12.864202","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27797","12.864632","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27798","12.864638","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27799","12.866018","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27800","12.868457","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27801","12.868476","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27802","12.869625","172.30.1.205","172.30.1.104","TCP","74","44336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916096 TSecr=0 WS=128" +"27803","12.869940","172.30.1.104","172.30.1.205","TCP","66","135 > 44336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27804","12.869952","172.30.1.205","172.30.1.104","TCP","54","44336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27805","12.870307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27806","12.870610","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27807","12.870619","172.30.1.205","172.30.1.104","TCP","54","44336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27808","12.872848","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27809","12.873242","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27810","12.873249","172.30.1.205","172.30.1.104","TCP","54","44336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27811","12.875060","172.30.1.205","172.30.1.104","TCP","54","44336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27812","12.875173","172.30.1.205","172.30.1.104","TCP","74","36974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916101 TSecr=0 WS=128" +"27813","12.875346","172.30.1.104","172.30.1.205","TCP","54","135 > 44336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27814","12.875381","172.30.1.104","172.30.1.205","TCP","54","135 > 44336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27815","12.875387","172.30.1.205","172.30.1.104","TCP","54","44336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27816","12.875465","172.30.1.104","172.30.1.205","TCP","66","49671 > 36974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27817","12.875473","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27818","12.875824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27819","12.876150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27820","12.876159","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27821","12.878081","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27822","12.878515","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27823","12.878521","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27824","12.879876","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27825","12.882250","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27826","12.882259","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27827","12.883207","172.30.1.205","172.30.1.104","TCP","74","44340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916109 TSecr=0 WS=128" +"27828","12.883550","172.30.1.104","172.30.1.205","TCP","66","135 > 44340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27829","12.883561","172.30.1.205","172.30.1.104","TCP","54","44340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27830","12.883958","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27831","12.884273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27832","12.884282","172.30.1.205","172.30.1.104","TCP","54","44340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27833","12.886501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27834","12.886997","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27835","12.887003","172.30.1.205","172.30.1.104","TCP","54","44340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27836","12.888831","172.30.1.205","172.30.1.104","TCP","54","44340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27837","12.888943","172.30.1.205","172.30.1.104","TCP","74","36978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916115 TSecr=0 WS=128" +"27838","12.889136","172.30.1.104","172.30.1.205","TCP","54","135 > 44340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27839","12.889169","172.30.1.104","172.30.1.205","TCP","54","135 > 44340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27840","12.889175","172.30.1.205","172.30.1.104","TCP","54","44340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27841","12.889209","172.30.1.104","172.30.1.205","TCP","66","49671 > 36978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27842","12.889217","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27843","12.889557","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27844","12.889873","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27845","12.889882","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27846","12.891775","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27847","12.892173","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27848","12.892179","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27849","12.893557","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27850","12.895966","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27851","12.895975","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27852","12.896925","172.30.1.205","172.30.1.104","TCP","74","44344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916123 TSecr=0 WS=128" +"27853","12.897228","172.30.1.104","172.30.1.205","TCP","66","135 > 44344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27854","12.897238","172.30.1.205","172.30.1.104","TCP","54","44344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27855","12.897595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27856","12.897910","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27857","12.897919","172.30.1.205","172.30.1.104","TCP","54","44344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27858","12.900091","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27859","12.900484","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27860","12.900490","172.30.1.205","172.30.1.104","TCP","54","44344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27861","12.901357","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27862","12.901406","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27863","12.901443","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27864","12.901478","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27865","12.901506","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27866","12.901539","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27867","12.901576","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27868","12.901604","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27869","12.901632","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27870","12.901664","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27871","12.901690","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27872","12.901732","172.30.1.104","172.30.1.205","TCP","54","49671 > 36938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27873","12.901750","172.30.1.104","172.30.1.205","TCP","54","49671 > 36942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27874","12.901770","172.30.1.104","172.30.1.205","TCP","54","49671 > 36938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27875","12.901776","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27876","12.901806","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27877","12.901824","172.30.1.104","172.30.1.205","TCP","54","49671 > 36946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27878","12.901846","172.30.1.104","172.30.1.205","TCP","54","49671 > 36950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27879","12.902133","172.30.1.104","172.30.1.205","TCP","54","49671 > 36954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27880","12.902152","172.30.1.104","172.30.1.205","TCP","54","49671 > 36950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27881","12.902158","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27882","12.902182","172.30.1.104","172.30.1.205","TCP","54","49671 > 36954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27883","12.902185","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27884","12.902232","172.30.1.104","172.30.1.205","TCP","54","49671 > 36942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27885","12.902236","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27886","12.902254","172.30.1.104","172.30.1.205","TCP","54","49671 > 36946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27887","12.902257","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27888","12.902328","172.30.1.104","172.30.1.205","TCP","54","49671 > 36958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27889","12.902361","172.30.1.104","172.30.1.205","TCP","54","49671 > 36962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27890","12.902382","172.30.1.104","172.30.1.205","TCP","54","49671 > 36958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27891","12.902386","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27892","12.902401","172.30.1.104","172.30.1.205","TCP","54","49671 > 36966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27893","12.902421","172.30.1.104","172.30.1.205","TCP","54","49671 > 36970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27894","12.902441","172.30.1.104","172.30.1.205","TCP","54","49671 > 36962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27895","12.902445","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27896","12.902462","172.30.1.104","172.30.1.205","TCP","54","49671 > 36974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27897","12.902482","172.30.1.104","172.30.1.205","TCP","54","49671 > 36974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27898","12.902486","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27899","12.902502","172.30.1.104","172.30.1.205","TCP","54","49671 > 36978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27900","12.902524","172.30.1.104","172.30.1.205","TCP","54","49671 > 36978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27901","12.902527","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27902","12.902864","172.30.1.104","172.30.1.205","TCP","54","49671 > 36934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27903","12.902883","172.30.1.104","172.30.1.205","TCP","54","49671 > 36966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27904","12.902888","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27905","12.902907","172.30.1.104","172.30.1.205","TCP","54","49671 > 36934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27906","12.902909","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27907","12.902931","172.30.1.104","172.30.1.205","TCP","54","49671 > 36970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"27908","12.902933","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"27909","12.903356","172.30.1.205","172.30.1.104","TCP","54","44344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27910","12.903467","172.30.1.205","172.30.1.104","TCP","74","36982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916129 TSecr=0 WS=128" +"27911","12.903617","172.30.1.104","172.30.1.205","TCP","54","135 > 44344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27912","12.903637","172.30.1.104","172.30.1.205","TCP","54","135 > 44344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27913","12.903642","172.30.1.205","172.30.1.104","TCP","54","44344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27914","12.903744","172.30.1.104","172.30.1.205","TCP","66","49671 > 36982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27915","12.903752","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27916","12.904107","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27917","12.904408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27918","12.904417","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27919","12.906342","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27920","12.908094","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27921","12.908100","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27922","12.909488","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27923","12.911986","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27924","12.911996","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27925","12.912976","172.30.1.205","172.30.1.104","TCP","74","44348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916139 TSecr=0 WS=128" +"27926","12.913287","172.30.1.104","172.30.1.205","TCP","66","135 > 44348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27927","12.913298","172.30.1.205","172.30.1.104","TCP","54","44348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27928","12.913650","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27929","12.913987","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27930","12.913996","172.30.1.205","172.30.1.104","TCP","54","44348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27931","12.916171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27932","12.916619","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27933","12.916632","172.30.1.205","172.30.1.104","TCP","54","44348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27934","12.918712","172.30.1.205","172.30.1.104","TCP","54","44348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27935","12.918822","172.30.1.205","172.30.1.104","TCP","74","36986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916145 TSecr=0 WS=128" +"27936","12.919092","172.30.1.104","172.30.1.205","TCP","54","135 > 44348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27937","12.919104","172.30.1.104","172.30.1.205","TCP","54","135 > 44348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27938","12.919111","172.30.1.205","172.30.1.104","TCP","54","44348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27939","12.919121","172.30.1.104","172.30.1.205","TCP","66","49671 > 36986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27940","12.919136","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27941","12.919545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27942","12.919847","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27943","12.919856","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27944","12.921795","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27945","12.922191","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27946","12.922198","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27947","12.923544","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27948","12.926890","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27949","12.926900","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27950","12.927859","172.30.1.205","172.30.1.104","TCP","74","44352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916154 TSecr=0 WS=128" +"27951","12.928183","172.30.1.104","172.30.1.205","TCP","66","135 > 44352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27952","12.928193","172.30.1.205","172.30.1.104","TCP","54","44352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27953","12.928542","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27954","12.928862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27955","12.928871","172.30.1.205","172.30.1.104","TCP","54","44352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27956","12.931078","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27957","12.931481","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27958","12.931488","172.30.1.205","172.30.1.104","TCP","54","44352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27959","12.933324","172.30.1.205","172.30.1.104","TCP","54","44352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27960","12.933450","172.30.1.205","172.30.1.104","TCP","74","36990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916159 TSecr=0 WS=128" +"27961","12.933596","172.30.1.104","172.30.1.205","TCP","54","135 > 44352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27962","12.933668","172.30.1.104","172.30.1.205","TCP","54","135 > 44352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27963","12.933674","172.30.1.205","172.30.1.104","TCP","54","44352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27964","12.933748","172.30.1.104","172.30.1.205","TCP","66","49671 > 36990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27965","12.933757","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27966","12.934103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27967","12.934397","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27968","12.934408","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27969","12.936294","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27970","12.937949","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27971","12.937957","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27972","12.939344","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27973","12.941731","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27974","12.941741","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"27975","12.942701","172.30.1.205","172.30.1.104","TCP","74","44356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916169 TSecr=0 WS=128" +"27976","12.943016","172.30.1.104","172.30.1.205","TCP","66","135 > 44356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27977","12.943026","172.30.1.205","172.30.1.104","TCP","54","44356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27978","12.943377","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"27979","12.943712","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27980","12.943721","172.30.1.205","172.30.1.104","TCP","54","44356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27981","12.945948","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"27982","12.946341","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"27983","12.946348","172.30.1.205","172.30.1.104","TCP","54","44356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27984","12.948170","172.30.1.205","172.30.1.104","TCP","54","44356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"27985","12.948285","172.30.1.205","172.30.1.104","TCP","74","36994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916174 TSecr=0 WS=128" +"27986","12.948470","172.30.1.104","172.30.1.205","TCP","54","135 > 44356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27987","12.948505","172.30.1.104","172.30.1.205","TCP","54","135 > 44356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"27988","12.948510","172.30.1.205","172.30.1.104","TCP","54","44356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"27989","12.948584","172.30.1.104","172.30.1.205","TCP","66","49671 > 36994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"27990","12.948592","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"27991","12.948973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"27992","12.949347","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"27993","12.949356","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"27994","12.951253","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"27995","12.951632","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"27996","12.951638","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"27997","12.953024","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"27998","12.955412","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"27999","12.955422","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28000","12.956358","172.30.1.205","172.30.1.104","TCP","74","44360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916182 TSecr=0 WS=128" +"28001","12.956693","172.30.1.104","172.30.1.205","TCP","66","135 > 44360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28002","12.956704","172.30.1.205","172.30.1.104","TCP","54","44360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28003","12.957086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28004","12.957432","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28005","12.957441","172.30.1.205","172.30.1.104","TCP","54","44360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28006","12.959650","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28007","12.960064","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28008","12.960071","172.30.1.205","172.30.1.104","TCP","54","44360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28009","12.961910","172.30.1.205","172.30.1.104","TCP","54","44360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28010","12.962022","172.30.1.205","172.30.1.104","TCP","74","36998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916188 TSecr=0 WS=128" +"28011","12.962250","172.30.1.104","172.30.1.205","TCP","54","135 > 44360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28012","12.962284","172.30.1.104","172.30.1.205","TCP","54","135 > 44360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28013","12.962289","172.30.1.205","172.30.1.104","TCP","54","44360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28014","12.962332","172.30.1.104","172.30.1.205","TCP","66","49671 > 36998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28015","12.962340","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28016","12.962692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28017","12.963017","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28018","12.963027","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28019","12.964945","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28020","12.967322","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28021","12.967329","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28022","12.968704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28023","12.971079","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28024","12.971089","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28025","12.972040","172.30.1.205","172.30.1.104","TCP","74","44364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916198 TSecr=0 WS=128" +"28026","12.972348","172.30.1.104","172.30.1.205","TCP","66","135 > 44364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28027","12.972359","172.30.1.205","172.30.1.104","TCP","54","44364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28028","12.972706","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28029","12.973010","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28030","12.973020","172.30.1.205","172.30.1.104","TCP","54","44364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28031","12.975232","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28032","12.975623","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28033","12.975630","172.30.1.205","172.30.1.104","TCP","54","44364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28034","12.977471","172.30.1.205","172.30.1.104","TCP","54","44364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28035","12.977586","172.30.1.205","172.30.1.104","TCP","74","37002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916204 TSecr=0 WS=128" +"28036","12.977745","172.30.1.104","172.30.1.205","TCP","54","135 > 44364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28037","12.977826","172.30.1.104","172.30.1.205","TCP","54","135 > 44364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28038","12.977832","172.30.1.205","172.30.1.104","TCP","54","44364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28039","12.977945","172.30.1.104","172.30.1.205","TCP","66","49671 > 37002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28040","12.977956","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28041","12.978314","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28042","12.979032","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28043","12.979044","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28044","12.980967","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28045","12.981352","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28046","12.981359","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28047","12.982738","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28048","12.985684","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28049","12.985694","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28050","12.986654","172.30.1.205","172.30.1.104","TCP","74","44368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916213 TSecr=0 WS=128" +"28051","12.986979","172.30.1.104","172.30.1.205","TCP","66","135 > 44368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28052","12.986990","172.30.1.205","172.30.1.104","TCP","54","44368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28053","12.987337","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28054","12.987661","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28055","12.987669","172.30.1.205","172.30.1.104","TCP","54","44368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28056","12.989890","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28057","12.990291","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28058","12.990306","172.30.1.205","172.30.1.104","TCP","54","44368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28059","12.992127","172.30.1.205","172.30.1.104","TCP","54","44368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28060","12.992242","172.30.1.205","172.30.1.104","TCP","74","37006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916218 TSecr=0 WS=128" +"28061","12.992401","172.30.1.104","172.30.1.205","TCP","54","135 > 44368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28062","12.992434","172.30.1.104","172.30.1.205","TCP","54","135 > 44368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28063","12.992439","172.30.1.205","172.30.1.104","TCP","54","44368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28064","12.992519","172.30.1.104","172.30.1.205","TCP","66","49671 > 37006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28065","12.992527","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28066","12.992913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28067","12.993229","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28068","12.993238","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28069","12.995111","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28070","12.995489","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28071","12.995495","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28072","12.996872","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28073","13.001147","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28074","13.001158","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28075","13.002127","172.30.1.205","172.30.1.104","TCP","74","44372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916228 TSecr=0 WS=128" +"28076","13.002447","172.30.1.104","172.30.1.205","TCP","66","135 > 44372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28077","13.002458","172.30.1.205","172.30.1.104","TCP","54","44372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28078","13.002815","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28079","13.003140","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28080","13.003151","172.30.1.205","172.30.1.104","TCP","54","44372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28081","13.005376","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28082","13.005770","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28083","13.005777","172.30.1.205","172.30.1.104","TCP","54","44372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28084","13.007603","172.30.1.205","172.30.1.104","TCP","54","44372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28085","13.007715","172.30.1.205","172.30.1.104","TCP","74","37010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916234 TSecr=0 WS=128" +"28086","13.007895","172.30.1.104","172.30.1.205","TCP","54","135 > 44372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28087","13.007930","172.30.1.104","172.30.1.205","TCP","54","135 > 44372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28088","13.007936","172.30.1.205","172.30.1.104","TCP","54","44372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28089","13.008004","172.30.1.104","172.30.1.205","TCP","66","49671 > 37010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28090","13.008012","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28091","13.008355","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28092","13.008647","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28093","13.008656","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28094","13.010548","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28095","13.010953","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28096","13.010960","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28097","13.012348","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28098","13.014916","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28099","13.014927","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28100","13.015909","172.30.1.205","172.30.1.104","TCP","74","44376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916242 TSecr=0 WS=128" +"28101","13.016282","172.30.1.104","172.30.1.205","TCP","66","135 > 44376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28102","13.016293","172.30.1.205","172.30.1.104","TCP","54","44376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28103","13.016643","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28104","13.016965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28105","13.016974","172.30.1.205","172.30.1.104","TCP","54","44376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28106","13.019174","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28107","13.019621","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28108","13.019627","172.30.1.205","172.30.1.104","TCP","54","44376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28109","13.021459","172.30.1.205","172.30.1.104","TCP","54","44376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28110","13.021574","172.30.1.205","172.30.1.104","TCP","74","37014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916247 TSecr=0 WS=128" +"28111","13.021752","172.30.1.104","172.30.1.205","TCP","54","135 > 44376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28112","13.021780","172.30.1.104","172.30.1.205","TCP","54","135 > 44376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28113","13.021785","172.30.1.205","172.30.1.104","TCP","54","44376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28114","13.021918","172.30.1.104","172.30.1.205","TCP","66","49671 > 37014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28115","13.021935","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28116","13.022353","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28117","13.022690","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28118","13.022704","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28119","13.024600","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28120","13.025032","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28121","13.025040","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28122","13.026407","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28123","13.029050","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28124","13.029060","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28125","13.030027","172.30.1.205","172.30.1.104","TCP","74","44380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916256 TSecr=0 WS=128" +"28126","13.030371","172.30.1.104","172.30.1.205","TCP","66","135 > 44380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28127","13.030382","172.30.1.205","172.30.1.104","TCP","54","44380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28128","13.030732","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28129","13.031091","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28130","13.031100","172.30.1.205","172.30.1.104","TCP","54","44380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28131","13.033385","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28132","13.033827","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28133","13.033837","172.30.1.205","172.30.1.104","TCP","54","44380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28134","13.035756","172.30.1.205","172.30.1.104","TCP","54","44380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28135","13.035880","172.30.1.205","172.30.1.104","TCP","74","37018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916262 TSecr=0 WS=128" +"28136","13.036044","172.30.1.104","172.30.1.205","TCP","54","135 > 44380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28137","13.036087","172.30.1.104","172.30.1.205","TCP","54","135 > 44380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28138","13.036093","172.30.1.205","172.30.1.104","TCP","54","44380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28139","13.036164","172.30.1.104","172.30.1.205","TCP","66","49671 > 37018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28140","13.036173","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28141","13.036523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28142","13.036848","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28143","13.036857","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28144","13.038736","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28145","13.039160","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28146","13.039167","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28147","13.040510","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28148","13.042984","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28149","13.043002","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28150","13.044175","172.30.1.205","172.30.1.104","TCP","74","44384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916270 TSecr=0 WS=128" +"28151","13.044476","172.30.1.104","172.30.1.205","TCP","66","135 > 44384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28152","13.044487","172.30.1.205","172.30.1.104","TCP","54","44384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28153","13.044867","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28154","13.045193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28155","13.045203","172.30.1.205","172.30.1.104","TCP","54","44384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28156","13.047444","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28157","13.047858","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28158","13.047877","172.30.1.205","172.30.1.104","TCP","54","44384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28159","13.049809","172.30.1.205","172.30.1.104","TCP","54","44384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28160","13.049932","172.30.1.205","172.30.1.104","TCP","74","37022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916276 TSecr=0 WS=128" +"28161","13.050103","172.30.1.104","172.30.1.205","TCP","54","135 > 44384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28162","13.050175","172.30.1.104","172.30.1.205","TCP","54","135 > 44384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28163","13.050181","172.30.1.205","172.30.1.104","TCP","54","44384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28164","13.050276","172.30.1.104","172.30.1.205","TCP","66","49671 > 37022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28165","13.050284","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28166","13.050634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28167","13.050969","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28168","13.050983","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28169","13.053008","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28170","13.053395","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28171","13.053402","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28172","13.054762","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28173","13.057218","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28174","13.057229","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28175","13.058200","172.30.1.205","172.30.1.104","TCP","74","44388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916284 TSecr=0 WS=128" +"28176","13.058505","172.30.1.104","172.30.1.205","TCP","66","135 > 44388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28177","13.058516","172.30.1.205","172.30.1.104","TCP","54","44388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28178","13.058862","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28179","13.059220","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28180","13.059229","172.30.1.205","172.30.1.104","TCP","54","44388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28181","13.061510","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28182","13.061927","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28183","13.061945","172.30.1.205","172.30.1.104","TCP","54","44388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28184","13.063792","172.30.1.205","172.30.1.104","TCP","54","44388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28185","13.063911","172.30.1.205","172.30.1.104","TCP","74","37026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916290 TSecr=0 WS=128" +"28186","13.064095","172.30.1.104","172.30.1.205","TCP","54","135 > 44388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28187","13.064143","172.30.1.104","172.30.1.205","TCP","54","135 > 44388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28188","13.064149","172.30.1.205","172.30.1.104","TCP","54","44388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28189","13.064223","172.30.1.104","172.30.1.205","TCP","66","49671 > 37026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28190","13.064231","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28191","13.064630","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28192","13.064957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28193","13.064966","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28194","13.066868","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28195","13.067250","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28196","13.067260","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28197","13.068899","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28198","13.071293","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28199","13.071311","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28200","13.072481","172.30.1.205","172.30.1.104","TCP","74","44392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916298 TSecr=0 WS=128" +"28201","13.072841","172.30.1.104","172.30.1.205","TCP","66","135 > 44392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28202","13.072852","172.30.1.205","172.30.1.104","TCP","54","44392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28203","13.073227","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28204","13.073556","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28205","13.073565","172.30.1.205","172.30.1.104","TCP","54","44392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28206","13.075818","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28207","13.076231","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28208","13.076237","172.30.1.205","172.30.1.104","TCP","54","44392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28209","13.077114","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28210","13.077164","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28211","13.077201","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28212","13.077230","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28213","13.077257","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28214","13.077285","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28215","13.077311","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28216","13.077339","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28217","13.077365","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28218","13.077397","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28219","13.077423","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28220","13.077449","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28221","13.077773","172.30.1.104","172.30.1.205","TCP","54","49671 > 36982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28222","13.077796","172.30.1.104","172.30.1.205","TCP","54","49671 > 36986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28223","13.077823","172.30.1.104","172.30.1.205","TCP","54","49671 > 36982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28224","13.077829","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28225","13.077859","172.30.1.104","172.30.1.205","TCP","54","49671 > 36990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28226","13.077883","172.30.1.104","172.30.1.205","TCP","54","49671 > 36994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28227","13.077909","172.30.1.104","172.30.1.205","TCP","54","49671 > 36998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28228","13.077936","172.30.1.104","172.30.1.205","TCP","54","49671 > 36994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28229","13.077940","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28230","13.077969","172.30.1.104","172.30.1.205","TCP","54","49671 > 37002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28231","13.077996","172.30.1.104","172.30.1.205","TCP","54","49671 > 36986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28232","13.078000","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28233","13.078023","172.30.1.104","172.30.1.205","TCP","54","49671 > 37006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28234","13.078050","172.30.1.104","172.30.1.205","TCP","54","49671 > 37006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28235","13.078054","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28236","13.078077","172.30.1.104","172.30.1.205","TCP","54","49671 > 37010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28237","13.078107","172.30.1.104","172.30.1.205","TCP","54","49671 > 37002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28238","13.078111","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28239","13.078134","172.30.1.104","172.30.1.205","TCP","54","49671 > 37014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28240","13.078161","172.30.1.104","172.30.1.205","TCP","54","49671 > 36998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28241","13.078166","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28242","13.078188","172.30.1.104","172.30.1.205","TCP","54","49671 > 37018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28243","13.078215","172.30.1.104","172.30.1.205","TCP","54","49671 > 37022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28244","13.078243","172.30.1.104","172.30.1.205","TCP","54","49671 > 37018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28245","13.078246","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28246","13.078269","172.30.1.104","172.30.1.205","TCP","54","49671 > 37014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28247","13.078273","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28248","13.078297","172.30.1.104","172.30.1.205","TCP","54","49671 > 37026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28249","13.078505","172.30.1.104","172.30.1.205","TCP","54","49671 > 37010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28250","13.078508","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28251","13.078541","172.30.1.104","172.30.1.205","TCP","54","49671 > 37026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28252","13.078544","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28253","13.078572","172.30.1.104","172.30.1.205","TCP","54","49671 > 37022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28254","13.078576","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28255","13.078599","172.30.1.104","172.30.1.205","TCP","54","49671 > 36990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28256","13.078602","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28257","13.079088","172.30.1.205","172.30.1.104","TCP","54","44392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28258","13.079196","172.30.1.205","172.30.1.104","TCP","74","37030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916305 TSecr=0 WS=128" +"28259","13.079371","172.30.1.104","172.30.1.205","TCP","54","135 > 44392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28260","13.079420","172.30.1.104","172.30.1.205","TCP","54","135 > 44392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28261","13.079425","172.30.1.205","172.30.1.104","TCP","54","44392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28262","13.079467","172.30.1.104","172.30.1.205","TCP","66","49671 > 37030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28263","13.079475","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28264","13.079837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28265","13.080154","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28266","13.080162","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28267","13.082076","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28268","13.082477","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28269","13.082483","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28270","13.083826","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28271","13.086234","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28272","13.086244","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28273","13.087183","172.30.1.205","172.30.1.104","TCP","74","44396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916313 TSecr=0 WS=128" +"28274","13.087493","172.30.1.104","172.30.1.205","TCP","66","135 > 44396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28275","13.087504","172.30.1.205","172.30.1.104","TCP","54","44396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28276","13.087849","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28277","13.088180","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28278","13.088188","172.30.1.205","172.30.1.104","TCP","54","44396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28279","13.090439","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28280","13.090890","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28281","13.090896","172.30.1.205","172.30.1.104","TCP","54","44396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28282","13.092699","172.30.1.205","172.30.1.104","TCP","54","44396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28283","13.092833","172.30.1.205","172.30.1.104","TCP","74","37034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916319 TSecr=0 WS=128" +"28284","13.093011","172.30.1.104","172.30.1.205","TCP","54","135 > 44396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28285","13.093043","172.30.1.104","172.30.1.205","TCP","54","135 > 44396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28286","13.093048","172.30.1.205","172.30.1.104","TCP","54","44396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28287","13.093156","172.30.1.104","172.30.1.205","TCP","66","49671 > 37034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28288","13.093164","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28289","13.093508","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28290","13.093803","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28291","13.093811","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28292","13.095654","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28293","13.096385","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28294","13.096391","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28295","13.097816","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28296","13.100129","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28297","13.100139","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28298","13.101107","172.30.1.205","172.30.1.104","TCP","74","44400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916327 TSecr=0 WS=128" +"28299","13.101435","172.30.1.104","172.30.1.205","TCP","66","135 > 44400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28300","13.101446","172.30.1.205","172.30.1.104","TCP","54","44400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28301","13.101796","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28302","13.102111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28303","13.102120","172.30.1.205","172.30.1.104","TCP","54","44400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28304","13.104301","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28305","13.104722","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28306","13.104728","172.30.1.205","172.30.1.104","TCP","54","44400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28307","13.106525","172.30.1.205","172.30.1.104","TCP","54","44400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28308","13.106633","172.30.1.205","172.30.1.104","TCP","74","37038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916333 TSecr=0 WS=128" +"28309","13.106800","172.30.1.104","172.30.1.205","TCP","54","135 > 44400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28310","13.106846","172.30.1.104","172.30.1.205","TCP","54","135 > 44400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28311","13.106851","172.30.1.205","172.30.1.104","TCP","54","44400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28312","13.106926","172.30.1.104","172.30.1.205","TCP","66","49671 > 37038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28313","13.106934","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28314","13.107276","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28315","13.107620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28316","13.107628","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28317","13.109520","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28318","13.109910","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28319","13.109916","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28320","13.111250","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28321","13.113681","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28322","13.113691","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28323","13.114625","172.30.1.205","172.30.1.104","TCP","74","44404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916341 TSecr=0 WS=128" +"28324","13.114939","172.30.1.104","172.30.1.205","TCP","66","135 > 44404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28325","13.114950","172.30.1.205","172.30.1.104","TCP","54","44404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28326","13.115297","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28327","13.115600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28328","13.115609","172.30.1.205","172.30.1.104","TCP","54","44404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28329","13.117810","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28330","13.118240","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28331","13.118246","172.30.1.205","172.30.1.104","TCP","54","44404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28332","13.120052","172.30.1.205","172.30.1.104","TCP","54","44404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28333","13.120161","172.30.1.205","172.30.1.104","TCP","74","37042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916346 TSecr=0 WS=128" +"28334","13.120362","172.30.1.104","172.30.1.205","TCP","54","135 > 44404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28335","13.120372","172.30.1.104","172.30.1.205","TCP","54","135 > 44404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28336","13.120377","172.30.1.205","172.30.1.104","TCP","54","44404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28337","13.120474","172.30.1.104","172.30.1.205","TCP","66","49671 > 37042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28338","13.120483","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28339","13.120855","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28340","13.121256","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28341","13.121265","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28342","13.123142","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28343","13.123526","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28344","13.123532","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28345","13.124902","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28346","13.127470","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28347","13.127479","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28348","13.128401","172.30.1.205","172.30.1.104","TCP","74","44408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916354 TSecr=0 WS=128" +"28349","13.128708","172.30.1.104","172.30.1.205","TCP","66","135 > 44408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28350","13.128718","172.30.1.205","172.30.1.104","TCP","54","44408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28351","13.129083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28352","13.129412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28353","13.129421","172.30.1.205","172.30.1.104","TCP","54","44408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28354","13.131579","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28355","13.132018","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28356","13.132030","172.30.1.205","172.30.1.104","TCP","54","44408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28357","13.134107","172.30.1.205","172.30.1.104","TCP","54","44408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28358","13.134223","172.30.1.205","172.30.1.104","TCP","74","37046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916360 TSecr=0 WS=128" +"28359","13.134440","172.30.1.104","172.30.1.205","TCP","54","135 > 44408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28360","13.134450","172.30.1.104","172.30.1.205","TCP","54","135 > 44408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28361","13.134455","172.30.1.205","172.30.1.104","TCP","54","44408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28362","13.134527","172.30.1.104","172.30.1.205","TCP","66","49671 > 37046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28363","13.134535","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28364","13.134877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28365","13.135380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28366","13.135387","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28367","13.137268","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28368","13.137653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28369","13.137659","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28370","13.138990","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28371","13.141509","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28372","13.141518","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28373","13.142447","172.30.1.205","172.30.1.104","TCP","74","44412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916368 TSecr=0 WS=128" +"28374","13.142776","172.30.1.104","172.30.1.205","TCP","66","135 > 44412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28375","13.142796","172.30.1.205","172.30.1.104","TCP","54","44412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28376","13.143374","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28377","13.143687","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28378","13.143695","172.30.1.205","172.30.1.104","TCP","54","44412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28379","13.145895","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28380","13.146320","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28381","13.146326","172.30.1.205","172.30.1.104","TCP","54","44412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28382","13.148135","172.30.1.205","172.30.1.104","TCP","54","44412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28383","13.148243","172.30.1.205","172.30.1.104","TCP","74","37050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916374 TSecr=0 WS=128" +"28384","13.148448","172.30.1.104","172.30.1.205","TCP","54","135 > 44412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28385","13.148523","172.30.1.104","172.30.1.205","TCP","66","49671 > 37050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28386","13.148532","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28387","13.148555","172.30.1.104","172.30.1.205","TCP","54","135 > 44412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28388","13.148560","172.30.1.205","172.30.1.104","TCP","54","44412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28389","13.148923","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28390","13.149224","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28391","13.149232","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28392","13.151101","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28393","13.151513","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28394","13.151520","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28395","13.152888","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28396","13.155427","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28397","13.155436","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28398","13.156363","172.30.1.205","172.30.1.104","TCP","74","44416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916382 TSecr=0 WS=128" +"28399","13.156647","172.30.1.104","172.30.1.205","TCP","66","135 > 44416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28400","13.156657","172.30.1.205","172.30.1.104","TCP","54","44416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28401","13.157037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28402","13.157345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28403","13.157354","172.30.1.205","172.30.1.104","TCP","54","44416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28404","13.159535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28405","13.159953","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28406","13.159959","172.30.1.205","172.30.1.104","TCP","54","44416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28407","13.161833","172.30.1.205","172.30.1.104","TCP","54","44416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28408","13.161952","172.30.1.205","172.30.1.104","TCP","74","37054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916388 TSecr=0 WS=128" +"28409","13.162124","172.30.1.104","172.30.1.205","TCP","54","135 > 44416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28410","13.162154","172.30.1.104","172.30.1.205","TCP","54","135 > 44416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28411","13.162159","172.30.1.205","172.30.1.104","TCP","54","44416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28412","13.162237","172.30.1.104","172.30.1.205","TCP","66","49671 > 37054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28413","13.162246","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28414","13.162595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28415","13.162960","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28416","13.162968","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28417","13.164867","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28418","13.165250","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28419","13.165256","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28420","13.166600","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28421","13.170172","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28422","13.170181","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28423","13.171120","172.30.1.205","172.30.1.104","TCP","74","44420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916397 TSecr=0 WS=128" +"28424","13.171445","172.30.1.104","172.30.1.205","TCP","66","135 > 44420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28425","13.171456","172.30.1.205","172.30.1.104","TCP","54","44420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28426","13.171802","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28427","13.172150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28428","13.172159","172.30.1.205","172.30.1.104","TCP","54","44420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28429","13.174364","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28430","13.174774","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28431","13.174780","172.30.1.205","172.30.1.104","TCP","54","44420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28432","13.176571","172.30.1.205","172.30.1.104","TCP","54","44420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28433","13.176679","172.30.1.205","172.30.1.104","TCP","74","37058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916403 TSecr=0 WS=128" +"28434","13.176851","172.30.1.104","172.30.1.205","TCP","54","135 > 44420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28435","13.176886","172.30.1.104","172.30.1.205","TCP","54","135 > 44420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28436","13.176892","172.30.1.205","172.30.1.104","TCP","54","44420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28437","13.176965","172.30.1.104","172.30.1.205","TCP","66","49671 > 37058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28438","13.176974","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28439","13.177322","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28440","13.177626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28441","13.177635","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28442","13.179500","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28443","13.179887","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28444","13.179893","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28445","13.181273","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28446","13.183658","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28447","13.183676","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28448","13.184678","172.30.1.205","172.30.1.104","TCP","74","44424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916411 TSecr=0 WS=128" +"28449","13.184985","172.30.1.104","172.30.1.205","TCP","66","135 > 44424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28450","13.184996","172.30.1.205","172.30.1.104","TCP","54","44424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28451","13.185350","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28452","13.185685","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28453","13.185694","172.30.1.205","172.30.1.104","TCP","54","44424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28454","13.187862","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28455","13.188255","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28456","13.188261","172.30.1.205","172.30.1.104","TCP","54","44424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28457","13.190094","172.30.1.205","172.30.1.104","TCP","54","44424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28458","13.190214","172.30.1.205","172.30.1.104","TCP","74","37062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916416 TSecr=0 WS=128" +"28459","13.190368","172.30.1.104","172.30.1.205","TCP","54","135 > 44424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28460","13.190407","172.30.1.104","172.30.1.205","TCP","54","135 > 44424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28461","13.190412","172.30.1.205","172.30.1.104","TCP","54","44424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28462","13.190513","172.30.1.104","172.30.1.205","TCP","66","49671 > 37062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28463","13.190521","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28464","13.190883","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28465","13.191238","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28466","13.191248","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28467","13.193247","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28468","13.193616","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28469","13.193623","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28470","13.194975","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28471","13.197393","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28472","13.197402","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28473","13.198379","172.30.1.205","172.30.1.104","TCP","74","44428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916424 TSecr=0 WS=128" +"28474","13.198710","172.30.1.104","172.30.1.205","TCP","66","135 > 44428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28475","13.198721","172.30.1.205","172.30.1.104","TCP","54","44428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28476","13.199072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28477","13.199508","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28478","13.199517","172.30.1.205","172.30.1.104","TCP","54","44428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28479","13.201738","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28480","13.202143","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28481","13.202150","172.30.1.205","172.30.1.104","TCP","54","44428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28482","13.203971","172.30.1.205","172.30.1.104","TCP","54","44428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28483","13.204084","172.30.1.205","172.30.1.104","TCP","74","37066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916430 TSecr=0 WS=128" +"28484","13.204311","172.30.1.104","172.30.1.205","TCP","54","135 > 44428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28485","13.204320","172.30.1.104","172.30.1.205","TCP","54","135 > 44428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28486","13.204325","172.30.1.205","172.30.1.104","TCP","54","44428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28487","13.204436","172.30.1.104","172.30.1.205","TCP","66","49671 > 37066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28488","13.204444","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28489","13.204820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28490","13.206350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28491","13.206359","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28492","13.208230","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28493","13.208681","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28494","13.208687","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28495","13.210072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28496","13.212477","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28497","13.212496","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28498","13.213694","172.30.1.205","172.30.1.104","TCP","74","44432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916440 TSecr=0 WS=128" +"28499","13.214000","172.30.1.104","172.30.1.205","TCP","66","135 > 44432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28500","13.214011","172.30.1.205","172.30.1.104","TCP","54","44432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28501","13.214369","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28502","13.214701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28503","13.214710","172.30.1.205","172.30.1.104","TCP","54","44432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28504","13.216963","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28505","13.217397","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28506","13.217404","172.30.1.205","172.30.1.104","TCP","54","44432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28507","13.219216","172.30.1.205","172.30.1.104","TCP","54","44432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28508","13.219330","172.30.1.205","172.30.1.104","TCP","74","37070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916445 TSecr=0 WS=128" +"28509","13.219511","172.30.1.104","172.30.1.205","TCP","54","135 > 44432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28510","13.219594","172.30.1.104","172.30.1.205","TCP","54","135 > 44432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28511","13.219600","172.30.1.205","172.30.1.104","TCP","54","44432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28512","13.219696","172.30.1.104","172.30.1.205","TCP","66","49671 > 37070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28513","13.219712","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28514","13.220060","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28515","13.220380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28516","13.220388","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28517","13.222315","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28518","13.222696","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28519","13.222703","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28520","13.224057","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28521","13.226504","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28522","13.226518","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28523","13.227538","172.30.1.205","172.30.1.104","TCP","74","44436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916453 TSecr=0 WS=128" +"28524","13.227866","172.30.1.104","172.30.1.205","TCP","66","135 > 44436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28525","13.227878","172.30.1.205","172.30.1.104","TCP","54","44436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28526","13.228235","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28527","13.228584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28528","13.228593","172.30.1.205","172.30.1.104","TCP","54","44436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28529","13.230819","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28530","13.231292","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28531","13.231298","172.30.1.205","172.30.1.104","TCP","54","44436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28532","13.233128","172.30.1.205","172.30.1.104","TCP","54","44436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28533","13.233237","172.30.1.205","172.30.1.104","TCP","74","37074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916459 TSecr=0 WS=128" +"28534","13.233426","172.30.1.104","172.30.1.205","TCP","54","135 > 44436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28535","13.233463","172.30.1.104","172.30.1.205","TCP","54","135 > 44436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28536","13.233469","172.30.1.205","172.30.1.104","TCP","54","44436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28537","13.233544","172.30.1.104","172.30.1.205","TCP","66","49671 > 37074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28538","13.233553","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28539","13.233910","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28540","13.234219","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28541","13.234229","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28542","13.236097","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28543","13.236548","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28544","13.236555","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28545","13.237929","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28546","13.240312","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28547","13.240323","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28548","13.241331","172.30.1.205","172.30.1.104","TCP","74","44440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916467 TSecr=0 WS=128" +"28549","13.241669","172.30.1.104","172.30.1.205","TCP","66","135 > 44440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28550","13.241690","172.30.1.205","172.30.1.104","TCP","54","44440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28551","13.242209","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28552","13.242497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28553","13.242506","172.30.1.205","172.30.1.104","TCP","54","44440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28554","13.244694","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28555","13.245143","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28556","13.245156","172.30.1.205","172.30.1.104","TCP","54","44440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28557","13.246211","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28558","13.246260","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28559","13.246296","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28560","13.246330","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28561","13.246362","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28562","13.246395","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28563","13.246422","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28564","13.246455","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28565","13.246481","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28566","13.246512","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28567","13.246539","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28568","13.246606","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28569","13.246873","172.30.1.104","172.30.1.205","TCP","54","49671 > 37034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28570","13.246890","172.30.1.104","172.30.1.205","TCP","54","49671 > 37038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28571","13.246922","172.30.1.104","172.30.1.205","TCP","54","49671 > 37034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28572","13.246929","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28573","13.246942","172.30.1.104","172.30.1.205","TCP","54","49671 > 37042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28574","13.247010","172.30.1.104","172.30.1.205","TCP","54","49671 > 37050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28575","13.247028","172.30.1.104","172.30.1.205","TCP","54","49671 > 37046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28576","13.247062","172.30.1.104","172.30.1.205","TCP","54","49671 > 37046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28577","13.247066","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28578","13.247083","172.30.1.104","172.30.1.205","TCP","54","49671 > 37050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28579","13.247086","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28580","13.247107","172.30.1.104","172.30.1.205","TCP","54","49671 > 37038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28581","13.247109","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28582","13.247127","172.30.1.104","172.30.1.205","TCP","54","49671 > 37054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28583","13.247147","172.30.1.104","172.30.1.205","TCP","54","49671 > 37042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28584","13.247151","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28585","13.247169","172.30.1.104","172.30.1.205","TCP","54","49671 > 37058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28586","13.247277","172.30.1.104","172.30.1.205","TCP","54","49671 > 37062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28587","13.247296","172.30.1.104","172.30.1.205","TCP","54","49671 > 37054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28588","13.247300","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28589","13.247318","172.30.1.104","172.30.1.205","TCP","54","49671 > 37066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28590","13.247344","172.30.1.104","172.30.1.205","TCP","54","49671 > 37070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28591","13.247365","172.30.1.104","172.30.1.205","TCP","54","49671 > 37066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28592","13.247368","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28593","13.247390","172.30.1.104","172.30.1.205","TCP","54","49671 > 37058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28594","13.247394","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28595","13.247413","172.30.1.104","172.30.1.205","TCP","54","49671 > 37074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28596","13.247748","172.30.1.104","172.30.1.205","TCP","54","49671 > 37030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28597","13.247763","172.30.1.104","172.30.1.205","TCP","54","49671 > 37074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28598","13.247768","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28599","13.247791","172.30.1.104","172.30.1.205","TCP","54","49671 > 37070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28600","13.247794","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28601","13.247844","172.30.1.104","172.30.1.205","TCP","54","49671 > 37030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28602","13.247848","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28603","13.247862","172.30.1.104","172.30.1.205","TCP","54","49671 > 37062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28604","13.247865","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28605","13.248189","172.30.1.205","172.30.1.104","TCP","54","44440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28606","13.248296","172.30.1.205","172.30.1.104","TCP","74","37078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916474 TSecr=0 WS=128" +"28607","13.248467","172.30.1.104","172.30.1.205","TCP","54","135 > 44440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28608","13.248481","172.30.1.104","172.30.1.205","TCP","54","135 > 44440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28609","13.248485","172.30.1.205","172.30.1.104","TCP","54","44440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28610","13.248593","172.30.1.104","172.30.1.205","TCP","66","49671 > 37078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28611","13.248601","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28612","13.248988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28613","13.249306","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28614","13.249315","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28615","13.251184","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28616","13.251620","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28617","13.251626","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28618","13.253005","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28619","13.255536","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28620","13.255545","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28621","13.256471","172.30.1.205","172.30.1.104","TCP","74","44444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916482 TSecr=0 WS=128" +"28622","13.256866","172.30.1.104","172.30.1.205","TCP","66","135 > 44444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28623","13.256877","172.30.1.205","172.30.1.104","TCP","54","44444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28624","13.257231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28625","13.257529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28626","13.257538","172.30.1.205","172.30.1.104","TCP","54","44444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28627","13.259708","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28628","13.260110","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28629","13.260116","172.30.1.205","172.30.1.104","TCP","54","44444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28630","13.261939","172.30.1.205","172.30.1.104","TCP","54","44444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28631","13.262047","172.30.1.205","172.30.1.104","TCP","74","37082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916488 TSecr=0 WS=128" +"28632","13.262204","172.30.1.104","172.30.1.205","TCP","54","135 > 44444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28633","13.262244","172.30.1.104","172.30.1.205","TCP","54","135 > 44444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28634","13.262249","172.30.1.205","172.30.1.104","TCP","54","44444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28635","13.262347","172.30.1.104","172.30.1.205","TCP","66","49671 > 37082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28636","13.262355","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28637","13.262696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28638","13.263001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28639","13.263010","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28640","13.264908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28641","13.265291","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28642","13.265297","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28643","13.266642","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28644","13.269091","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28645","13.269109","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28646","13.270089","172.30.1.205","172.30.1.104","TCP","74","44448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916496 TSecr=0 WS=128" +"28647","13.270410","172.30.1.104","172.30.1.205","TCP","66","135 > 44448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28648","13.270420","172.30.1.205","172.30.1.104","TCP","54","44448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28649","13.270767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28650","13.271107","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28651","13.271115","172.30.1.205","172.30.1.104","TCP","54","44448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28652","13.273326","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28653","13.273727","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28654","13.273733","172.30.1.205","172.30.1.104","TCP","54","44448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28655","13.275538","172.30.1.205","172.30.1.104","TCP","54","44448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28656","13.275645","172.30.1.205","172.30.1.104","TCP","74","37086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916502 TSecr=0 WS=128" +"28657","13.275857","172.30.1.104","172.30.1.205","TCP","54","135 > 44448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28658","13.275871","172.30.1.104","172.30.1.205","TCP","54","135 > 44448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28659","13.275876","172.30.1.205","172.30.1.104","TCP","54","44448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28660","13.275981","172.30.1.104","172.30.1.205","TCP","66","49671 > 37086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28661","13.275988","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28662","13.276335","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28663","13.276645","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28664","13.276653","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28665","13.278539","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28666","13.278936","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28667","13.278942","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28668","13.280280","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28669","13.282676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28670","13.282685","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28671","13.283624","172.30.1.205","172.30.1.104","TCP","74","44452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916510 TSecr=0 WS=128" +"28672","13.283909","172.30.1.104","172.30.1.205","TCP","66","135 > 44452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28673","13.283920","172.30.1.205","172.30.1.104","TCP","54","44452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28674","13.284266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28675","13.284560","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28676","13.284569","172.30.1.205","172.30.1.104","TCP","54","44452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28677","13.286780","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28678","13.287257","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28679","13.287264","172.30.1.205","172.30.1.104","TCP","54","44452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28680","13.289106","172.30.1.205","172.30.1.104","TCP","54","44452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28681","13.289215","172.30.1.205","172.30.1.104","TCP","74","37090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916515 TSecr=0 WS=128" +"28682","13.289438","172.30.1.104","172.30.1.205","TCP","54","135 > 44452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28683","13.289453","172.30.1.104","172.30.1.205","TCP","54","135 > 44452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28684","13.289458","172.30.1.205","172.30.1.104","TCP","54","44452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28685","13.289543","172.30.1.104","172.30.1.205","TCP","66","49671 > 37090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28686","13.289551","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28687","13.289896","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28688","13.290687","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28689","13.290694","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28690","13.292551","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28691","13.292945","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28692","13.292952","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28693","13.294310","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28694","13.296760","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28695","13.296769","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28696","13.297729","172.30.1.205","172.30.1.104","TCP","74","44456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916524 TSecr=0 WS=128" +"28697","13.298044","172.30.1.104","172.30.1.205","TCP","66","135 > 44456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28698","13.298054","172.30.1.205","172.30.1.104","TCP","54","44456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28699","13.298401","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28700","13.298703","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28701","13.298712","172.30.1.205","172.30.1.104","TCP","54","44456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28702","13.300919","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28703","13.301325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28704","13.301332","172.30.1.205","172.30.1.104","TCP","54","44456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28705","13.303138","172.30.1.205","172.30.1.104","TCP","54","44456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28706","13.303250","172.30.1.205","172.30.1.104","TCP","74","37094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916529 TSecr=0 WS=128" +"28707","13.303444","172.30.1.104","172.30.1.205","TCP","54","135 > 44456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28708","13.303546","172.30.1.104","172.30.1.205","TCP","54","135 > 44456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28709","13.303551","172.30.1.205","172.30.1.104","TCP","54","44456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28710","13.303592","172.30.1.104","172.30.1.205","TCP","66","49671 > 37094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28711","13.303600","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28712","13.303942","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28713","13.304252","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28714","13.304259","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28715","13.306150","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28716","13.306531","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28717","13.306537","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28718","13.307885","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28719","13.310885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28720","13.310895","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28721","13.311877","172.30.1.205","172.30.1.104","TCP","74","44460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916538 TSecr=0 WS=128" +"28722","13.312218","172.30.1.104","172.30.1.205","TCP","66","135 > 44460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28723","13.312229","172.30.1.205","172.30.1.104","TCP","54","44460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28724","13.312579","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28725","13.312906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28726","13.312915","172.30.1.205","172.30.1.104","TCP","54","44460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28727","13.315118","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28728","13.315552","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28729","13.315558","172.30.1.205","172.30.1.104","TCP","54","44460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28730","13.317392","172.30.1.205","172.30.1.104","TCP","54","44460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28731","13.317502","172.30.1.205","172.30.1.104","TCP","74","37098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916543 TSecr=0 WS=128" +"28732","13.317703","172.30.1.104","172.30.1.205","TCP","54","135 > 44460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28733","13.317713","172.30.1.104","172.30.1.205","TCP","54","135 > 44460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28734","13.317719","172.30.1.205","172.30.1.104","TCP","54","44460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28735","13.317761","172.30.1.104","172.30.1.205","TCP","66","49671 > 37098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28736","13.317769","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28737","13.318121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28738","13.318473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28739","13.318480","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28740","13.320352","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28741","13.320732","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28742","13.320739","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28743","13.322119","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28744","13.324558","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28745","13.324567","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28746","13.325531","172.30.1.205","172.30.1.104","TCP","74","44464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916551 TSecr=0 WS=128" +"28747","13.325854","172.30.1.104","172.30.1.205","TCP","66","135 > 44464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28748","13.325864","172.30.1.205","172.30.1.104","TCP","54","44464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28749","13.326213","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28750","13.326518","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28751","13.326526","172.30.1.205","172.30.1.104","TCP","54","44464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28752","13.328688","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28753","13.329092","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28754","13.329099","172.30.1.205","172.30.1.104","TCP","54","44464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28755","13.330900","172.30.1.205","172.30.1.104","TCP","54","44464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28756","13.331009","172.30.1.205","172.30.1.104","TCP","74","37102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916557 TSecr=0 WS=128" +"28757","13.331178","172.30.1.104","172.30.1.205","TCP","54","135 > 44464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28758","13.331214","172.30.1.104","172.30.1.205","TCP","54","135 > 44464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28759","13.331220","172.30.1.205","172.30.1.104","TCP","54","44464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28760","13.331313","172.30.1.104","172.30.1.205","TCP","66","49671 > 37102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28761","13.331321","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28762","13.331663","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28763","13.331967","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28764","13.331973","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28765","13.333850","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28766","13.335149","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28767","13.335155","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28768","13.336494","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28769","13.338968","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28770","13.338977","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28771","13.339939","172.30.1.205","172.30.1.104","TCP","74","44468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916566 TSecr=0 WS=128" +"28772","13.340254","172.30.1.104","172.30.1.205","TCP","66","135 > 44468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28773","13.340265","172.30.1.205","172.30.1.104","TCP","54","44468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28774","13.340611","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28775","13.340935","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28776","13.340944","172.30.1.205","172.30.1.104","TCP","54","44468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28777","13.343130","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28778","13.343537","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28779","13.343543","172.30.1.205","172.30.1.104","TCP","54","44468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28780","13.345405","172.30.1.205","172.30.1.104","TCP","54","44468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28781","13.345514","172.30.1.205","172.30.1.104","TCP","74","37106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916571 TSecr=0 WS=128" +"28782","13.345739","172.30.1.104","172.30.1.205","TCP","54","135 > 44468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28783","13.345753","172.30.1.104","172.30.1.205","TCP","54","135 > 44468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28784","13.345759","172.30.1.205","172.30.1.104","TCP","54","44468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28785","13.345831","172.30.1.104","172.30.1.205","TCP","66","49671 > 37106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28786","13.345839","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28787","13.346186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28788","13.346493","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28789","13.346501","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28790","13.348368","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28791","13.348828","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28792","13.348834","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28793","13.350191","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28794","13.352641","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28795","13.352650","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28796","13.353594","172.30.1.205","172.30.1.104","TCP","74","44472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916580 TSecr=0 WS=128" +"28797","13.353900","172.30.1.104","172.30.1.205","TCP","66","135 > 44472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28798","13.353910","172.30.1.205","172.30.1.104","TCP","54","44472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28799","13.354256","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28800","13.354558","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28801","13.354566","172.30.1.205","172.30.1.104","TCP","54","44472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28802","13.356718","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28803","13.357165","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28804","13.357172","172.30.1.205","172.30.1.104","TCP","54","44472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28805","13.358965","172.30.1.205","172.30.1.104","TCP","54","44472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28806","13.359074","172.30.1.205","172.30.1.104","TCP","74","37110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916585 TSecr=0 WS=128" +"28807","13.359260","172.30.1.104","172.30.1.205","TCP","54","135 > 44472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28808","13.359288","172.30.1.104","172.30.1.205","TCP","54","135 > 44472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28809","13.359293","172.30.1.205","172.30.1.104","TCP","54","44472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28810","13.359380","172.30.1.104","172.30.1.205","TCP","66","49671 > 37110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28811","13.359388","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28812","13.359730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28813","13.360029","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28814","13.360037","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28815","13.361914","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28816","13.362287","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28817","13.362291","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28818","13.363643","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28819","13.366106","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28820","13.366115","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28821","13.367045","172.30.1.205","172.30.1.104","TCP","74","44476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916593 TSecr=0 WS=128" +"28822","13.367375","172.30.1.104","172.30.1.205","TCP","66","135 > 44476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28823","13.367386","172.30.1.205","172.30.1.104","TCP","54","44476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28824","13.367731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28825","13.368037","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28826","13.368045","172.30.1.205","172.30.1.104","TCP","54","44476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28827","13.370238","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28828","13.370654","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28829","13.370661","172.30.1.205","172.30.1.104","TCP","54","44476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28830","13.372461","172.30.1.205","172.30.1.104","TCP","54","44476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28831","13.372570","172.30.1.205","172.30.1.104","TCP","74","37114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916598 TSecr=0 WS=128" +"28832","13.372756","172.30.1.104","172.30.1.205","TCP","54","135 > 44476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28833","13.372791","172.30.1.104","172.30.1.205","TCP","54","135 > 44476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28834","13.372798","172.30.1.205","172.30.1.104","TCP","54","44476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28835","13.372838","172.30.1.104","172.30.1.205","TCP","66","49671 > 37114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28836","13.372847","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28837","13.373199","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28838","13.373520","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28839","13.373528","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28840","13.375380","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28841","13.375794","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28842","13.375801","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28843","13.377190","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28844","13.379778","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28845","13.379787","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28846","13.380717","172.30.1.205","172.30.1.104","TCP","74","44480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916607 TSecr=0 WS=128" +"28847","13.381037","172.30.1.104","172.30.1.205","TCP","66","135 > 44480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28848","13.381048","172.30.1.205","172.30.1.104","TCP","54","44480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28849","13.381406","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28850","13.381728","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28851","13.381736","172.30.1.205","172.30.1.104","TCP","54","44480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28852","13.383924","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28853","13.384344","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28854","13.384350","172.30.1.205","172.30.1.104","TCP","54","44480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28855","13.386163","172.30.1.205","172.30.1.104","TCP","54","44480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28856","13.386274","172.30.1.205","172.30.1.104","TCP","74","37118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916612 TSecr=0 WS=128" +"28857","13.386433","172.30.1.104","172.30.1.205","TCP","54","135 > 44480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28858","13.386461","172.30.1.104","172.30.1.205","TCP","54","135 > 44480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28859","13.386466","172.30.1.205","172.30.1.104","TCP","54","44480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28860","13.386602","172.30.1.104","172.30.1.205","TCP","66","49671 > 37118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28861","13.386610","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28862","13.386954","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28863","13.387249","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28864","13.387257","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28865","13.389165","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28866","13.389534","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28867","13.389540","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28868","13.390874","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28869","13.393448","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28870","13.393459","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28871","13.394421","172.30.1.205","172.30.1.104","TCP","74","44484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916620 TSecr=0 WS=128" +"28872","13.394722","172.30.1.104","172.30.1.205","TCP","66","135 > 44484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28873","13.394732","172.30.1.205","172.30.1.104","TCP","54","44484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28874","13.395076","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28875","13.395389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28876","13.395398","172.30.1.205","172.30.1.104","TCP","54","44484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28877","13.397592","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28878","13.398014","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28879","13.398021","172.30.1.205","172.30.1.104","TCP","54","44484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28880","13.399843","172.30.1.205","172.30.1.104","TCP","54","44484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28881","13.399951","172.30.1.205","172.30.1.104","TCP","74","37122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916626 TSecr=0 WS=128" +"28882","13.400161","172.30.1.104","172.30.1.205","TCP","54","135 > 44484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28883","13.400169","172.30.1.104","172.30.1.205","TCP","54","135 > 44484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28884","13.400174","172.30.1.205","172.30.1.104","TCP","54","44484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28885","13.400244","172.30.1.104","172.30.1.205","TCP","66","49671 > 37122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28886","13.400252","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28887","13.400592","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28888","13.400886","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28889","13.400895","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28890","13.402752","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28891","13.403155","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28892","13.403162","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28893","13.404541","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28894","13.407017","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28895","13.407026","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28896","13.407968","172.30.1.205","172.30.1.104","TCP","74","44488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916634 TSecr=0 WS=128" +"28897","13.408294","172.30.1.104","172.30.1.205","TCP","66","135 > 44488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28898","13.408304","172.30.1.205","172.30.1.104","TCP","54","44488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28899","13.408668","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28900","13.408959","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28901","13.408968","172.30.1.205","172.30.1.104","TCP","54","44488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28902","13.411139","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28903","13.411568","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28904","13.411574","172.30.1.205","172.30.1.104","TCP","54","44488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28905","13.412416","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28906","13.412463","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28907","13.412499","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28908","13.412531","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28909","13.412563","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28910","13.412590","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28911","13.412617","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28912","13.412644","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28913","13.412681","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28914","13.412712","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28915","13.412743","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28916","13.412840","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28917","13.413063","172.30.1.104","172.30.1.205","TCP","54","49671 > 37082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28918","13.413072","172.30.1.104","172.30.1.205","TCP","54","49671 > 37086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28919","13.413088","172.30.1.104","172.30.1.205","TCP","54","49671 > 37082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28920","13.413094","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28921","13.413100","172.30.1.104","172.30.1.205","TCP","54","49671 > 37090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28922","13.413105","172.30.1.104","172.30.1.205","TCP","54","49671 > 37094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28923","13.413207","172.30.1.104","172.30.1.205","TCP","54","49671 > 37094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28924","13.413212","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28925","13.413218","172.30.1.104","172.30.1.205","TCP","54","49671 > 37098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28926","13.413223","172.30.1.104","172.30.1.205","TCP","54","49671 > 37086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28927","13.413225","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28928","13.413400","172.30.1.104","172.30.1.205","TCP","54","49671 > 37102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28929","13.413458","172.30.1.104","172.30.1.205","TCP","54","49671 > 37106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28930","13.413463","172.30.1.104","172.30.1.205","TCP","54","49671 > 37102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28931","13.413468","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28932","13.413474","172.30.1.104","172.30.1.205","TCP","54","49671 > 37110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28933","13.413478","172.30.1.104","172.30.1.205","TCP","54","49671 > 37098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28934","13.413484","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28935","13.413486","172.30.1.104","172.30.1.205","TCP","54","49671 > 37110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28936","13.413487","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28937","13.413488","172.30.1.104","172.30.1.205","TCP","54","49671 > 37114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28938","13.413491","172.30.1.104","172.30.1.205","TCP","54","49671 > 37106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28939","13.413493","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28940","13.413494","172.30.1.104","172.30.1.205","TCP","54","49671 > 37118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28941","13.413496","172.30.1.104","172.30.1.205","TCP","54","49671 > 37118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28942","13.413498","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28943","13.413849","172.30.1.104","172.30.1.205","TCP","54","49671 > 37122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28944","13.413856","172.30.1.104","172.30.1.205","TCP","54","49671 > 37114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28945","13.413860","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28946","13.413869","172.30.1.104","172.30.1.205","TCP","54","49671 > 37122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28947","13.413871","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28948","13.413903","172.30.1.104","172.30.1.205","TCP","54","49671 > 37090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28949","13.413907","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28950","13.413959","172.30.1.104","172.30.1.205","TCP","54","49671 > 37078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28951","13.414010","172.30.1.104","172.30.1.205","TCP","54","49671 > 37078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"28952","13.414015","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"28953","13.414372","172.30.1.205","172.30.1.104","TCP","54","44488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28954","13.414481","172.30.1.205","172.30.1.104","TCP","74","37126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916640 TSecr=0 WS=128" +"28955","13.414660","172.30.1.104","172.30.1.205","TCP","54","135 > 44488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28956","13.414690","172.30.1.104","172.30.1.205","TCP","54","135 > 44488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28957","13.414694","172.30.1.205","172.30.1.104","TCP","54","44488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28958","13.414799","172.30.1.104","172.30.1.205","TCP","66","49671 > 37126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28959","13.414807","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28960","13.415157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28961","13.415996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28962","13.416004","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28963","13.417914","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28964","13.418316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28965","13.418322","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28966","13.419664","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28967","13.422093","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28968","13.422108","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28969","13.423154","172.30.1.205","172.30.1.104","TCP","74","44492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916649 TSecr=0 WS=128" +"28970","13.423510","172.30.1.104","172.30.1.205","TCP","66","135 > 44492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28971","13.423524","172.30.1.205","172.30.1.104","TCP","54","44492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28972","13.423902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28973","13.424216","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28974","13.424225","172.30.1.205","172.30.1.104","TCP","54","44492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28975","13.426468","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"28976","13.426889","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"28977","13.426896","172.30.1.205","172.30.1.104","TCP","54","44492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28978","13.428720","172.30.1.205","172.30.1.104","TCP","54","44492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"28979","13.428858","172.30.1.205","172.30.1.104","TCP","74","37130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916655 TSecr=0 WS=128" +"28980","13.429005","172.30.1.104","172.30.1.205","TCP","54","135 > 44492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28981","13.429038","172.30.1.104","172.30.1.205","TCP","54","135 > 44492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"28982","13.429044","172.30.1.205","172.30.1.104","TCP","54","44492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"28983","13.429179","172.30.1.104","172.30.1.205","TCP","66","49671 > 37130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28984","13.429188","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28985","13.429533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"28986","13.429820","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28987","13.429829","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"28988","13.431755","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"28989","13.432141","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"28990","13.432148","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"28991","13.433558","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"28992","13.436001","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"28993","13.436013","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"28994","13.436985","172.30.1.205","172.30.1.104","TCP","74","44496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916663 TSecr=0 WS=128" +"28995","13.437367","172.30.1.104","172.30.1.205","TCP","66","135 > 44496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"28996","13.437378","172.30.1.205","172.30.1.104","TCP","54","44496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"28997","13.437727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"28998","13.438026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"28999","13.438036","172.30.1.205","172.30.1.104","TCP","54","44496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29000","13.440224","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29001","13.440645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29002","13.440652","172.30.1.205","172.30.1.104","TCP","54","44496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29003","13.442477","172.30.1.205","172.30.1.104","TCP","54","44496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29004","13.442592","172.30.1.205","172.30.1.104","TCP","74","37134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916669 TSecr=0 WS=128" +"29005","13.442769","172.30.1.104","172.30.1.205","TCP","54","135 > 44496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29006","13.442842","172.30.1.104","172.30.1.205","TCP","54","135 > 44496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29007","13.442848","172.30.1.205","172.30.1.104","TCP","54","44496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29008","13.442947","172.30.1.104","172.30.1.205","TCP","66","49671 > 37134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29009","13.442959","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29010","13.443307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29011","13.443700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29012","13.443709","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29013","13.445665","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29014","13.446039","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29015","13.446046","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29016","13.447395","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29017","13.449926","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29018","13.449935","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29019","13.450888","172.30.1.205","172.30.1.104","TCP","74","44500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916677 TSecr=0 WS=128" +"29020","13.451214","172.30.1.104","172.30.1.205","TCP","66","135 > 44500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29021","13.451224","172.30.1.205","172.30.1.104","TCP","54","44500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29022","13.451580","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29023","13.451878","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29024","13.451896","172.30.1.205","172.30.1.104","TCP","54","44500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29025","13.454120","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29026","13.454590","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29027","13.454597","172.30.1.205","172.30.1.104","TCP","54","44500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29028","13.456412","172.30.1.205","172.30.1.104","TCP","54","44500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29029","13.456523","172.30.1.205","172.30.1.104","TCP","74","37138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916682 TSecr=0 WS=128" +"29030","13.456698","172.30.1.104","172.30.1.205","TCP","54","135 > 44500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29031","13.456731","172.30.1.104","172.30.1.205","TCP","54","135 > 44500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29032","13.456736","172.30.1.205","172.30.1.104","TCP","54","44500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29033","13.456844","172.30.1.104","172.30.1.205","TCP","66","49671 > 37138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29034","13.456854","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29035","13.457229","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29036","13.457532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29037","13.457540","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29038","13.459412","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29039","13.459814","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29040","13.459820","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29041","13.461207","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29042","13.463636","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29043","13.463645","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29044","13.464568","172.30.1.205","172.30.1.104","TCP","74","44504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916690 TSecr=0 WS=128" +"29045","13.464882","172.30.1.104","172.30.1.205","TCP","66","135 > 44504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29046","13.464894","172.30.1.205","172.30.1.104","TCP","54","44504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29047","13.465251","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29048","13.465555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29049","13.465563","172.30.1.205","172.30.1.104","TCP","54","44504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29050","13.467738","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29051","13.468154","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29052","13.468166","172.30.1.205","172.30.1.104","TCP","54","44504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29053","13.470149","172.30.1.205","172.30.1.104","TCP","54","44504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29054","13.470274","172.30.1.205","172.30.1.104","TCP","74","37142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916696 TSecr=0 WS=128" +"29055","13.470453","172.30.1.104","172.30.1.205","TCP","54","135 > 44504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29056","13.470486","172.30.1.104","172.30.1.205","TCP","54","135 > 44504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29057","13.470491","172.30.1.205","172.30.1.104","TCP","54","44504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29058","13.470564","172.30.1.104","172.30.1.205","TCP","66","49671 > 37142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29059","13.470573","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29060","13.470918","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29061","13.471786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29062","13.471795","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29063","13.473686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29064","13.474061","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29065","13.474068","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29066","13.475411","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29067","13.478308","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29068","13.478318","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29069","13.479260","172.30.1.205","172.30.1.104","TCP","74","44508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916705 TSecr=0 WS=128" +"29070","13.479578","172.30.1.104","172.30.1.205","TCP","66","135 > 44508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29071","13.479592","172.30.1.205","172.30.1.104","TCP","54","44508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29072","13.479956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29073","13.480265","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29074","13.480274","172.30.1.205","172.30.1.104","TCP","54","44508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29075","13.482517","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29076","13.482928","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29077","13.482940","172.30.1.205","172.30.1.104","TCP","54","44508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29078","13.484919","172.30.1.205","172.30.1.104","TCP","54","44508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29079","13.485029","172.30.1.205","172.30.1.104","TCP","74","37146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916711 TSecr=0 WS=128" +"29080","13.485188","172.30.1.104","172.30.1.205","TCP","54","135 > 44508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29081","13.485223","172.30.1.104","172.30.1.205","TCP","54","135 > 44508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29082","13.485228","172.30.1.205","172.30.1.104","TCP","54","44508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29083","13.485325","172.30.1.104","172.30.1.205","TCP","66","49671 > 37146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29084","13.485334","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29085","13.485681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29086","13.486655","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29087","13.486664","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29088","13.488544","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29089","13.489001","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29090","13.489014","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29091","13.490529","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29092","13.492848","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29093","13.492857","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29094","13.493795","172.30.1.205","172.30.1.104","TCP","74","44512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916720 TSecr=0 WS=128" +"29095","13.494096","172.30.1.104","172.30.1.205","TCP","66","135 > 44512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29096","13.494107","172.30.1.205","172.30.1.104","TCP","54","44512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29097","13.494455","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29098","13.494767","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29099","13.494776","172.30.1.205","172.30.1.104","TCP","54","44512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29100","13.497020","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29101","13.497428","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29102","13.497434","172.30.1.205","172.30.1.104","TCP","54","44512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29103","13.499240","172.30.1.205","172.30.1.104","TCP","54","44512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29104","13.499351","172.30.1.205","172.30.1.104","TCP","74","37150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916725 TSecr=0 WS=128" +"29105","13.499523","172.30.1.104","172.30.1.205","TCP","54","135 > 44512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29106","13.499563","172.30.1.104","172.30.1.205","TCP","54","135 > 44512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29107","13.499568","172.30.1.205","172.30.1.104","TCP","54","44512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29108","13.499606","172.30.1.104","172.30.1.205","TCP","66","49671 > 37150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29109","13.499614","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29110","13.499956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29111","13.500263","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29112","13.500272","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29113","13.502182","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29114","13.502556","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29115","13.502562","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29116","13.503912","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29117","13.506316","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29118","13.506325","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29119","13.507271","172.30.1.205","172.30.1.104","TCP","74","44516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916733 TSecr=0 WS=128" +"29120","13.507577","172.30.1.104","172.30.1.205","TCP","66","135 > 44516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29121","13.507587","172.30.1.205","172.30.1.104","TCP","54","44516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29122","13.507938","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29123","13.508244","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29124","13.508254","172.30.1.205","172.30.1.104","TCP","54","44516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29125","13.510478","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29126","13.510902","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29127","13.510908","172.30.1.205","172.30.1.104","TCP","54","44516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29128","13.512728","172.30.1.205","172.30.1.104","TCP","54","44516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29129","13.512865","172.30.1.205","172.30.1.104","TCP","74","37154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916739 TSecr=0 WS=128" +"29130","13.513030","172.30.1.104","172.30.1.205","TCP","54","135 > 44516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29131","13.513066","172.30.1.104","172.30.1.205","TCP","54","135 > 44516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29132","13.513073","172.30.1.205","172.30.1.104","TCP","54","44516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29133","13.513149","172.30.1.104","172.30.1.205","TCP","66","49671 > 37154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29134","13.513156","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29135","13.513502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29136","13.513800","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29137","13.513809","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29138","13.515678","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29139","13.516066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29140","13.516073","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29141","13.517479","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29142","13.519971","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29143","13.519981","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29144","13.521057","172.30.1.205","172.30.1.104","TCP","74","44520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916747 TSecr=0 WS=128" +"29145","13.521389","172.30.1.104","172.30.1.205","TCP","66","135 > 44520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29146","13.521400","172.30.1.205","172.30.1.104","TCP","54","44520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29147","13.521762","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29148","13.522059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29149","13.522068","172.30.1.205","172.30.1.104","TCP","54","44520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29150","13.524326","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29151","13.524729","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29152","13.524739","172.30.1.205","172.30.1.104","TCP","54","44520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29153","13.526651","172.30.1.205","172.30.1.104","TCP","54","44520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29154","13.526776","172.30.1.205","172.30.1.104","TCP","74","37158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916753 TSecr=0 WS=128" +"29155","13.526947","172.30.1.104","172.30.1.205","TCP","54","135 > 44520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29156","13.527028","172.30.1.104","172.30.1.205","TCP","54","135 > 44520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29157","13.527034","172.30.1.205","172.30.1.104","TCP","54","44520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29158","13.527104","172.30.1.104","172.30.1.205","TCP","66","49671 > 37158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29159","13.527113","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29160","13.527470","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29161","13.527786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29162","13.527793","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29163","13.529700","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29164","13.530059","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29165","13.530066","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29166","13.531501","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29167","13.534011","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29168","13.534022","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29169","13.535012","172.30.1.205","172.30.1.104","TCP","74","44524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916761 TSecr=0 WS=128" +"29170","13.535356","172.30.1.104","172.30.1.205","TCP","66","135 > 44524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29171","13.535369","172.30.1.205","172.30.1.104","TCP","54","44524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29172","13.535731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29173","13.536068","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29174","13.536086","172.30.1.205","172.30.1.104","TCP","54","44524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29175","13.538560","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29176","13.538990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29177","13.538997","172.30.1.205","172.30.1.104","TCP","54","44524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29178","13.540859","172.30.1.205","172.30.1.104","TCP","54","44524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29179","13.540971","172.30.1.205","172.30.1.104","TCP","74","37162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916767 TSecr=0 WS=128" +"29180","13.541150","172.30.1.104","172.30.1.205","TCP","54","135 > 44524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29181","13.541193","172.30.1.104","172.30.1.205","TCP","54","135 > 44524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29182","13.541198","172.30.1.205","172.30.1.104","TCP","54","44524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29183","13.541261","172.30.1.104","172.30.1.205","TCP","66","49671 > 37162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29184","13.541269","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29185","13.541625","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29186","13.541922","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29187","13.541932","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29188","13.543854","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29189","13.544253","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29190","13.544259","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29191","13.545658","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29192","13.548193","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29193","13.548202","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29194","13.549161","172.30.1.205","172.30.1.104","TCP","74","44528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916775 TSecr=0 WS=128" +"29195","13.549521","172.30.1.104","172.30.1.205","TCP","66","135 > 44528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29196","13.549531","172.30.1.205","172.30.1.104","TCP","54","44528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29197","13.549881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29198","13.550176","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29199","13.550185","172.30.1.205","172.30.1.104","TCP","54","44528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29200","13.552374","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29201","13.552761","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29202","13.552768","172.30.1.205","172.30.1.104","TCP","54","44528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29203","13.554577","172.30.1.205","172.30.1.104","TCP","54","44528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29204","13.554690","172.30.1.205","172.30.1.104","TCP","74","37166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916781 TSecr=0 WS=128" +"29205","13.554884","172.30.1.104","172.30.1.205","TCP","54","135 > 44528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29206","13.554897","172.30.1.104","172.30.1.205","TCP","54","135 > 44528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29207","13.554903","172.30.1.205","172.30.1.104","TCP","54","44528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29208","13.555081","172.30.1.104","172.30.1.205","TCP","66","49671 > 37166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29209","13.555093","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29210","13.555460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29211","13.555791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29212","13.555804","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29213","13.557803","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29214","13.558179","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29215","13.558186","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29216","13.559575","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29217","13.562444","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29218","13.562455","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29219","13.563454","172.30.1.205","172.30.1.104","TCP","74","44532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916789 TSecr=0 WS=128" +"29220","13.563748","172.30.1.104","172.30.1.205","TCP","66","135 > 44532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29221","13.563759","172.30.1.205","172.30.1.104","TCP","54","44532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29222","13.564112","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29223","13.564448","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29224","13.564457","172.30.1.205","172.30.1.104","TCP","54","44532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29225","13.566703","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29226","13.567108","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29227","13.567121","172.30.1.205","172.30.1.104","TCP","54","44532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29228","13.568973","172.30.1.205","172.30.1.104","TCP","54","44532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29229","13.569092","172.30.1.205","172.30.1.104","TCP","74","37170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916795 TSecr=0 WS=128" +"29230","13.569258","172.30.1.104","172.30.1.205","TCP","54","135 > 44532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29231","13.569302","172.30.1.104","172.30.1.205","TCP","54","135 > 44532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29232","13.569310","172.30.1.205","172.30.1.104","TCP","54","44532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29233","13.569375","172.30.1.104","172.30.1.205","TCP","66","49671 > 37170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29234","13.569385","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29235","13.569730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29236","13.570019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29237","13.570030","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29238","13.571943","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29239","13.572358","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29240","13.572363","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29241","13.573755","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29242","13.576323","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29243","13.576332","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29244","13.577340","172.30.1.205","172.30.1.104","TCP","74","44536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916803 TSecr=0 WS=128" +"29245","13.577664","172.30.1.104","172.30.1.205","TCP","66","135 > 44536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29246","13.577676","172.30.1.205","172.30.1.104","TCP","54","44536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29247","13.578054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29248","13.580062","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29249","13.580074","172.30.1.205","172.30.1.104","TCP","54","44536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29250","13.582378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29251","13.582851","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29252","13.582858","172.30.1.205","172.30.1.104","TCP","54","44536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29253","13.583725","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29254","13.583777","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29255","13.583816","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29256","13.583851","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29257","13.583882","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29258","13.583911","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29259","13.583937","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29260","13.583965","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29261","13.583992","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29262","13.584024","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29263","13.584051","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29264","13.584121","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29265","13.584392","172.30.1.104","172.30.1.205","TCP","54","49671 > 37130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29266","13.584406","172.30.1.104","172.30.1.205","TCP","54","49671 > 37134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29267","13.584451","172.30.1.104","172.30.1.205","TCP","54","49671 > 37130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29268","13.584461","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29269","13.584468","172.30.1.104","172.30.1.205","TCP","54","49671 > 37138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29270","13.584490","172.30.1.104","172.30.1.205","TCP","54","49671 > 37142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29271","13.584568","172.30.1.104","172.30.1.205","TCP","54","49671 > 37142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29272","13.584574","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29273","13.584586","172.30.1.104","172.30.1.205","TCP","54","49671 > 37146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29274","13.584608","172.30.1.104","172.30.1.205","TCP","54","49671 > 37134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29275","13.584612","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29276","13.584630","172.30.1.104","172.30.1.205","TCP","54","49671 > 37150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29277","13.584676","172.30.1.104","172.30.1.205","TCP","54","49671 > 37150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29278","13.584679","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29279","13.584703","172.30.1.104","172.30.1.205","TCP","54","49671 > 37154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29280","13.584733","172.30.1.104","172.30.1.205","TCP","54","49671 > 37146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29281","13.584737","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29282","13.584798","172.30.1.104","172.30.1.205","TCP","54","49671 > 37158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29283","13.584807","172.30.1.104","172.30.1.205","TCP","54","49671 > 37162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29284","13.584810","172.30.1.104","172.30.1.205","TCP","54","49671 > 37158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29285","13.584815","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29286","13.584846","172.30.1.104","172.30.1.205","TCP","54","49671 > 37166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29287","13.584874","172.30.1.104","172.30.1.205","TCP","54","49671 > 37154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29288","13.584878","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29289","13.584901","172.30.1.104","172.30.1.205","TCP","54","49671 > 37166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29290","13.584905","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29291","13.584927","172.30.1.104","172.30.1.205","TCP","54","49671 > 37162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29292","13.584930","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29293","13.584954","172.30.1.104","172.30.1.205","TCP","54","49671 > 37170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29294","13.585211","172.30.1.104","172.30.1.205","TCP","54","49671 > 37170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29295","13.585215","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29296","13.585237","172.30.1.104","172.30.1.205","TCP","54","49671 > 37126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29297","13.585266","172.30.1.104","172.30.1.205","TCP","54","49671 > 37126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29298","13.585270","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29299","13.585305","172.30.1.104","172.30.1.205","TCP","54","49671 > 37138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29300","13.585308","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29301","13.585823","172.30.1.205","172.30.1.104","TCP","54","44536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29302","13.585951","172.30.1.205","172.30.1.104","TCP","74","37174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916812 TSecr=0 WS=128" +"29303","13.586179","172.30.1.104","172.30.1.205","TCP","54","135 > 44536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29304","13.586187","172.30.1.104","172.30.1.205","TCP","54","135 > 44536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29305","13.586192","172.30.1.205","172.30.1.104","TCP","54","44536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29306","13.586268","172.30.1.104","172.30.1.205","TCP","66","49671 > 37174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29307","13.586276","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29308","13.586630","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29309","13.586924","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29310","13.586933","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29311","13.588850","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29312","13.589226","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29313","13.589233","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29314","13.590609","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29315","13.593046","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29316","13.593056","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29317","13.594062","172.30.1.205","172.30.1.104","TCP","74","44540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916820 TSecr=0 WS=128" +"29318","13.594447","172.30.1.104","172.30.1.205","TCP","66","135 > 44540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29319","13.594459","172.30.1.205","172.30.1.104","TCP","54","44540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29320","13.594834","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29321","13.595195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29322","13.595204","172.30.1.205","172.30.1.104","TCP","54","44540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29323","13.597437","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29324","13.597846","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29325","13.597853","172.30.1.205","172.30.1.104","TCP","54","44540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29326","13.599729","172.30.1.205","172.30.1.104","TCP","54","44540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29327","13.599847","172.30.1.205","172.30.1.104","TCP","74","37178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916826 TSecr=0 WS=128" +"29328","13.600026","172.30.1.104","172.30.1.205","TCP","54","135 > 44540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29329","13.600036","172.30.1.104","172.30.1.205","TCP","54","135 > 44540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29330","13.600043","172.30.1.205","172.30.1.104","TCP","54","44540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29331","13.600116","172.30.1.104","172.30.1.205","TCP","66","49671 > 37178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29332","13.600124","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29333","13.600472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29334","13.600788","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29335","13.600797","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29336","13.602688","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29337","13.603077","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29338","13.603084","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29339","13.604444","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29340","13.607148","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29341","13.607157","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29342","13.608138","172.30.1.205","172.30.1.104","TCP","74","44544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916834 TSecr=0 WS=128" +"29343","13.608481","172.30.1.104","172.30.1.205","TCP","66","135 > 44544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29344","13.608493","172.30.1.205","172.30.1.104","TCP","54","44544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29345","13.608875","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29346","13.609167","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29347","13.609177","172.30.1.205","172.30.1.104","TCP","54","44544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29348","13.611404","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29349","13.611828","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29350","13.611835","172.30.1.205","172.30.1.104","TCP","54","44544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29351","13.613683","172.30.1.205","172.30.1.104","TCP","54","44544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29352","13.613802","172.30.1.205","172.30.1.104","TCP","74","37182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916840 TSecr=0 WS=128" +"29353","13.613977","172.30.1.104","172.30.1.205","TCP","54","135 > 44544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29354","13.614008","172.30.1.104","172.30.1.205","TCP","54","135 > 44544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29355","13.614016","172.30.1.205","172.30.1.104","TCP","54","44544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29356","13.614112","172.30.1.104","172.30.1.205","TCP","66","49671 > 37182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29357","13.614121","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29358","13.614468","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29359","13.614852","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29360","13.614861","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29361","13.616740","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29362","13.617124","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29363","13.617129","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29364","13.618509","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29365","13.621116","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29366","13.621125","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29367","13.622124","172.30.1.205","172.30.1.104","TCP","74","44548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916848 TSecr=0 WS=128" +"29368","13.622459","172.30.1.104","172.30.1.205","TCP","66","135 > 44548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29369","13.622470","172.30.1.205","172.30.1.104","TCP","54","44548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29370","13.622826","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29371","13.623164","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29372","13.623173","172.30.1.205","172.30.1.104","TCP","54","44548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29373","13.625421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29374","13.625852","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29375","13.625859","172.30.1.205","172.30.1.104","TCP","54","44548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29376","13.627695","172.30.1.205","172.30.1.104","TCP","54","44548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29377","13.627813","172.30.1.205","172.30.1.104","TCP","74","37186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916854 TSecr=0 WS=128" +"29378","13.627977","172.30.1.104","172.30.1.205","TCP","54","135 > 44548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29379","13.628015","172.30.1.104","172.30.1.205","TCP","54","135 > 44548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29380","13.628022","172.30.1.205","172.30.1.104","TCP","54","44548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29381","13.628104","172.30.1.104","172.30.1.205","TCP","66","49671 > 37186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29382","13.628112","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29383","13.628463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29384","13.628754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29385","13.628763","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29386","13.630682","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29387","13.631101","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29388","13.631107","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29389","13.632471","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29390","13.635100","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29391","13.635113","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29392","13.636167","172.30.1.205","172.30.1.104","TCP","74","44552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916862 TSecr=0 WS=128" +"29393","13.636504","172.30.1.104","172.30.1.205","TCP","66","135 > 44552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29394","13.636517","172.30.1.205","172.30.1.104","TCP","54","44552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29395","13.636915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29396","13.637235","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29397","13.637245","172.30.1.205","172.30.1.104","TCP","54","44552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29398","13.639535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29399","13.639977","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29400","13.639984","172.30.1.205","172.30.1.104","TCP","54","44552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29401","13.641840","172.30.1.205","172.30.1.104","TCP","54","44552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29402","13.641966","172.30.1.205","172.30.1.104","TCP","74","37190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916868 TSecr=0 WS=128" +"29403","13.642125","172.30.1.104","172.30.1.205","TCP","54","135 > 44552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29404","13.642157","172.30.1.104","172.30.1.205","TCP","54","135 > 44552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29405","13.642165","172.30.1.205","172.30.1.104","TCP","54","44552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29406","13.642237","172.30.1.104","172.30.1.205","TCP","66","49671 > 37190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29407","13.642245","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29408","13.642592","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29409","13.642885","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29410","13.642894","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29411","13.644792","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29412","13.645209","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29413","13.645216","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29414","13.646606","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29415","13.649244","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29416","13.649254","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29417","13.650239","172.30.1.205","172.30.1.104","TCP","74","44556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916876 TSecr=0 WS=128" +"29418","13.650539","172.30.1.104","172.30.1.205","TCP","66","135 > 44556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29419","13.650549","172.30.1.205","172.30.1.104","TCP","54","44556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29420","13.650902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29421","13.651212","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29422","13.651221","172.30.1.205","172.30.1.104","TCP","54","44556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29423","13.653452","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29424","13.653890","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29425","13.653897","172.30.1.205","172.30.1.104","TCP","54","44556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29426","13.655728","172.30.1.205","172.30.1.104","TCP","54","44556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29427","13.655844","172.30.1.205","172.30.1.104","TCP","74","37194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916882 TSecr=0 WS=128" +"29428","13.656075","172.30.1.104","172.30.1.205","TCP","54","135 > 44556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29429","13.656116","172.30.1.104","172.30.1.205","TCP","66","49671 > 37194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29430","13.656126","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29431","13.656166","172.30.1.104","172.30.1.205","TCP","54","135 > 44556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29432","13.656173","172.30.1.205","172.30.1.104","TCP","54","44556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29433","13.656492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29434","13.656823","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29435","13.656833","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29436","13.658746","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29437","13.659146","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29438","13.659152","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29439","13.660518","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29440","13.663021","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29441","13.663031","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29442","13.664008","172.30.1.205","172.30.1.104","TCP","74","44560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916890 TSecr=0 WS=128" +"29443","13.664317","172.30.1.104","172.30.1.205","TCP","66","135 > 44560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29444","13.664328","172.30.1.205","172.30.1.104","TCP","54","44560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29445","13.664680","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29446","13.665004","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29447","13.665013","172.30.1.205","172.30.1.104","TCP","54","44560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29448","13.667228","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29449","13.667656","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29450","13.667663","172.30.1.205","172.30.1.104","TCP","54","44560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29451","13.669507","172.30.1.205","172.30.1.104","TCP","54","44560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29452","13.669632","172.30.1.205","172.30.1.104","TCP","74","37198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916896 TSecr=0 WS=128" +"29453","13.669787","172.30.1.104","172.30.1.205","TCP","54","135 > 44560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29454","13.669827","172.30.1.104","172.30.1.205","TCP","54","135 > 44560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29455","13.669835","172.30.1.205","172.30.1.104","TCP","54","44560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29456","13.669920","172.30.1.104","172.30.1.205","TCP","66","49671 > 37198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29457","13.669937","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29458","13.670335","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29459","13.670652","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29460","13.670661","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29461","13.672598","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29462","13.672978","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29463","13.672984","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29464","13.674363","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29465","13.676861","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29466","13.676872","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29467","13.677906","172.30.1.205","172.30.1.104","TCP","74","44564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916904 TSecr=0 WS=128" +"29468","13.678211","172.30.1.104","172.30.1.205","TCP","66","135 > 44564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29469","13.678222","172.30.1.205","172.30.1.104","TCP","54","44564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29470","13.678577","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29471","13.678874","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29472","13.678883","172.30.1.205","172.30.1.104","TCP","54","44564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29473","13.681143","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29474","13.681586","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29475","13.681593","172.30.1.205","172.30.1.104","TCP","54","44564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29476","13.683413","172.30.1.205","172.30.1.104","TCP","54","44564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29477","13.683544","172.30.1.205","172.30.1.104","TCP","74","37202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916909 TSecr=0 WS=128" +"29478","13.683750","172.30.1.104","172.30.1.205","TCP","54","135 > 44564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29479","13.683790","172.30.1.104","172.30.1.205","TCP","54","135 > 44564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29480","13.683797","172.30.1.205","172.30.1.104","TCP","54","44564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29481","13.683870","172.30.1.104","172.30.1.205","TCP","66","49671 > 37202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29482","13.683879","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29483","13.684221","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29484","13.684537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29485","13.684545","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29486","13.686456","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29487","13.686836","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29488","13.686842","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29489","13.688200","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29490","13.690684","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29491","13.690693","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29492","13.691698","172.30.1.205","172.30.1.104","TCP","74","44568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916918 TSecr=0 WS=128" +"29493","13.691997","172.30.1.104","172.30.1.205","TCP","66","135 > 44568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29494","13.692014","172.30.1.205","172.30.1.104","TCP","54","44568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29495","13.692361","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29496","13.692707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29497","13.692716","172.30.1.205","172.30.1.104","TCP","54","44568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29498","13.694925","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29499","13.695400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29500","13.695407","172.30.1.205","172.30.1.104","TCP","54","44568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29501","13.697236","172.30.1.205","172.30.1.104","TCP","54","44568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29502","13.697350","172.30.1.205","172.30.1.104","TCP","74","37206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916923 TSecr=0 WS=128" +"29503","13.697562","172.30.1.104","172.30.1.205","TCP","54","135 > 44568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29504","13.697572","172.30.1.104","172.30.1.205","TCP","54","135 > 44568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29505","13.697579","172.30.1.205","172.30.1.104","TCP","54","44568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29506","13.697634","172.30.1.104","172.30.1.205","TCP","66","49671 > 37206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29507","13.697642","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29508","13.697988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29509","13.698301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29510","13.698310","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29511","13.700188","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29512","13.700562","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29513","13.700568","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29514","13.701937","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29515","13.704414","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29516","13.704425","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29517","13.705410","172.30.1.205","172.30.1.104","TCP","74","44572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916931 TSecr=0 WS=128" +"29518","13.705719","172.30.1.104","172.30.1.205","TCP","66","135 > 44572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29519","13.705730","172.30.1.205","172.30.1.104","TCP","54","44572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29520","13.706081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29521","13.706375","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29522","13.706384","172.30.1.205","172.30.1.104","TCP","54","44572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29523","13.708555","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29524","13.708943","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29525","13.708958","172.30.1.205","172.30.1.104","TCP","54","44572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29526","13.710780","172.30.1.205","172.30.1.104","TCP","54","44572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29527","13.710890","172.30.1.205","172.30.1.104","TCP","74","37210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916937 TSecr=0 WS=128" +"29528","13.711048","172.30.1.104","172.30.1.205","TCP","54","135 > 44572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29529","13.711081","172.30.1.104","172.30.1.205","TCP","54","135 > 44572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29530","13.711087","172.30.1.205","172.30.1.104","TCP","54","44572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29531","13.711200","172.30.1.104","172.30.1.205","TCP","66","49671 > 37210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29532","13.711208","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29533","13.711555","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29534","13.711861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29535","13.711870","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29536","13.713754","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29537","13.714133","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29538","13.714139","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29539","13.715472","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29540","13.718011","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29541","13.718021","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29542","13.718959","172.30.1.205","172.30.1.104","TCP","74","44576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916945 TSecr=0 WS=128" +"29543","13.719303","172.30.1.104","172.30.1.205","TCP","66","135 > 44576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29544","13.719313","172.30.1.205","172.30.1.104","TCP","54","44576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29545","13.719661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29546","13.719982","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29547","13.719990","172.30.1.205","172.30.1.104","TCP","54","44576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29548","13.722207","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29549","13.722640","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29550","13.722647","172.30.1.205","172.30.1.104","TCP","54","44576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29551","13.724446","172.30.1.205","172.30.1.104","TCP","54","44576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29552","13.724557","172.30.1.205","172.30.1.104","TCP","74","37214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916950 TSecr=0 WS=128" +"29553","13.724741","172.30.1.104","172.30.1.205","TCP","54","135 > 44576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29554","13.724813","172.30.1.104","172.30.1.205","TCP","54","135 > 44576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29555","13.724820","172.30.1.205","172.30.1.104","TCP","54","44576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29556","13.724928","172.30.1.104","172.30.1.205","TCP","66","49671 > 37214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29557","13.724937","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29558","13.725287","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29559","13.725586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29560","13.725595","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29561","13.727485","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29562","13.727888","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29563","13.727894","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29564","13.729259","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29565","13.731845","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29566","13.731857","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29567","13.732843","172.30.1.205","172.30.1.104","TCP","74","44580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916959 TSecr=0 WS=128" +"29568","13.733159","172.30.1.104","172.30.1.205","TCP","66","135 > 44580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29569","13.733170","172.30.1.205","172.30.1.104","TCP","54","44580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29570","13.733519","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29571","13.733852","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29572","13.733861","172.30.1.205","172.30.1.104","TCP","54","44580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29573","13.736065","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29574","13.736463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29575","13.736470","172.30.1.205","172.30.1.104","TCP","54","44580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29576","13.738300","172.30.1.205","172.30.1.104","TCP","54","44580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29577","13.738410","172.30.1.205","172.30.1.104","TCP","74","37218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916964 TSecr=0 WS=128" +"29578","13.738603","172.30.1.104","172.30.1.205","TCP","54","135 > 44580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29579","13.738662","172.30.1.104","172.30.1.205","TCP","54","135 > 44580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29580","13.738668","172.30.1.205","172.30.1.104","TCP","54","44580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29581","13.738781","172.30.1.104","172.30.1.205","TCP","66","49671 > 37218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29582","13.738789","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29583","13.739129","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29584","13.739461","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29585","13.739472","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29586","13.741354","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29587","13.741762","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29588","13.741768","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29589","13.743101","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29590","13.745618","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29591","13.745628","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29592","13.746574","172.30.1.205","172.30.1.104","TCP","74","44584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916972 TSecr=0 WS=128" +"29593","13.746879","172.30.1.104","172.30.1.205","TCP","66","135 > 44584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29594","13.746889","172.30.1.205","172.30.1.104","TCP","54","44584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29595","13.747271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29596","13.747582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29597","13.747591","172.30.1.205","172.30.1.104","TCP","54","44584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29598","13.749810","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29599","13.750234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29600","13.750240","172.30.1.205","172.30.1.104","TCP","54","44584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29601","13.751089","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29602","13.751137","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29603","13.751162","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29604","13.751191","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29605","13.751218","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29606","13.751248","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29607","13.751278","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29608","13.751305","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29609","13.751331","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29610","13.751357","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29611","13.751383","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29612","13.751451","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29613","13.751780","172.30.1.104","172.30.1.205","TCP","54","49671 > 37178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29614","13.751797","172.30.1.104","172.30.1.205","TCP","54","49671 > 37182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29615","13.751828","172.30.1.104","172.30.1.205","TCP","54","49671 > 37186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29616","13.751849","172.30.1.104","172.30.1.205","TCP","54","49671 > 37186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29617","13.751855","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29618","13.751877","172.30.1.104","172.30.1.205","TCP","54","49671 > 37190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29619","13.751928","172.30.1.104","172.30.1.205","TCP","54","49671 > 37194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29620","13.751959","172.30.1.104","172.30.1.205","TCP","54","49671 > 37198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29621","13.751990","172.30.1.104","172.30.1.205","TCP","54","49671 > 37194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29622","13.751995","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29623","13.752010","172.30.1.104","172.30.1.205","TCP","54","49671 > 37202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29624","13.752061","172.30.1.104","172.30.1.205","TCP","54","49671 > 37190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29625","13.752065","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29626","13.752085","172.30.1.104","172.30.1.205","TCP","54","49671 > 37206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29627","13.752107","172.30.1.104","172.30.1.205","TCP","54","49671 > 37202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29628","13.752110","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29629","13.752154","172.30.1.104","172.30.1.205","TCP","54","49671 > 37210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29630","13.752164","172.30.1.104","172.30.1.205","TCP","54","49671 > 37198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29631","13.752167","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29632","13.752189","172.30.1.104","172.30.1.205","TCP","54","49671 > 37210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29633","13.752192","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29634","13.752208","172.30.1.104","172.30.1.205","TCP","54","49671 > 37214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29635","13.752297","172.30.1.104","172.30.1.205","TCP","54","49671 > 37218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29636","13.752315","172.30.1.104","172.30.1.205","TCP","54","49671 > 37206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29637","13.752318","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29638","13.752334","172.30.1.104","172.30.1.205","TCP","54","49671 > 37218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29639","13.752337","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29640","13.752357","172.30.1.104","172.30.1.205","TCP","54","49671 > 37214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29641","13.752359","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29642","13.752377","172.30.1.104","172.30.1.205","TCP","54","49671 > 37178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29643","13.752380","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29644","13.752397","172.30.1.104","172.30.1.205","TCP","54","49671 > 37182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29645","13.752400","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29646","13.752766","172.30.1.104","172.30.1.205","TCP","54","49671 > 37174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29647","13.752792","172.30.1.104","172.30.1.205","TCP","54","49671 > 37174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29648","13.752798","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29649","13.753063","172.30.1.205","172.30.1.104","TCP","54","44584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29650","13.753171","172.30.1.205","172.30.1.104","TCP","74","37222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916979 TSecr=0 WS=128" +"29651","13.753353","172.30.1.104","172.30.1.205","TCP","54","135 > 44584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29652","13.753385","172.30.1.104","172.30.1.205","TCP","54","135 > 44584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29653","13.753390","172.30.1.205","172.30.1.104","TCP","54","44584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29654","13.753462","172.30.1.104","172.30.1.205","TCP","66","49671 > 37222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29655","13.753470","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29656","13.753820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29657","13.754114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29658","13.754122","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29659","13.756008","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29660","13.756400","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29661","13.756406","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29662","13.757774","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29663","13.760237","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29664","13.760246","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29665","13.761204","172.30.1.205","172.30.1.104","TCP","74","44588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916987 TSecr=0 WS=128" +"29666","13.761498","172.30.1.104","172.30.1.205","TCP","66","135 > 44588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29667","13.761510","172.30.1.205","172.30.1.104","TCP","54","44588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29668","13.761868","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29669","13.762168","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29670","13.762179","172.30.1.205","172.30.1.104","TCP","54","44588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29671","13.764355","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29672","13.764783","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29673","13.764789","172.30.1.205","172.30.1.104","TCP","54","44588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29674","13.766583","172.30.1.205","172.30.1.104","TCP","54","44588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29675","13.766695","172.30.1.205","172.30.1.104","TCP","74","37226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916993 TSecr=0 WS=128" +"29676","13.766865","172.30.1.104","172.30.1.205","TCP","54","135 > 44588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29677","13.766899","172.30.1.104","172.30.1.205","TCP","54","135 > 44588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29678","13.766905","172.30.1.205","172.30.1.104","TCP","54","44588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29679","13.766987","172.30.1.104","172.30.1.205","TCP","66","49671 > 37226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29680","13.766993","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29681","13.767408","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29682","13.768597","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29683","13.768606","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29684","13.770499","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29685","13.770899","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29686","13.770905","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29687","13.772237","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29688","13.774724","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29689","13.774734","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29690","13.775682","172.30.1.205","172.30.1.104","TCP","74","44592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917002 TSecr=0 WS=128" +"29691","13.776015","172.30.1.104","172.30.1.205","TCP","66","135 > 44592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29692","13.776026","172.30.1.205","172.30.1.104","TCP","54","44592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29693","13.776377","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29694","13.776677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29695","13.776686","172.30.1.205","172.30.1.104","TCP","54","44592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29696","13.778891","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29697","13.779345","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29698","13.779352","172.30.1.205","172.30.1.104","TCP","54","44592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29699","13.781171","172.30.1.205","172.30.1.104","TCP","54","44592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29700","13.781283","172.30.1.205","172.30.1.104","TCP","74","37230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917007 TSecr=0 WS=128" +"29701","13.781468","172.30.1.104","172.30.1.205","TCP","54","135 > 44592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29702","13.781499","172.30.1.104","172.30.1.205","TCP","54","135 > 44592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29703","13.781505","172.30.1.205","172.30.1.104","TCP","54","44592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29704","13.781580","172.30.1.104","172.30.1.205","TCP","66","49671 > 37230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29705","13.781588","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29706","13.781934","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29707","13.782236","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29708","13.782244","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29709","13.784103","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29710","13.784473","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29711","13.784478","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29712","13.785928","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29713","13.788407","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29714","13.788417","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29715","13.789367","172.30.1.205","172.30.1.104","TCP","74","44596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917015 TSecr=0 WS=128" +"29716","13.789667","172.30.1.104","172.30.1.205","TCP","66","135 > 44596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29717","13.789679","172.30.1.205","172.30.1.104","TCP","54","44596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29718","13.790041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29719","13.790345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29720","13.790354","172.30.1.205","172.30.1.104","TCP","54","44596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29721","13.792572","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29722","13.792991","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29723","13.792998","172.30.1.205","172.30.1.104","TCP","54","44596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29724","13.794813","172.30.1.205","172.30.1.104","TCP","54","44596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29725","13.794922","172.30.1.205","172.30.1.104","TCP","74","37234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917021 TSecr=0 WS=128" +"29726","13.795095","172.30.1.104","172.30.1.205","TCP","54","135 > 44596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29727","13.795135","172.30.1.104","172.30.1.205","TCP","54","135 > 44596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29728","13.795141","172.30.1.205","172.30.1.104","TCP","54","44596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29729","13.795238","172.30.1.104","172.30.1.205","TCP","66","49671 > 37234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29730","13.795246","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29731","13.795592","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29732","13.798001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29733","13.798010","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29734","13.799904","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29735","13.800286","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29736","13.800293","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29737","13.801671","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29738","13.804169","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29739","13.804178","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29740","13.805171","172.30.1.205","172.30.1.104","TCP","74","44600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917031 TSecr=0 WS=128" +"29741","13.805484","172.30.1.104","172.30.1.205","TCP","66","135 > 44600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29742","13.805494","172.30.1.205","172.30.1.104","TCP","54","44600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29743","13.805843","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29744","13.806148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29745","13.806157","172.30.1.205","172.30.1.104","TCP","54","44600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29746","13.808325","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29747","13.808843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29748","13.808850","172.30.1.205","172.30.1.104","TCP","54","44600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29749","13.810645","172.30.1.205","172.30.1.104","TCP","54","44600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29750","13.810755","172.30.1.205","172.30.1.104","TCP","74","37238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917037 TSecr=0 WS=128" +"29751","13.810944","172.30.1.104","172.30.1.205","TCP","54","135 > 44600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29752","13.811000","172.30.1.104","172.30.1.205","TCP","54","135 > 44600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29753","13.811006","172.30.1.205","172.30.1.104","TCP","54","44600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29754","13.811079","172.30.1.104","172.30.1.205","TCP","66","49671 > 37238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29755","13.811087","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29756","13.811440","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29757","13.811769","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29758","13.811778","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29759","13.813704","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29760","13.814145","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29761","13.814156","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29762","13.815692","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29763","13.818226","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29764","13.818244","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29765","13.819351","172.30.1.205","172.30.1.104","TCP","74","44604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917045 TSecr=0 WS=128" +"29766","13.819681","172.30.1.104","172.30.1.205","TCP","66","135 > 44604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29767","13.819692","172.30.1.205","172.30.1.104","TCP","54","44604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29768","13.820035","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29769","13.820345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29770","13.820353","172.30.1.205","172.30.1.104","TCP","54","44604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29771","13.822554","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29772","13.822990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29773","13.822997","172.30.1.205","172.30.1.104","TCP","54","44604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29774","13.824825","172.30.1.205","172.30.1.104","TCP","54","44604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29775","13.824935","172.30.1.205","172.30.1.104","TCP","74","37242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917051 TSecr=0 WS=128" +"29776","13.825136","172.30.1.104","172.30.1.205","TCP","54","135 > 44604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29777","13.825163","172.30.1.104","172.30.1.205","TCP","54","135 > 44604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29778","13.825168","172.30.1.205","172.30.1.104","TCP","54","44604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29779","13.825203","172.30.1.104","172.30.1.205","TCP","66","49671 > 37242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29780","13.825211","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29781","13.825551","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29782","13.825860","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29783","13.825869","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29784","13.827783","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29785","13.828150","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29786","13.828156","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29787","13.829531","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29788","13.832010","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29789","13.832021","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29790","13.832999","172.30.1.205","172.30.1.104","TCP","74","44608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917059 TSecr=0 WS=128" +"29791","13.833325","172.30.1.104","172.30.1.205","TCP","66","135 > 44608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29792","13.833336","172.30.1.205","172.30.1.104","TCP","54","44608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29793","13.833680","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29794","13.833978","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29795","13.833987","172.30.1.205","172.30.1.104","TCP","54","44608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29796","13.836171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29797","13.836591","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29798","13.836597","172.30.1.205","172.30.1.104","TCP","54","44608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29799","13.838417","172.30.1.205","172.30.1.104","TCP","54","44608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29800","13.838527","172.30.1.205","172.30.1.104","TCP","74","37246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917064 TSecr=0 WS=128" +"29801","13.838724","172.30.1.104","172.30.1.205","TCP","54","135 > 44608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29802","13.838735","172.30.1.104","172.30.1.205","TCP","54","135 > 44608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29803","13.838741","172.30.1.205","172.30.1.104","TCP","54","44608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29804","13.838888","172.30.1.104","172.30.1.205","TCP","66","49671 > 37246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29805","13.838896","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29806","13.839244","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29807","13.839558","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29808","13.839567","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29809","13.841477","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29810","13.841866","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29811","13.841872","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29812","13.843216","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29813","13.845756","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29814","13.845765","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29815","13.846730","172.30.1.205","172.30.1.104","TCP","74","44612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917073 TSecr=0 WS=128" +"29816","13.847053","172.30.1.104","172.30.1.205","TCP","66","135 > 44612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29817","13.847064","172.30.1.205","172.30.1.104","TCP","54","44612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29818","13.847415","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29819","13.847722","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29820","13.847731","172.30.1.205","172.30.1.104","TCP","54","44612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29821","13.849953","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29822","13.850393","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29823","13.850400","172.30.1.205","172.30.1.104","TCP","54","44612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29824","13.852220","172.30.1.205","172.30.1.104","TCP","54","44612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29825","13.852332","172.30.1.205","172.30.1.104","TCP","74","37250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917078 TSecr=0 WS=128" +"29826","13.852496","172.30.1.104","172.30.1.205","TCP","54","135 > 44612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29827","13.852586","172.30.1.104","172.30.1.205","TCP","54","135 > 44612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29828","13.852592","172.30.1.205","172.30.1.104","TCP","54","44612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29829","13.852670","172.30.1.104","172.30.1.205","TCP","66","49671 > 37250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29830","13.852678","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29831","13.853051","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29832","13.853350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29833","13.853359","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29834","13.855276","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29835","13.855747","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29836","13.855753","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29837","13.857143","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29838","13.859742","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29839","13.859752","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29840","13.860708","172.30.1.205","172.30.1.104","TCP","74","44616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917087 TSecr=0 WS=128" +"29841","13.861082","172.30.1.104","172.30.1.205","TCP","66","135 > 44616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29842","13.861094","172.30.1.205","172.30.1.104","TCP","54","44616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29843","13.861459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29844","13.861754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29845","13.861763","172.30.1.205","172.30.1.104","TCP","54","44616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29846","13.863946","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29847","13.864355","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29848","13.864363","172.30.1.205","172.30.1.104","TCP","54","44616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29849","13.866210","172.30.1.205","172.30.1.104","TCP","54","44616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29850","13.866326","172.30.1.205","172.30.1.104","TCP","74","37254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917092 TSecr=0 WS=128" +"29851","13.866489","172.30.1.104","172.30.1.205","TCP","54","135 > 44616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29852","13.866535","172.30.1.104","172.30.1.205","TCP","54","135 > 44616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29853","13.866541","172.30.1.205","172.30.1.104","TCP","54","44616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29854","13.866631","172.30.1.104","172.30.1.205","TCP","66","49671 > 37254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29855","13.866639","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29856","13.866981","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29857","13.867300","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29858","13.867308","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29859","13.869202","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29860","13.869578","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29861","13.869584","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29862","13.870924","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29863","13.873616","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29864","13.873625","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29865","13.874624","172.30.1.205","172.30.1.104","TCP","74","44620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917101 TSecr=0 WS=128" +"29866","13.874991","172.30.1.104","172.30.1.205","TCP","66","135 > 44620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29867","13.875002","172.30.1.205","172.30.1.104","TCP","54","44620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29868","13.875357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29869","13.875715","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29870","13.875724","172.30.1.205","172.30.1.104","TCP","54","44620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29871","13.877964","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29872","13.878383","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29873","13.878390","172.30.1.205","172.30.1.104","TCP","54","44620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29874","13.880204","172.30.1.205","172.30.1.104","TCP","54","44620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29875","13.880324","172.30.1.205","172.30.1.104","TCP","74","37258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917106 TSecr=0 WS=128" +"29876","13.880538","172.30.1.104","172.30.1.205","TCP","54","135 > 44620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29877","13.880550","172.30.1.104","172.30.1.205","TCP","54","135 > 44620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29878","13.880557","172.30.1.205","172.30.1.104","TCP","54","44620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29879","13.880624","172.30.1.104","172.30.1.205","TCP","66","49671 > 37258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29880","13.880632","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29881","13.881033","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29882","13.881348","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29883","13.881362","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29884","13.883343","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29885","13.884652","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29886","13.884660","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29887","13.886088","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29888","13.888818","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29889","13.888828","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29890","13.889847","172.30.1.205","172.30.1.104","TCP","74","44624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917116 TSecr=0 WS=128" +"29891","13.890222","172.30.1.104","172.30.1.205","TCP","66","135 > 44624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29892","13.890234","172.30.1.205","172.30.1.104","TCP","54","44624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29893","13.890596","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29894","13.890913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29895","13.890922","172.30.1.205","172.30.1.104","TCP","54","44624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29896","13.893173","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29897","13.893602","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29898","13.893609","172.30.1.205","172.30.1.104","TCP","54","44624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29899","13.895431","172.30.1.205","172.30.1.104","TCP","54","44624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29900","13.895549","172.30.1.205","172.30.1.104","TCP","74","37262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917121 TSecr=0 WS=128" +"29901","13.895734","172.30.1.104","172.30.1.205","TCP","54","135 > 44624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29902","13.895770","172.30.1.104","172.30.1.205","TCP","54","135 > 44624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29903","13.895777","172.30.1.205","172.30.1.104","TCP","54","44624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29904","13.895856","172.30.1.104","172.30.1.205","TCP","66","49671 > 37262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29905","13.895864","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29906","13.896213","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29907","13.896516","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29908","13.896526","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29909","13.898474","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29910","13.898882","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29911","13.898889","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29912","13.900246","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29913","13.902976","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29914","13.902985","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29915","13.903970","172.30.1.205","172.30.1.104","TCP","74","44628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917130 TSecr=0 WS=128" +"29916","13.904318","172.30.1.104","172.30.1.205","TCP","66","135 > 44628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29917","13.904329","172.30.1.205","172.30.1.104","TCP","54","44628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29918","13.904686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29919","13.905005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29920","13.905014","172.30.1.205","172.30.1.104","TCP","54","44628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29921","13.907208","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29922","13.907700","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29923","13.907706","172.30.1.205","172.30.1.104","TCP","54","44628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29924","13.909545","172.30.1.205","172.30.1.104","TCP","54","44628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29925","13.909668","172.30.1.205","172.30.1.104","TCP","74","37266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917136 TSecr=0 WS=128" +"29926","13.909838","172.30.1.104","172.30.1.205","TCP","54","135 > 44628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29927","13.909883","172.30.1.104","172.30.1.205","TCP","54","135 > 44628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"29928","13.909890","172.30.1.205","172.30.1.104","TCP","54","44628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"29929","13.909974","172.30.1.104","172.30.1.205","TCP","66","49671 > 37266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29930","13.909985","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29931","13.910343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"29932","13.910653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29933","13.910670","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29934","13.912541","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"29935","13.912977","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"29936","13.912984","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"29937","13.914355","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"29938","13.916959","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"29939","13.916976","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29940","13.918023","172.30.1.205","172.30.1.104","TCP","74","44632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917144 TSecr=0 WS=128" +"29941","13.918379","172.30.1.104","172.30.1.205","TCP","66","135 > 44632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"29942","13.918391","172.30.1.205","172.30.1.104","TCP","54","44632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"29943","13.918759","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"29944","13.919069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"29945","13.919077","172.30.1.205","172.30.1.104","TCP","54","44632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"29946","13.921327","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"29947","13.921765","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"29948","13.921772","172.30.1.205","172.30.1.104","TCP","54","44632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29949","13.922631","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29950","13.922681","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29951","13.922719","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29952","13.922751","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29953","13.922779","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29954","13.922806","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29955","13.922833","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29956","13.922859","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29957","13.922885","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29958","13.922911","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29959","13.922942","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29960","13.923010","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"29961","13.923265","172.30.1.104","172.30.1.205","TCP","54","49671 > 37226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29962","13.923332","172.30.1.104","172.30.1.205","TCP","54","49671 > 37230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29963","13.923338","172.30.1.104","172.30.1.205","TCP","54","49671 > 37226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29964","13.923347","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29965","13.923356","172.30.1.104","172.30.1.205","TCP","54","49671 > 37234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29966","13.923557","172.30.1.104","172.30.1.205","TCP","54","49671 > 37238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29967","13.923563","172.30.1.104","172.30.1.205","TCP","54","49671 > 37238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29968","13.923568","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29969","13.923574","172.30.1.104","172.30.1.205","TCP","54","49671 > 37242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29970","13.923577","172.30.1.104","172.30.1.205","TCP","54","49671 > 37242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29971","13.923579","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29972","13.923581","172.30.1.104","172.30.1.205","TCP","54","49671 > 37246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29973","13.923589","172.30.1.104","172.30.1.205","TCP","54","49671 > 37246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29974","13.923591","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29975","13.923592","172.30.1.104","172.30.1.205","TCP","54","49671 > 37230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29976","13.923593","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29977","13.923595","172.30.1.104","172.30.1.205","TCP","54","49671 > 37250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29978","13.923823","172.30.1.104","172.30.1.205","TCP","54","49671 > 37254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29979","13.923829","172.30.1.104","172.30.1.205","TCP","54","49671 > 37254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29980","13.923832","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29981","13.923841","172.30.1.104","172.30.1.205","TCP","54","49671 > 37258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29982","13.923847","172.30.1.104","172.30.1.205","TCP","54","49671 > 37234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29983","13.923849","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29984","13.923851","172.30.1.104","172.30.1.205","TCP","54","49671 > 37262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29985","13.923854","172.30.1.104","172.30.1.205","TCP","54","49671 > 37262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29986","13.923855","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29987","13.923857","172.30.1.104","172.30.1.205","TCP","54","49671 > 37266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29988","13.923859","172.30.1.104","172.30.1.205","TCP","54","49671 > 37266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29989","13.923861","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29990","13.924197","172.30.1.104","172.30.1.205","TCP","54","49671 > 37222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29991","13.924204","172.30.1.104","172.30.1.205","TCP","54","49671 > 37222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29992","13.924208","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29993","13.924214","172.30.1.104","172.30.1.205","TCP","54","49671 > 37250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29994","13.924216","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29995","13.924293","172.30.1.104","172.30.1.205","TCP","54","49671 > 37258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"29996","13.924296","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"29997","13.924536","172.30.1.205","172.30.1.104","TCP","54","44632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"29998","13.924660","172.30.1.205","172.30.1.104","TCP","74","37270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917151 TSecr=0 WS=128" +"29999","13.924793","172.30.1.104","172.30.1.205","TCP","54","135 > 44632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30000","13.924825","172.30.1.104","172.30.1.205","TCP","54","135 > 44632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30001","13.924831","172.30.1.205","172.30.1.104","TCP","54","44632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30002","13.924941","172.30.1.104","172.30.1.205","TCP","66","49671 > 37270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30003","13.924949","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30004","13.925307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30005","13.925593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30006","13.925602","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30007","13.927475","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30008","13.927893","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30009","13.927899","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30010","13.929291","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30011","13.931812","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30012","13.931822","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30013","13.932841","172.30.1.205","172.30.1.104","TCP","74","44636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917159 TSecr=0 WS=128" +"30014","13.933188","172.30.1.104","172.30.1.205","TCP","66","135 > 44636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30015","13.933205","172.30.1.205","172.30.1.104","TCP","54","44636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30016","13.933618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30017","13.934048","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30018","13.934059","172.30.1.205","172.30.1.104","TCP","54","44636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30019","13.936322","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30020","13.936746","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30021","13.936754","172.30.1.205","172.30.1.104","TCP","54","44636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30022","13.938595","172.30.1.205","172.30.1.104","TCP","54","44636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30023","13.938725","172.30.1.205","172.30.1.104","TCP","74","37274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917165 TSecr=0 WS=128" +"30024","13.938867","172.30.1.104","172.30.1.205","TCP","54","135 > 44636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30025","13.938901","172.30.1.104","172.30.1.205","TCP","54","135 > 44636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30026","13.938909","172.30.1.205","172.30.1.104","TCP","54","44636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30027","13.938978","172.30.1.104","172.30.1.205","TCP","66","49671 > 37274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30028","13.938987","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30029","13.939356","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30030","13.939667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30031","13.939676","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30032","13.941588","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30033","13.941960","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30034","13.941967","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30035","13.943331","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30036","13.945950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30037","13.945959","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30038","13.946929","172.30.1.205","172.30.1.104","TCP","74","44640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917173 TSecr=0 WS=128" +"30039","13.947220","172.30.1.104","172.30.1.205","TCP","66","135 > 44640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30040","13.947230","172.30.1.205","172.30.1.104","TCP","54","44640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30041","13.947581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30042","13.947882","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30043","13.947891","172.30.1.205","172.30.1.104","TCP","54","44640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30044","13.950151","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30045","13.950550","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30046","13.950557","172.30.1.205","172.30.1.104","TCP","54","44640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30047","13.952374","172.30.1.205","172.30.1.104","TCP","54","44640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30048","13.952491","172.30.1.205","172.30.1.104","TCP","74","37278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917178 TSecr=0 WS=128" +"30049","13.952641","172.30.1.104","172.30.1.205","TCP","54","135 > 44640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30050","13.952679","172.30.1.104","172.30.1.205","TCP","54","135 > 44640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30051","13.952685","172.30.1.205","172.30.1.104","TCP","54","44640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30052","13.952772","172.30.1.104","172.30.1.205","TCP","66","49671 > 37278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30053","13.952790","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30054","13.953187","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30055","13.954655","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30056","13.954666","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30057","13.956575","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30058","13.956952","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30059","13.956959","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30060","13.958346","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30061","13.960955","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30062","13.960965","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30063","13.962007","172.30.1.205","172.30.1.104","TCP","74","44644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917188 TSecr=0 WS=128" +"30064","13.962361","172.30.1.104","172.30.1.205","TCP","66","135 > 44644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30065","13.962373","172.30.1.205","172.30.1.104","TCP","54","44644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30066","13.962738","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30067","13.963039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30068","13.963048","172.30.1.205","172.30.1.104","TCP","54","44644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30069","13.965316","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30070","13.965753","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30071","13.965760","172.30.1.205","172.30.1.104","TCP","54","44644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30072","13.967594","172.30.1.205","172.30.1.104","TCP","54","44644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30073","13.967711","172.30.1.205","172.30.1.104","TCP","74","37282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917194 TSecr=0 WS=128" +"30074","13.967927","172.30.1.104","172.30.1.205","TCP","54","135 > 44644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30075","13.967965","172.30.1.104","172.30.1.205","TCP","54","135 > 44644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30076","13.967972","172.30.1.205","172.30.1.104","TCP","54","44644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30077","13.968045","172.30.1.104","172.30.1.205","TCP","66","49671 > 37282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30078","13.968054","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30079","13.968411","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30080","13.969886","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30081","13.969895","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30082","13.971788","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30083","13.972168","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30084","13.972174","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30085","13.973564","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30086","13.976174","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30087","13.976184","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30088","13.977198","172.30.1.205","172.30.1.104","TCP","74","44648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917203 TSecr=0 WS=128" +"30089","13.977502","172.30.1.104","172.30.1.205","TCP","66","135 > 44648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30090","13.977514","172.30.1.205","172.30.1.104","TCP","54","44648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30091","13.977881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30092","13.978227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30093","13.978236","172.30.1.205","172.30.1.104","TCP","54","44648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30094","13.980450","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30095","13.980878","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30096","13.980885","172.30.1.205","172.30.1.104","TCP","54","44648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30097","13.982712","172.30.1.205","172.30.1.104","TCP","54","44648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30098","13.982847","172.30.1.205","172.30.1.104","TCP","74","37286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917209 TSecr=0 WS=128" +"30099","13.983002","172.30.1.104","172.30.1.205","TCP","54","135 > 44648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30100","13.983048","172.30.1.104","172.30.1.205","TCP","54","135 > 44648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30101","13.983056","172.30.1.205","172.30.1.104","TCP","54","44648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30102","13.983141","172.30.1.104","172.30.1.205","TCP","66","49671 > 37286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30103","13.983150","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30104","13.983507","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30105","13.983840","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30106","13.983849","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30107","13.985793","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30108","13.986195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30109","13.986201","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30110","13.987574","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30111","13.990110","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30112","13.990120","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30113","13.991104","172.30.1.205","172.30.1.104","TCP","74","44652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917217 TSecr=0 WS=128" +"30114","13.991480","172.30.1.104","172.30.1.205","TCP","66","135 > 44652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30115","13.991491","172.30.1.205","172.30.1.104","TCP","54","44652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30116","13.991843","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30117","13.992158","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30118","13.992168","172.30.1.205","172.30.1.104","TCP","54","44652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30119","13.994432","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30120","13.994852","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30121","13.994859","172.30.1.205","172.30.1.104","TCP","54","44652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30122","13.996694","172.30.1.205","172.30.1.104","TCP","54","44652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30123","13.996835","172.30.1.205","172.30.1.104","TCP","74","37290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917223 TSecr=0 WS=128" +"30124","13.996983","172.30.1.104","172.30.1.205","TCP","54","135 > 44652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30125","13.997050","172.30.1.104","172.30.1.205","TCP","54","135 > 44652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30126","13.997057","172.30.1.205","172.30.1.104","TCP","54","44652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30127","13.997124","172.30.1.104","172.30.1.205","TCP","66","49671 > 37290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30128","13.997133","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30129","13.997480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30130","13.997784","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30131","13.997792","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30132","13.999690","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30133","14.000073","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30134","14.000079","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30135","14.001467","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30136","14.004012","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30137","14.004023","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30138","14.005017","172.30.1.205","172.30.1.104","TCP","74","44656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917231 TSecr=0 WS=128" +"30139","14.005348","172.30.1.104","172.30.1.205","TCP","66","135 > 44656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30140","14.005359","172.30.1.205","172.30.1.104","TCP","54","44656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30141","14.005710","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30142","14.006019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30143","14.006027","172.30.1.205","172.30.1.104","TCP","54","44656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30144","14.008220","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30145","14.008667","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30146","14.008674","172.30.1.205","172.30.1.104","TCP","54","44656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30147","14.010506","172.30.1.205","172.30.1.104","TCP","54","44656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30148","14.010631","172.30.1.205","172.30.1.104","TCP","74","37294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917237 TSecr=0 WS=128" +"30149","14.010794","172.30.1.104","172.30.1.205","TCP","54","135 > 44656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30150","14.010830","172.30.1.104","172.30.1.205","TCP","54","135 > 44656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30151","14.010837","172.30.1.205","172.30.1.104","TCP","54","44656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30152","14.010950","172.30.1.104","172.30.1.205","TCP","66","49671 > 37294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30153","14.010968","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30154","14.011466","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30155","14.011920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30156","14.011932","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30157","14.013947","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30158","14.014350","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30159","14.014356","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30160","14.015751","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30161","14.018314","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30162","14.018325","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30163","14.019371","172.30.1.205","172.30.1.104","TCP","74","44660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917245 TSecr=0 WS=128" +"30164","14.019701","172.30.1.104","172.30.1.205","TCP","66","135 > 44660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30165","14.019714","172.30.1.205","172.30.1.104","TCP","54","44660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30166","14.020069","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30167","14.020391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30168","14.020400","172.30.1.205","172.30.1.104","TCP","54","44660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30169","14.022654","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30170","14.023091","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30171","14.023102","172.30.1.205","172.30.1.104","TCP","54","44660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30172","14.025057","172.30.1.205","172.30.1.104","TCP","54","44660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30173","14.025182","172.30.1.205","172.30.1.104","TCP","74","37298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917251 TSecr=0 WS=128" +"30174","14.025348","172.30.1.104","172.30.1.205","TCP","54","135 > 44660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30175","14.025379","172.30.1.104","172.30.1.205","TCP","54","135 > 44660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30176","14.025387","172.30.1.205","172.30.1.104","TCP","54","44660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30177","14.025462","172.30.1.104","172.30.1.205","TCP","66","49671 > 37298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30178","14.025471","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30179","14.025818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30180","14.026126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30181","14.026135","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30182","14.028012","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30183","14.028423","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30184","14.028430","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30185","14.029851","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30186","14.032479","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30187","14.032489","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30188","14.033466","172.30.1.205","172.30.1.104","TCP","74","44664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917259 TSecr=0 WS=128" +"30189","14.033770","172.30.1.104","172.30.1.205","TCP","66","135 > 44664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30190","14.033781","172.30.1.205","172.30.1.104","TCP","54","44664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30191","14.034132","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30192","14.034468","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30193","14.034482","172.30.1.205","172.30.1.104","TCP","54","44664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30194","14.036748","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30195","14.037168","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30196","14.037175","172.30.1.205","172.30.1.104","TCP","54","44664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30197","14.038979","172.30.1.205","172.30.1.104","TCP","54","44664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30198","14.039093","172.30.1.205","172.30.1.104","TCP","74","37302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917265 TSecr=0 WS=128" +"30199","14.039265","172.30.1.104","172.30.1.205","TCP","54","135 > 44664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30200","14.039297","172.30.1.104","172.30.1.205","TCP","54","135 > 44664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30201","14.039303","172.30.1.205","172.30.1.104","TCP","54","44664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30202","14.039337","172.30.1.104","172.30.1.205","TCP","66","49671 > 37302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30203","14.039346","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30204","14.039685","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30205","14.040008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30206","14.040017","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30207","14.041940","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30208","14.042399","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30209","14.042405","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30210","14.043738","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30211","14.046271","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30212","14.046281","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30213","14.047229","172.30.1.205","172.30.1.104","TCP","74","44668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917273 TSecr=0 WS=128" +"30214","14.047555","172.30.1.104","172.30.1.205","TCP","66","135 > 44668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30215","14.047565","172.30.1.205","172.30.1.104","TCP","54","44668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30216","14.047912","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30217","14.048254","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30218","14.048263","172.30.1.205","172.30.1.104","TCP","54","44668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30219","14.050472","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30220","14.050886","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30221","14.050893","172.30.1.205","172.30.1.104","TCP","54","44668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30222","14.052697","172.30.1.205","172.30.1.104","TCP","54","44668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30223","14.052829","172.30.1.205","172.30.1.104","TCP","74","37306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917279 TSecr=0 WS=128" +"30224","14.052991","172.30.1.104","172.30.1.205","TCP","54","135 > 44668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30225","14.053028","172.30.1.104","172.30.1.205","TCP","54","135 > 44668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30226","14.053034","172.30.1.205","172.30.1.104","TCP","54","44668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30227","14.053109","172.30.1.104","172.30.1.205","TCP","66","49671 > 37306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30228","14.053117","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30229","14.053459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30230","14.053772","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30231","14.053782","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30232","14.055651","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30233","14.056053","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30234","14.056061","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30235","14.057497","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30236","14.060147","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30237","14.060161","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30238","14.061215","172.30.1.205","172.30.1.104","TCP","74","44672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917287 TSecr=0 WS=128" +"30239","14.061519","172.30.1.104","172.30.1.205","TCP","66","135 > 44672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30240","14.061531","172.30.1.205","172.30.1.104","TCP","54","44672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30241","14.061894","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30242","14.062241","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30243","14.062253","172.30.1.205","172.30.1.104","TCP","54","44672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30244","14.064473","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30245","14.064903","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30246","14.064911","172.30.1.205","172.30.1.104","TCP","54","44672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30247","14.066757","172.30.1.205","172.30.1.104","TCP","54","44672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30248","14.066870","172.30.1.205","172.30.1.104","TCP","74","37310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917293 TSecr=0 WS=128" +"30249","14.067051","172.30.1.104","172.30.1.205","TCP","54","135 > 44672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30250","14.067089","172.30.1.104","172.30.1.205","TCP","54","135 > 44672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30251","14.067096","172.30.1.205","172.30.1.104","TCP","54","44672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30252","14.067177","172.30.1.104","172.30.1.205","TCP","66","49671 > 37310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30253","14.067185","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30254","14.067536","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30255","14.067869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30256","14.067878","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30257","14.069779","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30258","14.070185","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30259","14.070192","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30260","14.071551","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30261","14.074133","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30262","14.074145","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30263","14.075151","172.30.1.205","172.30.1.104","TCP","74","44676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917301 TSecr=0 WS=128" +"30264","14.075478","172.30.1.104","172.30.1.205","TCP","66","135 > 44676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30265","14.075495","172.30.1.205","172.30.1.104","TCP","54","44676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30266","14.075889","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30267","14.076183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30268","14.076192","172.30.1.205","172.30.1.104","TCP","54","44676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30269","14.078483","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30270","14.078891","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30271","14.078898","172.30.1.205","172.30.1.104","TCP","54","44676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30272","14.080723","172.30.1.205","172.30.1.104","TCP","54","44676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30273","14.080884","172.30.1.205","172.30.1.104","TCP","74","37314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917307 TSecr=0 WS=128" +"30274","14.081089","172.30.1.104","172.30.1.205","TCP","54","135 > 44676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30275","14.081101","172.30.1.104","172.30.1.205","TCP","54","135 > 44676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30276","14.081109","172.30.1.205","172.30.1.104","TCP","54","44676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30277","14.081183","172.30.1.104","172.30.1.205","TCP","66","49671 > 37314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30278","14.081192","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30279","14.081552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30280","14.081849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30281","14.081858","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30282","14.083758","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30283","14.084140","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30284","14.084146","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30285","14.085540","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30286","14.088079","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30287","14.088089","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30288","14.089089","172.30.1.205","172.30.1.104","TCP","74","44680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917315 TSecr=0 WS=128" +"30289","14.089400","172.30.1.104","172.30.1.205","TCP","66","135 > 44680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30290","14.089412","172.30.1.205","172.30.1.104","TCP","54","44680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30291","14.089765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30292","14.090097","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30293","14.090106","172.30.1.205","172.30.1.104","TCP","54","44680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30294","14.092288","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30295","14.092703","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30296","14.092710","172.30.1.205","172.30.1.104","TCP","54","44680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30297","14.093577","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30298","14.093627","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30299","14.093664","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30300","14.093696","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30301","14.093728","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30302","14.093756","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30303","14.093784","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30304","14.093814","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30305","14.093844","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30306","14.093871","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30307","14.093902","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30308","14.093970","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30309","14.094258","172.30.1.104","172.30.1.205","TCP","54","49671 > 37274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30310","14.094275","172.30.1.104","172.30.1.205","TCP","54","49671 > 37278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30311","14.094327","172.30.1.104","172.30.1.205","TCP","54","49671 > 37274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30312","14.094335","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30313","14.094348","172.30.1.104","172.30.1.205","TCP","54","49671 > 37282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30314","14.094373","172.30.1.104","172.30.1.205","TCP","54","49671 > 37286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30315","14.094393","172.30.1.104","172.30.1.205","TCP","54","49671 > 37286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30316","14.094396","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30317","14.094413","172.30.1.104","172.30.1.205","TCP","54","49671 > 37290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30318","14.094480","172.30.1.104","172.30.1.205","TCP","54","49671 > 37290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30319","14.094484","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30320","14.094502","172.30.1.104","172.30.1.205","TCP","54","49671 > 37278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30321","14.094505","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30322","14.094528","172.30.1.104","172.30.1.205","TCP","54","49671 > 37294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30323","14.094541","172.30.1.104","172.30.1.205","TCP","54","49671 > 37294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30324","14.094545","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30325","14.094565","172.30.1.104","172.30.1.205","TCP","54","49671 > 37298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30326","14.094585","172.30.1.104","172.30.1.205","TCP","54","49671 > 37282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30327","14.094589","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30328","14.094696","172.30.1.104","172.30.1.205","TCP","54","49671 > 37302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30329","14.094716","172.30.1.104","172.30.1.205","TCP","54","49671 > 37306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30330","14.094736","172.30.1.104","172.30.1.205","TCP","54","49671 > 37302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30331","14.094740","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30332","14.094757","172.30.1.104","172.30.1.205","TCP","54","49671 > 37306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30333","14.094761","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30334","14.094777","172.30.1.104","172.30.1.205","TCP","54","49671 > 37310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30335","14.094797","172.30.1.104","172.30.1.205","TCP","54","49671 > 37310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30336","14.094801","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30337","14.094817","172.30.1.104","172.30.1.205","TCP","54","49671 > 37314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30338","14.094837","172.30.1.104","172.30.1.205","TCP","54","49671 > 37314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30339","14.094841","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30340","14.094880","172.30.1.104","172.30.1.205","TCP","54","49671 > 37270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30341","14.095260","172.30.1.104","172.30.1.205","TCP","54","49671 > 37298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30342","14.095266","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30343","14.095289","172.30.1.104","172.30.1.205","TCP","54","49671 > 37270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30344","14.095292","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30345","14.095552","172.30.1.205","172.30.1.104","TCP","54","44680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30346","14.095672","172.30.1.205","172.30.1.104","TCP","74","37318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917322 TSecr=0 WS=128" +"30347","14.095866","172.30.1.104","172.30.1.205","TCP","54","135 > 44680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30348","14.095973","172.30.1.104","172.30.1.205","TCP","54","135 > 44680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30349","14.095977","172.30.1.205","172.30.1.104","TCP","54","44680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30350","14.096004","172.30.1.104","172.30.1.205","TCP","66","49671 > 37318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30351","14.096012","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30352","14.096362","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30353","14.096680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30354","14.096689","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30355","14.098589","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30356","14.098993","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30357","14.098999","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30358","14.100356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30359","14.102926","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30360","14.102936","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30361","14.103899","172.30.1.205","172.30.1.104","TCP","74","44684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917330 TSecr=0 WS=128" +"30362","14.104233","172.30.1.104","172.30.1.205","TCP","66","135 > 44684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30363","14.104244","172.30.1.205","172.30.1.104","TCP","54","44684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30364","14.104596","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30365","14.104944","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30366","14.104954","172.30.1.205","172.30.1.104","TCP","54","44684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30367","14.107142","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30368","14.107585","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30369","14.107592","172.30.1.205","172.30.1.104","TCP","54","44684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30370","14.109428","172.30.1.205","172.30.1.104","TCP","54","44684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30371","14.109541","172.30.1.205","172.30.1.104","TCP","74","37322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917335 TSecr=0 WS=128" +"30372","14.109718","172.30.1.104","172.30.1.205","TCP","54","135 > 44684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30373","14.109743","172.30.1.104","172.30.1.205","TCP","54","135 > 44684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30374","14.109750","172.30.1.205","172.30.1.104","TCP","54","44684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30375","14.109829","172.30.1.104","172.30.1.205","TCP","66","49671 > 37322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30376","14.109838","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30377","14.110178","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30378","14.110487","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30379","14.110495","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30380","14.112352","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30381","14.112738","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30382","14.112745","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30383","14.114109","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30384","14.116748","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30385","14.116760","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30386","14.117743","172.30.1.205","172.30.1.104","TCP","74","44688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917344 TSecr=0 WS=128" +"30387","14.118068","172.30.1.104","172.30.1.205","TCP","66","135 > 44688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30388","14.118079","172.30.1.205","172.30.1.104","TCP","54","44688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30389","14.118436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30390","14.118747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30391","14.118756","172.30.1.205","172.30.1.104","TCP","54","44688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30392","14.120977","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30393","14.121439","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30394","14.121446","172.30.1.205","172.30.1.104","TCP","54","44688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30395","14.123266","172.30.1.205","172.30.1.104","TCP","54","44688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30396","14.123379","172.30.1.205","172.30.1.104","TCP","74","37326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917349 TSecr=0 WS=128" +"30397","14.123538","172.30.1.104","172.30.1.205","TCP","54","135 > 44688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30398","14.123575","172.30.1.104","172.30.1.205","TCP","54","135 > 44688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30399","14.123581","172.30.1.205","172.30.1.104","TCP","54","44688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30400","14.123668","172.30.1.104","172.30.1.205","TCP","66","49671 > 37326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30401","14.123678","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30402","14.124020","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30403","14.124349","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30404","14.124358","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30405","14.126266","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30406","14.126663","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30407","14.126670","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30408","14.128009","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30409","14.131913","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30410","14.131923","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30411","14.132894","172.30.1.205","172.30.1.104","TCP","74","44692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917359 TSecr=0 WS=128" +"30412","14.133232","172.30.1.104","172.30.1.205","TCP","66","135 > 44692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30413","14.133244","172.30.1.205","172.30.1.104","TCP","54","44692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30414","14.133601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30415","14.133914","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30416","14.133923","172.30.1.205","172.30.1.104","TCP","54","44692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30417","14.136117","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30418","14.136558","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30419","14.136564","172.30.1.205","172.30.1.104","TCP","54","44692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30420","14.138397","172.30.1.205","172.30.1.104","TCP","54","44692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30421","14.138511","172.30.1.205","172.30.1.104","TCP","74","37330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917364 TSecr=0 WS=128" +"30422","14.138696","172.30.1.104","172.30.1.205","TCP","54","135 > 44692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30423","14.138765","172.30.1.104","172.30.1.205","TCP","54","135 > 44692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30424","14.138772","172.30.1.205","172.30.1.104","TCP","54","44692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30425","14.138856","172.30.1.104","172.30.1.205","TCP","66","49671 > 37330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30426","14.138864","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30427","14.139214","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30428","14.140149","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30429","14.140158","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30430","14.142077","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30431","14.142465","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30432","14.142471","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30433","14.143817","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30434","14.147933","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30435","14.147944","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30436","14.148928","172.30.1.205","172.30.1.104","TCP","74","44696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917375 TSecr=0 WS=128" +"30437","14.149264","172.30.1.104","172.30.1.205","TCP","66","135 > 44696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30438","14.149275","172.30.1.205","172.30.1.104","TCP","54","44696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30439","14.149645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30440","14.149996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30441","14.150005","172.30.1.205","172.30.1.104","TCP","54","44696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30442","14.152178","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30443","14.152661","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30444","14.152668","172.30.1.205","172.30.1.104","TCP","54","44696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30445","14.154492","172.30.1.205","172.30.1.104","TCP","54","44696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30446","14.154604","172.30.1.205","172.30.1.104","TCP","74","37334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917381 TSecr=0 WS=128" +"30447","14.154825","172.30.1.104","172.30.1.205","TCP","54","135 > 44696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30448","14.154834","172.30.1.104","172.30.1.205","TCP","54","135 > 44696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30449","14.154840","172.30.1.205","172.30.1.104","TCP","54","44696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30450","14.154950","172.30.1.104","172.30.1.205","TCP","66","49671 > 37334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30451","14.154959","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30452","14.155306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30453","14.156588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30454","14.156595","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30455","14.158483","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30456","14.158913","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30457","14.158920","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30458","14.160280","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30459","14.162989","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30460","14.163000","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30461","14.163955","172.30.1.205","172.30.1.104","TCP","74","44700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917390 TSecr=0 WS=128" +"30462","14.164263","172.30.1.104","172.30.1.205","TCP","66","135 > 44700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30463","14.164274","172.30.1.205","172.30.1.104","TCP","54","44700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30464","14.164625","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30465","14.164927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30466","14.164936","172.30.1.205","172.30.1.104","TCP","54","44700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30467","14.167138","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30468","14.167574","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30469","14.167581","172.30.1.205","172.30.1.104","TCP","54","44700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30470","14.169415","172.30.1.205","172.30.1.104","TCP","54","44700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30471","14.169525","172.30.1.205","172.30.1.104","TCP","74","37338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917395 TSecr=0 WS=128" +"30472","14.169681","172.30.1.104","172.30.1.205","TCP","54","135 > 44700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30473","14.169715","172.30.1.104","172.30.1.205","TCP","54","135 > 44700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30474","14.169721","172.30.1.205","172.30.1.104","TCP","54","44700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30475","14.169796","172.30.1.104","172.30.1.205","TCP","66","49671 > 37338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30476","14.169804","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30477","14.170146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30478","14.170451","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30479","14.170460","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30480","14.172342","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30481","14.172710","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30482","14.172717","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30483","14.174088","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30484","14.176676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30485","14.176685","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30486","14.177668","172.30.1.205","172.30.1.104","TCP","74","44704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917404 TSecr=0 WS=128" +"30487","14.178002","172.30.1.104","172.30.1.205","TCP","66","135 > 44704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30488","14.178012","172.30.1.205","172.30.1.104","TCP","54","44704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30489","14.178357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30490","14.178678","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30491","14.178687","172.30.1.205","172.30.1.104","TCP","54","44704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30492","14.180897","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30493","14.181318","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30494","14.181324","172.30.1.205","172.30.1.104","TCP","54","44704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30495","14.183132","172.30.1.205","172.30.1.104","TCP","54","44704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30496","14.183247","172.30.1.205","172.30.1.104","TCP","74","37342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917409 TSecr=0 WS=128" +"30497","14.183466","172.30.1.104","172.30.1.205","TCP","54","135 > 44704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30498","14.183504","172.30.1.104","172.30.1.205","TCP","54","135 > 44704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30499","14.183511","172.30.1.205","172.30.1.104","TCP","54","44704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30500","14.183550","172.30.1.104","172.30.1.205","TCP","66","49671 > 37342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30501","14.183558","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30502","14.183897","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30503","14.184197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30504","14.184206","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30505","14.186122","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30506","14.186500","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30507","14.186507","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30508","14.187858","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30509","14.190442","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30510","14.190451","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30511","14.191409","172.30.1.205","172.30.1.104","TCP","74","44708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917417 TSecr=0 WS=128" +"30512","14.191738","172.30.1.104","172.30.1.205","TCP","66","135 > 44708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30513","14.191749","172.30.1.205","172.30.1.104","TCP","54","44708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30514","14.192104","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30515","14.192412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30516","14.192421","172.30.1.205","172.30.1.104","TCP","54","44708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30517","14.194646","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30518","14.195046","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30519","14.195052","172.30.1.205","172.30.1.104","TCP","54","44708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30520","14.196873","172.30.1.205","172.30.1.104","TCP","54","44708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30521","14.196983","172.30.1.205","172.30.1.104","TCP","74","37346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917423 TSecr=0 WS=128" +"30522","14.197140","172.30.1.104","172.30.1.205","TCP","54","135 > 44708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30523","14.197199","172.30.1.104","172.30.1.205","TCP","54","135 > 44708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30524","14.197205","172.30.1.205","172.30.1.104","TCP","54","44708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30525","14.197277","172.30.1.104","172.30.1.205","TCP","66","49671 > 37346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30526","14.197285","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30527","14.197629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30528","14.197930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30529","14.197939","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30530","14.199852","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30531","14.200227","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30532","14.200233","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30533","14.201617","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30534","14.207016","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30535","14.207026","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30536","14.207993","172.30.1.205","172.30.1.104","TCP","74","44712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917434 TSecr=0 WS=128" +"30537","14.208305","172.30.1.104","172.30.1.205","TCP","66","135 > 44712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30538","14.208317","172.30.1.205","172.30.1.104","TCP","54","44712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30539","14.208673","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30540","14.208978","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30541","14.208987","172.30.1.205","172.30.1.104","TCP","54","44712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30542","14.211173","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30543","14.211554","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30544","14.211561","172.30.1.205","172.30.1.104","TCP","54","44712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30545","14.213386","172.30.1.205","172.30.1.104","TCP","54","44712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30546","14.213498","172.30.1.205","172.30.1.104","TCP","74","37350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917439 TSecr=0 WS=128" +"30547","14.213657","172.30.1.104","172.30.1.205","TCP","54","135 > 44712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30548","14.213721","172.30.1.104","172.30.1.205","TCP","54","135 > 44712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30549","14.213732","172.30.1.205","172.30.1.104","TCP","54","44712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30550","14.213740","172.30.1.104","172.30.1.205","TCP","66","49671 > 37350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30551","14.213756","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30552","14.214157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30553","14.214452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30554","14.214461","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30555","14.216372","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30556","14.216844","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30557","14.216851","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30558","14.218214","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30559","14.220717","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30560","14.220728","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30561","14.221735","172.30.1.205","172.30.1.104","TCP","74","44716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917448 TSecr=0 WS=128" +"30562","14.222025","172.30.1.104","172.30.1.205","TCP","66","135 > 44716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30563","14.222036","172.30.1.205","172.30.1.104","TCP","54","44716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30564","14.222387","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30565","14.222667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30566","14.222676","172.30.1.205","172.30.1.104","TCP","54","44716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30567","14.224897","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30568","14.225280","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30569","14.225287","172.30.1.205","172.30.1.104","TCP","54","44716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30570","14.227122","172.30.1.205","172.30.1.104","TCP","54","44716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30571","14.227240","172.30.1.205","172.30.1.104","TCP","74","37354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917453 TSecr=0 WS=128" +"30572","14.227417","172.30.1.104","172.30.1.205","TCP","54","135 > 44716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30573","14.227453","172.30.1.104","172.30.1.205","TCP","54","135 > 44716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30574","14.227459","172.30.1.205","172.30.1.104","TCP","54","44716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30575","14.227547","172.30.1.104","172.30.1.205","TCP","66","49671 > 37354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30576","14.227555","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30577","14.227922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30578","14.228298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30579","14.228307","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30580","14.230211","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30581","14.230716","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30582","14.230723","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30583","14.232076","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30584","14.234643","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30585","14.234654","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30586","14.235660","172.30.1.205","172.30.1.104","TCP","74","44720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917462 TSecr=0 WS=128" +"30587","14.235975","172.30.1.104","172.30.1.205","TCP","66","135 > 44720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30588","14.235987","172.30.1.205","172.30.1.104","TCP","54","44720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30589","14.236349","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30590","14.236660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30591","14.236669","172.30.1.205","172.30.1.104","TCP","54","44720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30592","14.238922","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30593","14.239338","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30594","14.239345","172.30.1.205","172.30.1.104","TCP","54","44720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30595","14.241234","172.30.1.205","172.30.1.104","TCP","54","44720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30596","14.241350","172.30.1.205","172.30.1.104","TCP","74","37358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917467 TSecr=0 WS=128" +"30597","14.241523","172.30.1.104","172.30.1.205","TCP","54","135 > 44720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30598","14.241559","172.30.1.104","172.30.1.205","TCP","54","135 > 44720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30599","14.241567","172.30.1.205","172.30.1.104","TCP","54","44720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30600","14.241648","172.30.1.104","172.30.1.205","TCP","66","49671 > 37358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30601","14.241655","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30602","14.242025","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30603","14.242330","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30604","14.242339","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30605","14.244219","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30606","14.244605","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30607","14.244611","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30608","14.245994","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30609","14.248548","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30610","14.248558","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30611","14.249545","172.30.1.205","172.30.1.104","TCP","74","44724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917475 TSecr=0 WS=128" +"30612","14.249885","172.30.1.104","172.30.1.205","TCP","66","135 > 44724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30613","14.249902","172.30.1.205","172.30.1.104","TCP","54","44724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30614","14.250306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30615","14.250616","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30616","14.250626","172.30.1.205","172.30.1.104","TCP","54","44724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30617","14.252880","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30618","14.253321","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30619","14.253329","172.30.1.205","172.30.1.104","TCP","54","44724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30620","14.255180","172.30.1.205","172.30.1.104","TCP","54","44724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30621","14.255303","172.30.1.205","172.30.1.104","TCP","74","37362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917481 TSecr=0 WS=128" +"30622","14.255479","172.30.1.104","172.30.1.205","TCP","54","135 > 44724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30623","14.255517","172.30.1.104","172.30.1.205","TCP","54","135 > 44724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30624","14.255524","172.30.1.205","172.30.1.104","TCP","54","44724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30625","14.255604","172.30.1.104","172.30.1.205","TCP","66","49671 > 37362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30626","14.255612","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30627","14.255961","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30628","14.256277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30629","14.256287","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30630","14.258218","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30631","14.258614","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30632","14.258620","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30633","14.259989","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30634","14.262658","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30635","14.262672","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30636","14.263729","172.30.1.205","172.30.1.104","TCP","74","44728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917490 TSecr=0 WS=128" +"30637","14.264018","172.30.1.104","172.30.1.205","TCP","66","135 > 44728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30638","14.264030","172.30.1.205","172.30.1.104","TCP","54","44728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30639","14.264393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30640","14.264738","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30641","14.264748","172.30.1.205","172.30.1.104","TCP","54","44728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30642","14.266983","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30643","14.267396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30644","14.267403","172.30.1.205","172.30.1.104","TCP","54","44728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30645","14.268266","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30646","14.268317","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30647","14.268354","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30648","14.268389","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30649","14.268422","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30650","14.268459","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30651","14.268491","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30652","14.268524","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30653","14.268551","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30654","14.268584","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30655","14.268608","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30656","14.268670","172.30.1.104","172.30.1.205","TCP","54","49671 > 37322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30657","14.268682","172.30.1.104","172.30.1.205","TCP","54","49671 > 37326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30658","14.268694","172.30.1.104","172.30.1.205","TCP","54","49671 > 37322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30659","14.268701","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30660","14.268715","172.30.1.104","172.30.1.205","TCP","54","49671 > 37330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30661","14.268730","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30662","14.268809","172.30.1.104","172.30.1.205","TCP","54","49671 > 37334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30663","14.269098","172.30.1.104","172.30.1.205","TCP","54","49671 > 37334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30664","14.269105","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30665","14.269114","172.30.1.104","172.30.1.205","TCP","54","49671 > 37338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30666","14.269131","172.30.1.104","172.30.1.205","TCP","54","49671 > 37326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30667","14.269134","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30668","14.269190","172.30.1.104","172.30.1.205","TCP","54","49671 > 37338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30669","14.269194","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30670","14.269220","172.30.1.104","172.30.1.205","TCP","54","49671 > 37330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30671","14.269223","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30672","14.269245","172.30.1.104","172.30.1.205","TCP","54","49671 > 37342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30673","14.269278","172.30.1.104","172.30.1.205","TCP","54","49671 > 37346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30674","14.269301","172.30.1.104","172.30.1.205","TCP","54","49671 > 37342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30675","14.269305","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30676","14.269320","172.30.1.104","172.30.1.205","TCP","54","49671 > 37350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30677","14.269342","172.30.1.104","172.30.1.205","TCP","54","49671 > 37346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30678","14.269346","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30679","14.269363","172.30.1.104","172.30.1.205","TCP","54","49671 > 37354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30680","14.269492","172.30.1.104","172.30.1.205","TCP","54","49671 > 37350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30681","14.269497","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30682","14.269512","172.30.1.104","172.30.1.205","TCP","54","49671 > 37354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30683","14.269515","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30684","14.269537","172.30.1.104","172.30.1.205","TCP","54","49671 > 37358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30685","14.269556","172.30.1.104","172.30.1.205","TCP","54","49671 > 37362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30686","14.269576","172.30.1.104","172.30.1.205","TCP","54","49671 > 37358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30687","14.269579","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30688","14.269850","172.30.1.104","172.30.1.205","TCP","54","49671 > 37318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30689","14.269869","172.30.1.104","172.30.1.205","TCP","54","49671 > 37362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30690","14.269873","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30691","14.269897","172.30.1.104","172.30.1.205","TCP","54","49671 > 37318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"30692","14.269900","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"30693","14.270398","172.30.1.205","172.30.1.104","TCP","54","44728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30694","14.270530","172.30.1.205","172.30.1.104","TCP","74","37366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917496 TSecr=0 WS=128" +"30695","14.270659","172.30.1.104","172.30.1.205","TCP","54","135 > 44728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30696","14.270696","172.30.1.104","172.30.1.205","TCP","54","135 > 44728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30697","14.270701","172.30.1.205","172.30.1.104","TCP","54","44728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30698","14.270825","172.30.1.104","172.30.1.205","TCP","66","49671 > 37366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30699","14.270834","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30700","14.271197","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30701","14.271518","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30702","14.271527","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30703","14.273437","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30704","14.274375","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30705","14.274382","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30706","14.275774","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30707","14.278438","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30708","14.278448","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30709","14.279438","172.30.1.205","172.30.1.104","TCP","74","44732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917505 TSecr=0 WS=128" +"30710","14.279763","172.30.1.104","172.30.1.205","TCP","66","135 > 44732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30711","14.279774","172.30.1.205","172.30.1.104","TCP","54","44732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30712","14.280132","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30713","14.280457","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30714","14.280465","172.30.1.205","172.30.1.104","TCP","54","44732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30715","14.282714","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30716","14.283144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30717","14.283151","172.30.1.205","172.30.1.104","TCP","54","44732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30718","14.285045","172.30.1.205","172.30.1.104","TCP","54","44732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30719","14.285199","172.30.1.205","172.30.1.104","TCP","74","37370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917511 TSecr=0 WS=128" +"30720","14.285334","172.30.1.104","172.30.1.205","TCP","54","135 > 44732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30721","14.285367","172.30.1.104","172.30.1.205","TCP","54","135 > 44732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30722","14.285376","172.30.1.205","172.30.1.104","TCP","54","44732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30723","14.285505","172.30.1.104","172.30.1.205","TCP","66","49671 > 37370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30724","14.285514","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30725","14.285872","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30726","14.286176","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30727","14.286184","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30728","14.288064","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30729","14.288443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30730","14.288450","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30731","14.289847","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30732","14.292414","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30733","14.292424","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30734","14.293428","172.30.1.205","172.30.1.104","TCP","74","44736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917519 TSecr=0 WS=128" +"30735","14.293729","172.30.1.104","172.30.1.205","TCP","66","135 > 44736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30736","14.293741","172.30.1.205","172.30.1.104","TCP","54","44736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30737","14.294094","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30738","14.294401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30739","14.294410","172.30.1.205","172.30.1.104","TCP","54","44736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30740","14.296653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30741","14.297048","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30742","14.297055","172.30.1.205","172.30.1.104","TCP","54","44736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30743","14.298898","172.30.1.205","172.30.1.104","TCP","54","44736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30744","14.299021","172.30.1.205","172.30.1.104","TCP","74","37374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917525 TSecr=0 WS=128" +"30745","14.299183","172.30.1.104","172.30.1.205","TCP","54","135 > 44736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30746","14.299236","172.30.1.104","172.30.1.205","TCP","54","135 > 44736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30747","14.299243","172.30.1.205","172.30.1.104","TCP","54","44736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30748","14.299337","172.30.1.104","172.30.1.205","TCP","66","49671 > 37374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30749","14.299346","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30750","14.299696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30751","14.301177","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30752","14.301190","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30753","14.303196","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30754","14.303632","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30755","14.303639","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30756","14.305042","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30757","14.307616","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30758","14.307626","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30759","14.308659","172.30.1.205","172.30.1.104","TCP","74","44740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917535 TSecr=0 WS=128" +"30760","14.308966","172.30.1.104","172.30.1.205","TCP","66","135 > 44740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30761","14.308980","172.30.1.205","172.30.1.104","TCP","54","44740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30762","14.309350","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30763","14.309664","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30764","14.309673","172.30.1.205","172.30.1.104","TCP","54","44740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30765","14.311908","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30766","14.312396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30767","14.312402","172.30.1.205","172.30.1.104","TCP","54","44740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30768","14.314254","172.30.1.205","172.30.1.104","TCP","54","44740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30769","14.314394","172.30.1.205","172.30.1.104","TCP","74","37378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917540 TSecr=0 WS=128" +"30770","14.314523","172.30.1.104","172.30.1.205","TCP","54","135 > 44740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30771","14.314558","172.30.1.104","172.30.1.205","TCP","54","135 > 44740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30772","14.314565","172.30.1.205","172.30.1.104","TCP","54","44740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30773","14.314744","172.30.1.104","172.30.1.205","TCP","66","49671 > 37378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30774","14.314752","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30775","14.315122","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30776","14.316580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30777","14.316589","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30778","14.318500","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30779","14.318861","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30780","14.318867","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30781","14.320234","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30782","14.322761","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30783","14.322771","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30784","14.323795","172.30.1.205","172.30.1.104","TCP","74","44744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917550 TSecr=0 WS=128" +"30785","14.324112","172.30.1.104","172.30.1.205","TCP","66","135 > 44744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30786","14.324124","172.30.1.205","172.30.1.104","TCP","54","44744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30787","14.324481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30788","14.324791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30789","14.324801","172.30.1.205","172.30.1.104","TCP","54","44744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30790","14.327035","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30791","14.327427","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30792","14.327434","172.30.1.205","172.30.1.104","TCP","54","44744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30793","14.329273","172.30.1.205","172.30.1.104","TCP","54","44744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30794","14.329389","172.30.1.205","172.30.1.104","TCP","74","37382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917555 TSecr=0 WS=128" +"30795","14.329547","172.30.1.104","172.30.1.205","TCP","54","135 > 44744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30796","14.329579","172.30.1.104","172.30.1.205","TCP","54","135 > 44744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30797","14.329586","172.30.1.205","172.30.1.104","TCP","54","44744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30798","14.329697","172.30.1.104","172.30.1.205","TCP","66","49671 > 37382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30799","14.329710","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30800","14.330056","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30801","14.330371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30802","14.330380","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30803","14.332255","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30804","14.332645","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30805","14.332652","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30806","14.334025","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30807","14.336671","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30808","14.336682","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30809","14.337682","172.30.1.205","172.30.1.104","TCP","74","44748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917564 TSecr=0 WS=128" +"30810","14.338048","172.30.1.104","172.30.1.205","TCP","66","135 > 44748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30811","14.338058","172.30.1.205","172.30.1.104","TCP","54","44748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30812","14.338406","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30813","14.338731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30814","14.338740","172.30.1.205","172.30.1.104","TCP","54","44748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30815","14.340952","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30816","14.341386","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30817","14.341393","172.30.1.205","172.30.1.104","TCP","54","44748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30818","14.343209","172.30.1.205","172.30.1.104","TCP","54","44748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30819","14.343322","172.30.1.205","172.30.1.104","TCP","74","37386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917569 TSecr=0 WS=128" +"30820","14.343487","172.30.1.104","172.30.1.205","TCP","54","135 > 44748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30821","14.343521","172.30.1.104","172.30.1.205","TCP","54","135 > 44748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30822","14.343528","172.30.1.205","172.30.1.104","TCP","54","44748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30823","14.343611","172.30.1.104","172.30.1.205","TCP","66","49671 > 37386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30824","14.343619","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30825","14.343962","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30826","14.344307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30827","14.344314","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30828","14.346213","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30829","14.346591","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30830","14.346598","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30831","14.347946","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30832","14.350592","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30833","14.350602","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30834","14.351560","172.30.1.205","172.30.1.104","TCP","74","44752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917577 TSecr=0 WS=128" +"30835","14.351885","172.30.1.104","172.30.1.205","TCP","66","135 > 44752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30836","14.351895","172.30.1.205","172.30.1.104","TCP","54","44752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30837","14.352238","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30838","14.352580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30839","14.352589","172.30.1.205","172.30.1.104","TCP","54","44752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30840","14.354795","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30841","14.355243","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30842","14.355249","172.30.1.205","172.30.1.104","TCP","54","44752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30843","14.357078","172.30.1.205","172.30.1.104","TCP","54","44752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30844","14.357191","172.30.1.205","172.30.1.104","TCP","74","37390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917583 TSecr=0 WS=128" +"30845","14.357404","172.30.1.104","172.30.1.205","TCP","54","135 > 44752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30846","14.357426","172.30.1.104","172.30.1.205","TCP","54","135 > 44752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30847","14.357433","172.30.1.205","172.30.1.104","TCP","54","44752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30848","14.357521","172.30.1.104","172.30.1.205","TCP","66","49671 > 37390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30849","14.357529","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30850","14.357893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30851","14.358217","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30852","14.358226","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30853","14.360085","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30854","14.360469","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30855","14.360476","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30856","14.361848","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30857","14.364543","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30858","14.364552","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30859","14.365518","172.30.1.205","172.30.1.104","TCP","74","44756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917591 TSecr=0 WS=128" +"30860","14.365829","172.30.1.104","172.30.1.205","TCP","66","135 > 44756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30861","14.365839","172.30.1.205","172.30.1.104","TCP","54","44756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30862","14.366184","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30863","14.366523","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30864","14.366539","172.30.1.205","172.30.1.104","TCP","54","44756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30865","14.368747","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30866","14.369170","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30867","14.369177","172.30.1.205","172.30.1.104","TCP","54","44756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30868","14.370990","172.30.1.205","172.30.1.104","TCP","54","44756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30869","14.371102","172.30.1.205","172.30.1.104","TCP","74","37394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917597 TSecr=0 WS=128" +"30870","14.371280","172.30.1.104","172.30.1.205","TCP","54","135 > 44756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30871","14.371331","172.30.1.104","172.30.1.205","TCP","54","135 > 44756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30872","14.371337","172.30.1.205","172.30.1.104","TCP","54","44756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30873","14.371416","172.30.1.104","172.30.1.205","TCP","66","49671 > 37394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30874","14.371425","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30875","14.371766","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30876","14.372092","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30877","14.372101","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30878","14.374007","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30879","14.374409","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30880","14.374415","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30881","14.375763","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30882","14.378388","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30883","14.378397","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30884","14.379350","172.30.1.205","172.30.1.104","TCP","74","44760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917605 TSecr=0 WS=128" +"30885","14.379652","172.30.1.104","172.30.1.205","TCP","66","135 > 44760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30886","14.379663","172.30.1.205","172.30.1.104","TCP","54","44760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30887","14.380029","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30888","14.380311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30889","14.380319","172.30.1.205","172.30.1.104","TCP","54","44760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30890","14.382538","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30891","14.382951","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30892","14.382963","172.30.1.205","172.30.1.104","TCP","54","44760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30893","14.385055","172.30.1.205","172.30.1.104","TCP","54","44760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30894","14.385163","172.30.1.205","172.30.1.104","TCP","74","37398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917611 TSecr=0 WS=128" +"30895","14.385369","172.30.1.104","172.30.1.205","TCP","54","135 > 44760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30896","14.385407","172.30.1.104","172.30.1.205","TCP","54","135 > 44760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30897","14.385413","172.30.1.205","172.30.1.104","TCP","54","44760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30898","14.385475","172.30.1.104","172.30.1.205","TCP","66","49671 > 37398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30899","14.385483","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30900","14.385830","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30901","14.386138","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30902","14.386146","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30903","14.388005","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30904","14.388394","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30905","14.388400","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30906","14.389766","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30907","14.392418","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30908","14.392428","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30909","14.393393","172.30.1.205","172.30.1.104","TCP","74","44764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917619 TSecr=0 WS=128" +"30910","14.393743","172.30.1.104","172.30.1.205","TCP","66","135 > 44764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30911","14.393753","172.30.1.205","172.30.1.104","TCP","54","44764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30912","14.394097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30913","14.394401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30914","14.394410","172.30.1.205","172.30.1.104","TCP","54","44764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30915","14.396575","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30916","14.396992","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30917","14.397006","172.30.1.205","172.30.1.104","TCP","54","44764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30918","14.398815","172.30.1.205","172.30.1.104","TCP","54","44764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30919","14.398926","172.30.1.205","172.30.1.104","TCP","74","37402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917625 TSecr=0 WS=128" +"30920","14.399120","172.30.1.104","172.30.1.205","TCP","54","135 > 44764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30921","14.399149","172.30.1.104","172.30.1.205","TCP","54","135 > 44764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30922","14.399154","172.30.1.205","172.30.1.104","TCP","54","44764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30923","14.399214","172.30.1.104","172.30.1.205","TCP","66","49671 > 37402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30924","14.399222","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30925","14.399560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30926","14.399869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30927","14.399877","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30928","14.401754","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30929","14.402178","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30930","14.402185","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30931","14.403565","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30932","14.406251","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30933","14.406260","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30934","14.407200","172.30.1.205","172.30.1.104","TCP","74","44768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917633 TSecr=0 WS=128" +"30935","14.407616","172.30.1.104","172.30.1.205","TCP","66","135 > 44768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30936","14.407626","172.30.1.205","172.30.1.104","TCP","54","44768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30937","14.407975","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30938","14.408345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30939","14.408354","172.30.1.205","172.30.1.104","TCP","54","44768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30940","14.410567","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30941","14.411029","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30942","14.411035","172.30.1.205","172.30.1.104","TCP","54","44768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30943","14.412852","172.30.1.205","172.30.1.104","TCP","54","44768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30944","14.412962","172.30.1.205","172.30.1.104","TCP","74","37406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917639 TSecr=0 WS=128" +"30945","14.413169","172.30.1.104","172.30.1.205","TCP","54","135 > 44768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30946","14.413177","172.30.1.104","172.30.1.205","TCP","54","135 > 44768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30947","14.413182","172.30.1.205","172.30.1.104","TCP","54","44768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30948","14.413228","172.30.1.104","172.30.1.205","TCP","66","49671 > 37406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30949","14.413237","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30950","14.413582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30951","14.413877","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30952","14.413886","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30953","14.415753","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30954","14.416138","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30955","14.416144","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30956","14.417509","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30957","14.420343","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30958","14.420352","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30959","14.421313","172.30.1.205","172.30.1.104","TCP","74","44772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917647 TSecr=0 WS=128" +"30960","14.421626","172.30.1.104","172.30.1.205","TCP","66","135 > 44772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30961","14.421637","172.30.1.205","172.30.1.104","TCP","54","44772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30962","14.421987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30963","14.422335","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30964","14.422344","172.30.1.205","172.30.1.104","TCP","54","44772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30965","14.424518","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30966","14.424945","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30967","14.424952","172.30.1.205","172.30.1.104","TCP","54","44772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30968","14.426757","172.30.1.205","172.30.1.104","TCP","54","44772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30969","14.426870","172.30.1.205","172.30.1.104","TCP","74","37410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917653 TSecr=0 WS=128" +"30970","14.427063","172.30.1.104","172.30.1.205","TCP","54","135 > 44772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30971","14.427095","172.30.1.104","172.30.1.205","TCP","54","135 > 44772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"30972","14.427101","172.30.1.205","172.30.1.104","TCP","54","44772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"30973","14.427176","172.30.1.104","172.30.1.205","TCP","66","49671 > 37410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30974","14.427184","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30975","14.427523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"30976","14.427839","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30977","14.427846","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30978","14.429726","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"30979","14.430123","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"30980","14.430130","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"30981","14.431487","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"30982","14.434243","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"30983","14.434253","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30984","14.435215","172.30.1.205","172.30.1.104","TCP","74","44776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917661 TSecr=0 WS=128" +"30985","14.435537","172.30.1.104","172.30.1.205","TCP","66","135 > 44776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"30986","14.435548","172.30.1.205","172.30.1.104","TCP","54","44776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"30987","14.435891","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"30988","14.436192","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"30989","14.436200","172.30.1.205","172.30.1.104","TCP","54","44776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"30990","14.438391","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"30991","14.438850","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"30992","14.438856","172.30.1.205","172.30.1.104","TCP","54","44776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"30993","14.439727","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30994","14.439775","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30995","14.439822","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30996","14.439858","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30997","14.439891","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30998","14.439923","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"30999","14.439951","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31000","14.439983","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31001","14.440009","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31002","14.440041","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31003","14.440067","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31004","14.440134","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31005","14.440428","172.30.1.104","172.30.1.205","TCP","54","49671 > 37370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31006","14.440458","172.30.1.104","172.30.1.205","TCP","54","49671 > 37374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31007","14.440495","172.30.1.104","172.30.1.205","TCP","54","49671 > 37370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31008","14.440502","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31009","14.440511","172.30.1.104","172.30.1.205","TCP","54","49671 > 37378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31010","14.440546","172.30.1.104","172.30.1.205","TCP","54","49671 > 37382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31011","14.440596","172.30.1.104","172.30.1.205","TCP","54","49671 > 37374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31012","14.440601","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31013","14.440615","172.30.1.104","172.30.1.205","TCP","54","49671 > 37386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31014","14.440638","172.30.1.104","172.30.1.205","TCP","54","49671 > 37386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31015","14.440641","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31016","14.440659","172.30.1.104","172.30.1.205","TCP","54","49671 > 37390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31017","14.440679","172.30.1.104","172.30.1.205","TCP","54","49671 > 37390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31018","14.440681","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31019","14.440747","172.30.1.104","172.30.1.205","TCP","54","49671 > 37394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31020","14.440767","172.30.1.104","172.30.1.205","TCP","54","49671 > 37394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31021","14.440771","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31022","14.440787","172.30.1.104","172.30.1.205","TCP","54","49671 > 37398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31023","14.440808","172.30.1.104","172.30.1.205","TCP","54","49671 > 37398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31024","14.440811","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31025","14.440883","172.30.1.104","172.30.1.205","TCP","54","49671 > 37402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31026","14.440903","172.30.1.104","172.30.1.205","TCP","54","49671 > 37406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31027","14.440923","172.30.1.104","172.30.1.205","TCP","54","49671 > 37378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31028","14.440927","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31029","14.440942","172.30.1.104","172.30.1.205","TCP","54","49671 > 37406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31030","14.440946","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31031","14.440962","172.30.1.104","172.30.1.205","TCP","54","49671 > 37410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31032","14.441046","172.30.1.104","172.30.1.205","TCP","54","49671 > 37410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31033","14.441049","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31034","14.441065","172.30.1.104","172.30.1.205","TCP","54","49671 > 37382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31035","14.441068","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31036","14.441461","172.30.1.104","172.30.1.205","TCP","54","49671 > 37366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31037","14.441505","172.30.1.104","172.30.1.205","TCP","54","49671 > 37402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31038","14.441510","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31039","14.441526","172.30.1.104","172.30.1.205","TCP","54","49671 > 37366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31040","14.441536","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31041","14.441773","172.30.1.205","172.30.1.104","TCP","54","44776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31042","14.441886","172.30.1.205","172.30.1.104","TCP","74","37414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917668 TSecr=0 WS=128" +"31043","14.442050","172.30.1.104","172.30.1.205","TCP","54","135 > 44776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31044","14.442085","172.30.1.104","172.30.1.205","TCP","54","135 > 44776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31045","14.442090","172.30.1.205","172.30.1.104","TCP","54","44776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31046","14.442164","172.30.1.104","172.30.1.205","TCP","66","49671 > 37414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31047","14.442172","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31048","14.442521","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31049","14.442843","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31050","14.442852","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31051","14.444744","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31052","14.445137","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31053","14.445144","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31054","14.446501","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31055","14.449151","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31056","14.449162","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31057","14.450133","172.30.1.205","172.30.1.104","TCP","74","44780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917676 TSecr=0 WS=128" +"31058","14.450461","172.30.1.104","172.30.1.205","TCP","66","135 > 44780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31059","14.450472","172.30.1.205","172.30.1.104","TCP","54","44780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31060","14.450825","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31061","14.451141","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31062","14.451152","172.30.1.205","172.30.1.104","TCP","54","44780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31063","14.453364","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31064","14.453794","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31065","14.453801","172.30.1.205","172.30.1.104","TCP","54","44780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31066","14.455589","172.30.1.205","172.30.1.104","TCP","54","44780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31067","14.455700","172.30.1.205","172.30.1.104","TCP","74","37418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917682 TSecr=0 WS=128" +"31068","14.455986","172.30.1.104","172.30.1.205","TCP","54","135 > 44780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31069","14.455997","172.30.1.104","172.30.1.205","TCP","54","135 > 44780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31070","14.456010","172.30.1.205","172.30.1.104","TCP","54","44780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31071","14.456264","172.30.1.104","172.30.1.205","TCP","66","49671 > 37418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31072","14.456273","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31073","14.456631","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31074","14.457725","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31075","14.457733","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31076","14.459583","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31077","14.460906","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31078","14.460912","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31079","14.462253","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31080","14.464819","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31081","14.464829","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31082","14.465781","172.30.1.205","172.30.1.104","TCP","74","44784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917692 TSecr=0 WS=128" +"31083","14.466103","172.30.1.104","172.30.1.205","TCP","66","135 > 44784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31084","14.466114","172.30.1.205","172.30.1.104","TCP","54","44784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31085","14.466464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31086","14.466796","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31087","14.466805","172.30.1.205","172.30.1.104","TCP","54","44784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31088","14.469019","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31089","14.469463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31090","14.469470","172.30.1.205","172.30.1.104","TCP","54","44784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31091","14.471278","172.30.1.205","172.30.1.104","TCP","54","44784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31092","14.471387","172.30.1.205","172.30.1.104","TCP","74","37422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917697 TSecr=0 WS=128" +"31093","14.471571","172.30.1.104","172.30.1.205","TCP","54","135 > 44784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31094","14.471604","172.30.1.104","172.30.1.205","TCP","54","135 > 44784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31095","14.471610","172.30.1.205","172.30.1.104","TCP","54","44784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31096","14.471696","172.30.1.104","172.30.1.205","TCP","66","49671 > 37422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31097","14.471704","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31098","14.472048","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31099","14.472363","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31100","14.472371","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31101","14.474290","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31102","14.474684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31103","14.474690","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31104","14.476023","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31105","14.478644","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31106","14.478658","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31107","14.479689","172.30.1.205","172.30.1.104","TCP","74","44788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917706 TSecr=0 WS=128" +"31108","14.480035","172.30.1.104","172.30.1.205","TCP","66","135 > 44788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31109","14.480048","172.30.1.205","172.30.1.104","TCP","54","44788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31110","14.480427","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31111","14.480731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31112","14.480745","172.30.1.205","172.30.1.104","TCP","54","44788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31113","14.482969","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31114","14.483397","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31115","14.483404","172.30.1.205","172.30.1.104","TCP","54","44788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31116","14.485268","172.30.1.205","172.30.1.104","TCP","54","44788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31117","14.485384","172.30.1.205","172.30.1.104","TCP","74","37426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917711 TSecr=0 WS=128" +"31118","14.485562","172.30.1.104","172.30.1.205","TCP","54","135 > 44788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31119","14.485599","172.30.1.104","172.30.1.205","TCP","54","135 > 44788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31120","14.485606","172.30.1.205","172.30.1.104","TCP","54","44788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31121","14.485645","172.30.1.104","172.30.1.205","TCP","66","49671 > 37426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31122","14.485654","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31123","14.486005","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31124","14.486323","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31125","14.486337","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31126","14.488318","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31127","14.488713","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31128","14.488720","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31129","14.490104","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31130","14.492649","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31131","14.492659","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31132","14.493640","172.30.1.205","172.30.1.104","TCP","74","44792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917720 TSecr=0 WS=128" +"31133","14.493955","172.30.1.104","172.30.1.205","TCP","66","135 > 44792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31134","14.493966","172.30.1.205","172.30.1.104","TCP","54","44792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31135","14.494311","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31136","14.494637","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31137","14.494646","172.30.1.205","172.30.1.104","TCP","54","44792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31138","14.496840","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31139","14.497294","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31140","14.497304","172.30.1.205","172.30.1.104","TCP","54","44792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31141","14.499197","172.30.1.205","172.30.1.104","TCP","54","44792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31142","14.499326","172.30.1.205","172.30.1.104","TCP","74","37430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917725 TSecr=0 WS=128" +"31143","14.499477","172.30.1.104","172.30.1.205","TCP","54","135 > 44792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31144","14.499510","172.30.1.104","172.30.1.205","TCP","54","135 > 44792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31145","14.499516","172.30.1.205","172.30.1.104","TCP","54","44792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31146","14.499595","172.30.1.104","172.30.1.205","TCP","66","49671 > 37430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31147","14.499608","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31148","14.500247","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31149","14.500586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31150","14.500595","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31151","14.502516","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31152","14.502911","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31153","14.502918","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31154","14.504263","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31155","14.506919","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31156","14.506931","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31157","14.507962","172.30.1.205","172.30.1.104","TCP","74","44796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917734 TSecr=0 WS=128" +"31158","14.508250","172.30.1.104","172.30.1.205","TCP","66","135 > 44796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31159","14.508261","172.30.1.205","172.30.1.104","TCP","54","44796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31160","14.508616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31161","14.508947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31162","14.508956","172.30.1.205","172.30.1.104","TCP","54","44796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31163","14.511206","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31164","14.511633","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31165","14.511640","172.30.1.205","172.30.1.104","TCP","54","44796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31166","14.513479","172.30.1.205","172.30.1.104","TCP","54","44796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31167","14.513599","172.30.1.205","172.30.1.104","TCP","74","37434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917740 TSecr=0 WS=128" +"31168","14.513760","172.30.1.104","172.30.1.205","TCP","54","135 > 44796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31169","14.513795","172.30.1.104","172.30.1.205","TCP","54","135 > 44796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31170","14.513802","172.30.1.205","172.30.1.104","TCP","54","44796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31171","14.513879","172.30.1.104","172.30.1.205","TCP","66","49671 > 37434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31172","14.513893","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31173","14.514267","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31174","14.514578","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31175","14.514590","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31176","14.516533","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31177","14.516937","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31178","14.516944","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31179","14.518329","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31180","14.520880","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31181","14.520891","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31182","14.521898","172.30.1.205","172.30.1.104","TCP","74","44800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917748 TSecr=0 WS=128" +"31183","14.522234","172.30.1.104","172.30.1.205","TCP","66","135 > 44800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31184","14.522246","172.30.1.205","172.30.1.104","TCP","54","44800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31185","14.522602","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31186","14.522916","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31187","14.522928","172.30.1.205","172.30.1.104","TCP","54","44800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31188","14.525220","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31189","14.525616","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31190","14.525622","172.30.1.205","172.30.1.104","TCP","54","44800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31191","14.527447","172.30.1.205","172.30.1.104","TCP","54","44800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31192","14.527568","172.30.1.205","172.30.1.104","TCP","74","37438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917753 TSecr=0 WS=128" +"31193","14.527748","172.30.1.104","172.30.1.205","TCP","54","135 > 44800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31194","14.527780","172.30.1.104","172.30.1.205","TCP","54","135 > 44800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31195","14.527787","172.30.1.205","172.30.1.104","TCP","54","44800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31196","14.527869","172.30.1.104","172.30.1.205","TCP","66","49671 > 37438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31197","14.527877","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31198","14.528221","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31199","14.528532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31200","14.528540","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31201","14.530438","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31202","14.530838","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31203","14.530845","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31204","14.532195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31205","14.534747","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31206","14.534757","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31207","14.535727","172.30.1.205","172.30.1.104","TCP","74","44804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917762 TSecr=0 WS=128" +"31208","14.536039","172.30.1.104","172.30.1.205","TCP","66","135 > 44804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31209","14.536050","172.30.1.205","172.30.1.104","TCP","54","44804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31210","14.536402","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31211","14.536694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31212","14.536703","172.30.1.205","172.30.1.104","TCP","54","44804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31213","14.538909","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31214","14.539316","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31215","14.539323","172.30.1.205","172.30.1.104","TCP","54","44804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31216","14.541154","172.30.1.205","172.30.1.104","TCP","54","44804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31217","14.541264","172.30.1.205","172.30.1.104","TCP","74","37442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917767 TSecr=0 WS=128" +"31218","14.541458","172.30.1.104","172.30.1.205","TCP","54","135 > 44804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31219","14.541469","172.30.1.104","172.30.1.205","TCP","54","135 > 44804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31220","14.541475","172.30.1.205","172.30.1.104","TCP","54","44804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31221","14.541548","172.30.1.104","172.30.1.205","TCP","66","49671 > 37442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31222","14.541556","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31223","14.541903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31224","14.542198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31225","14.542205","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31226","14.544069","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31227","14.544454","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31228","14.544460","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31229","14.545834","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31230","14.548426","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31231","14.548435","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31232","14.549395","172.30.1.205","172.30.1.104","TCP","74","44808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917775 TSecr=0 WS=128" +"31233","14.549695","172.30.1.104","172.30.1.205","TCP","66","135 > 44808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31234","14.549717","172.30.1.205","172.30.1.104","TCP","54","44808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31235","14.550072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31236","14.550393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31237","14.550402","172.30.1.205","172.30.1.104","TCP","54","44808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31238","14.552611","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31239","14.553005","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31240","14.553012","172.30.1.205","172.30.1.104","TCP","54","44808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31241","14.554811","172.30.1.205","172.30.1.104","TCP","54","44808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31242","14.554923","172.30.1.205","172.30.1.104","TCP","74","37446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917781 TSecr=0 WS=128" +"31243","14.555133","172.30.1.104","172.30.1.205","TCP","54","135 > 44808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31244","14.555175","172.30.1.104","172.30.1.205","TCP","54","135 > 44808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31245","14.555181","172.30.1.205","172.30.1.104","TCP","54","44808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31246","14.555219","172.30.1.104","172.30.1.205","TCP","66","49671 > 37446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31247","14.555228","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31248","14.555593","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31249","14.555895","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31250","14.555904","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31251","14.557780","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31252","14.558179","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31253","14.558186","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31254","14.559521","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31255","14.562065","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31256","14.562074","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31257","14.563021","172.30.1.205","172.30.1.104","TCP","74","44812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917789 TSecr=0 WS=128" +"31258","14.563325","172.30.1.104","172.30.1.205","TCP","66","135 > 44812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31259","14.563336","172.30.1.205","172.30.1.104","TCP","54","44812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31260","14.563681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31261","14.563980","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31262","14.563989","172.30.1.205","172.30.1.104","TCP","54","44812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31263","14.566197","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31264","14.566604","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31265","14.566611","172.30.1.205","172.30.1.104","TCP","54","44812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31266","14.568414","172.30.1.205","172.30.1.104","TCP","54","44812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31267","14.568527","172.30.1.205","172.30.1.104","TCP","74","37450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917794 TSecr=0 WS=128" +"31268","14.568708","172.30.1.104","172.30.1.205","TCP","54","135 > 44812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31269","14.568740","172.30.1.104","172.30.1.205","TCP","54","135 > 44812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31270","14.568746","172.30.1.205","172.30.1.104","TCP","54","44812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31271","14.568823","172.30.1.104","172.30.1.205","TCP","66","49671 > 37450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31272","14.568832","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31273","14.569181","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31274","14.569475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31275","14.569482","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31276","14.571345","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31277","14.571729","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31278","14.571735","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31279","14.573128","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31280","14.575779","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31281","14.575794","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31282","14.576895","172.30.1.205","172.30.1.104","TCP","74","44816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917803 TSecr=0 WS=128" +"31283","14.577203","172.30.1.104","172.30.1.205","TCP","66","135 > 44816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31284","14.577218","172.30.1.205","172.30.1.104","TCP","54","44816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31285","14.577582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31286","14.577906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31287","14.577915","172.30.1.205","172.30.1.104","TCP","54","44816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31288","14.580149","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31289","14.580556","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31290","14.580563","172.30.1.205","172.30.1.104","TCP","54","44816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31291","14.582387","172.30.1.205","172.30.1.104","TCP","54","44816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31292","14.582504","172.30.1.205","172.30.1.104","TCP","74","37454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917808 TSecr=0 WS=128" +"31293","14.582666","172.30.1.104","172.30.1.205","TCP","54","135 > 44816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31294","14.582677","172.30.1.104","172.30.1.205","TCP","54","135 > 44816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31295","14.582685","172.30.1.205","172.30.1.104","TCP","54","44816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31296","14.582784","172.30.1.104","172.30.1.205","TCP","66","49671 > 37454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31297","14.582792","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31298","14.583145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31299","14.583463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31300","14.583472","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31301","14.585378","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31302","14.585774","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31303","14.585781","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31304","14.587122","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31305","14.589760","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31306","14.589770","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31307","14.590713","172.30.1.205","172.30.1.104","TCP","74","44820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917817 TSecr=0 WS=128" +"31308","14.591009","172.30.1.104","172.30.1.205","TCP","66","135 > 44820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31309","14.591020","172.30.1.205","172.30.1.104","TCP","54","44820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31310","14.591363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31311","14.591676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31312","14.591685","172.30.1.205","172.30.1.104","TCP","54","44820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31313","14.593894","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31314","14.594355","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31315","14.594362","172.30.1.205","172.30.1.104","TCP","54","44820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31316","14.596209","172.30.1.205","172.30.1.104","TCP","54","44820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31317","14.596320","172.30.1.205","172.30.1.104","TCP","74","37458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917822 TSecr=0 WS=128" +"31318","14.596511","172.30.1.104","172.30.1.205","TCP","54","135 > 44820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31319","14.596573","172.30.1.104","172.30.1.205","TCP","54","135 > 44820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31320","14.596580","172.30.1.205","172.30.1.104","TCP","54","44820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31321","14.596662","172.30.1.104","172.30.1.205","TCP","66","49671 > 37458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31322","14.596670","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31323","14.597041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31324","14.599313","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31325","14.599321","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31326","14.601215","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31327","14.601638","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31328","14.601644","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31329","14.602989","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31330","14.606375","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31331","14.606385","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31332","14.607371","172.30.1.205","172.30.1.104","TCP","74","44824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917833 TSecr=0 WS=128" +"31333","14.607692","172.30.1.104","172.30.1.205","TCP","66","135 > 44824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31334","14.607704","172.30.1.205","172.30.1.104","TCP","54","44824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31335","14.608062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31336","14.608386","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31337","14.608395","172.30.1.205","172.30.1.104","TCP","54","44824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31338","14.610591","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31339","14.611006","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31340","14.611013","172.30.1.205","172.30.1.104","TCP","54","44824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31341","14.611866","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31342","14.611916","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31343","14.611952","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31344","14.611981","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31345","14.612009","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31346","14.612042","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31347","14.612069","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31348","14.612096","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31349","14.612122","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31350","14.612153","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31351","14.612181","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31352","14.612248","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31353","14.612504","172.30.1.104","172.30.1.205","TCP","54","49671 > 37418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31354","14.612526","172.30.1.104","172.30.1.205","TCP","54","49671 > 37422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31355","14.612553","172.30.1.104","172.30.1.205","TCP","54","49671 > 37418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31356","14.612561","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31357","14.612579","172.30.1.104","172.30.1.205","TCP","54","49671 > 37426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31358","14.612609","172.30.1.104","172.30.1.205","TCP","54","49671 > 37430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31359","14.612634","172.30.1.104","172.30.1.205","TCP","54","49671 > 37422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31360","14.612639","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31361","14.612661","172.30.1.104","172.30.1.205","TCP","54","49671 > 37434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31362","14.612687","172.30.1.104","172.30.1.205","TCP","54","49671 > 37434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31363","14.612691","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31364","14.612715","172.30.1.104","172.30.1.205","TCP","54","49671 > 37438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31365","14.612742","172.30.1.104","172.30.1.205","TCP","54","49671 > 37438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31366","14.612745","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31367","14.612836","172.30.1.104","172.30.1.205","TCP","54","49671 > 37442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31368","14.612861","172.30.1.104","172.30.1.205","TCP","54","49671 > 37442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31369","14.612865","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31370","14.612888","172.30.1.104","172.30.1.205","TCP","54","49671 > 37446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31371","14.612914","172.30.1.104","172.30.1.205","TCP","54","49671 > 37446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31372","14.612918","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31373","14.612940","172.30.1.104","172.30.1.205","TCP","54","49671 > 37450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31374","14.612966","172.30.1.104","172.30.1.205","TCP","54","49671 > 37426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31375","14.612970","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31376","14.612993","172.30.1.104","172.30.1.205","TCP","54","49671 > 37454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31377","14.613022","172.30.1.104","172.30.1.205","TCP","54","49671 > 37458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31378","14.613134","172.30.1.104","172.30.1.205","TCP","54","49671 > 37414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31379","14.613169","172.30.1.104","172.30.1.205","TCP","54","49671 > 37458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31380","14.613173","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31381","14.613246","172.30.1.104","172.30.1.205","TCP","54","49671 > 37454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31382","14.613249","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31383","14.613250","172.30.1.104","172.30.1.205","TCP","54","49671 > 37450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31384","14.613252","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31385","14.613253","172.30.1.104","172.30.1.205","TCP","54","49671 > 37414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31386","14.613255","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31387","14.613277","172.30.1.104","172.30.1.205","TCP","54","49671 > 37430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31388","14.613280","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31389","14.613869","172.30.1.205","172.30.1.104","TCP","54","44824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31390","14.613991","172.30.1.205","172.30.1.104","TCP","74","37462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917840 TSecr=0 WS=128" +"31391","14.614150","172.30.1.104","172.30.1.205","TCP","54","135 > 44824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31392","14.614174","172.30.1.104","172.30.1.205","TCP","54","135 > 44824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31393","14.614179","172.30.1.205","172.30.1.104","TCP","54","44824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31394","14.614266","172.30.1.104","172.30.1.205","TCP","66","49671 > 37462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31395","14.614274","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31396","14.614625","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31397","14.614983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31398","14.614991","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31399","14.616882","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31400","14.617323","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31401","14.617329","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31402","14.618685","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31403","14.621375","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31404","14.621385","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31405","14.622373","172.30.1.205","172.30.1.104","TCP","74","44828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917848 TSecr=0 WS=128" +"31406","14.622715","172.30.1.104","172.30.1.205","TCP","66","135 > 44828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31407","14.622728","172.30.1.205","172.30.1.104","TCP","54","44828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31408","14.623085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31409","14.623391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31410","14.623400","172.30.1.205","172.30.1.104","TCP","54","44828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31411","14.625604","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31412","14.626017","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31413","14.626023","172.30.1.205","172.30.1.104","TCP","54","44828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31414","14.627834","172.30.1.205","172.30.1.104","TCP","54","44828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31415","14.627946","172.30.1.205","172.30.1.104","TCP","74","37466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917854 TSecr=0 WS=128" +"31416","14.628117","172.30.1.104","172.30.1.205","TCP","54","135 > 44828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31417","14.628154","172.30.1.104","172.30.1.205","TCP","54","135 > 44828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31418","14.628160","172.30.1.205","172.30.1.104","TCP","54","44828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31419","14.628246","172.30.1.104","172.30.1.205","TCP","66","49671 > 37466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31420","14.628256","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31421","14.628605","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31422","14.628929","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31423","14.628938","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31424","14.630818","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31425","14.631210","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31426","14.631217","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31427","14.632564","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31428","14.635198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31429","14.635209","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31430","14.636255","172.30.1.205","172.30.1.104","TCP","74","44832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917862 TSecr=0 WS=128" +"31431","14.636589","172.30.1.104","172.30.1.205","TCP","66","135 > 44832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31432","14.636604","172.30.1.205","172.30.1.104","TCP","54","44832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31433","14.637002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31434","14.637371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31435","14.637380","172.30.1.205","172.30.1.104","TCP","54","44832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31436","14.639626","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31437","14.640059","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31438","14.640065","172.30.1.205","172.30.1.104","TCP","54","44832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31439","14.641922","172.30.1.205","172.30.1.104","TCP","54","44832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31440","14.642068","172.30.1.205","172.30.1.104","TCP","74","37470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917868 TSecr=0 WS=128" +"31441","14.642222","172.30.1.104","172.30.1.205","TCP","54","135 > 44832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31442","14.642297","172.30.1.104","172.30.1.205","TCP","54","135 > 44832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31443","14.642305","172.30.1.205","172.30.1.104","TCP","54","44832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31444","14.642416","172.30.1.104","172.30.1.205","TCP","66","49671 > 37470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31445","14.642425","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31446","14.642775","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31447","14.643059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31448","14.643066","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31449","14.644998","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31450","14.645439","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31451","14.645445","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31452","14.646820","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31453","14.649518","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31454","14.649530","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31455","14.650586","172.30.1.205","172.30.1.104","TCP","74","44836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917877 TSecr=0 WS=128" +"31456","14.651017","172.30.1.104","172.30.1.205","TCP","66","135 > 44836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31457","14.651029","172.30.1.205","172.30.1.104","TCP","54","44836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31458","14.651389","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31459","14.651688","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31460","14.651697","172.30.1.205","172.30.1.104","TCP","54","44836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31461","14.653973","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31462","14.654388","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31463","14.654394","172.30.1.205","172.30.1.104","TCP","54","44836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31464","14.656230","172.30.1.205","172.30.1.104","TCP","54","44836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31465","14.656355","172.30.1.205","172.30.1.104","TCP","74","37474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917882 TSecr=0 WS=128" +"31466","14.656561","172.30.1.104","172.30.1.205","TCP","54","135 > 44836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31467","14.656574","172.30.1.104","172.30.1.205","TCP","54","135 > 44836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31468","14.656581","172.30.1.205","172.30.1.104","TCP","54","44836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31469","14.656664","172.30.1.104","172.30.1.205","TCP","66","49671 > 37474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31470","14.656672","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31471","14.657048","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31472","14.657351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31473","14.657359","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31474","14.659249","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31475","14.659664","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31476","14.659670","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31477","14.661064","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31478","14.663717","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31479","14.663728","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31480","14.664757","172.30.1.205","172.30.1.104","TCP","74","44840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917891 TSecr=0 WS=128" +"31481","14.665058","172.30.1.104","172.30.1.205","TCP","66","135 > 44840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31482","14.665071","172.30.1.205","172.30.1.104","TCP","54","44840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31483","14.665427","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31484","14.665758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31485","14.665767","172.30.1.205","172.30.1.104","TCP","54","44840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31486","14.667984","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31487","14.668443","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31488","14.668452","172.30.1.205","172.30.1.104","TCP","54","44840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31489","14.670294","172.30.1.205","172.30.1.104","TCP","54","44840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31490","14.670440","172.30.1.205","172.30.1.104","TCP","74","37478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917896 TSecr=0 WS=128" +"31491","14.670599","172.30.1.104","172.30.1.205","TCP","54","135 > 44840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31492","14.670612","172.30.1.104","172.30.1.205","TCP","54","135 > 44840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31493","14.670620","172.30.1.205","172.30.1.104","TCP","54","44840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31494","14.670703","172.30.1.104","172.30.1.205","TCP","66","49671 > 37478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31495","14.670721","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31496","14.671135","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31497","14.671492","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31498","14.671503","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31499","14.673474","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31500","14.673869","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31501","14.673874","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31502","14.675269","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31503","14.677991","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31504","14.678005","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31505","14.679101","172.30.1.205","172.30.1.104","TCP","74","44844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917905 TSecr=0 WS=128" +"31506","14.679471","172.30.1.104","172.30.1.205","TCP","66","135 > 44844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31507","14.679485","172.30.1.205","172.30.1.104","TCP","54","44844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31508","14.679854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31509","14.680195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31510","14.680209","172.30.1.205","172.30.1.104","TCP","54","44844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31511","14.682559","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31512","14.682996","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31513","14.683003","172.30.1.205","172.30.1.104","TCP","54","44844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31514","14.684865","172.30.1.205","172.30.1.104","TCP","54","44844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31515","14.684994","172.30.1.205","172.30.1.104","TCP","74","37482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917911 TSecr=0 WS=128" +"31516","14.685189","172.30.1.104","172.30.1.205","TCP","54","135 > 44844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31517","14.685215","172.30.1.104","172.30.1.205","TCP","54","135 > 44844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31518","14.685223","172.30.1.205","172.30.1.104","TCP","54","44844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31519","14.685332","172.30.1.104","172.30.1.205","TCP","66","49671 > 37482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31520","14.685340","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31521","14.685691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31522","14.686005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31523","14.686014","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31524","14.687908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31525","14.688280","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31526","14.688287","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31527","14.689675","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31528","14.692410","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31529","14.692420","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31530","14.693425","172.30.1.205","172.30.1.104","TCP","74","44848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917919 TSecr=0 WS=128" +"31531","14.693732","172.30.1.104","172.30.1.205","TCP","66","135 > 44848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31532","14.693743","172.30.1.205","172.30.1.104","TCP","54","44848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31533","14.694087","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31534","14.694429","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31535","14.694438","172.30.1.205","172.30.1.104","TCP","54","44848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31536","14.696636","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31537","14.697100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31538","14.697108","172.30.1.205","172.30.1.104","TCP","54","44848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31539","14.698932","172.30.1.205","172.30.1.104","TCP","54","44848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31540","14.699059","172.30.1.205","172.30.1.104","TCP","74","37486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917925 TSecr=0 WS=128" +"31541","14.699231","172.30.1.104","172.30.1.205","TCP","54","135 > 44848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31542","14.699260","172.30.1.104","172.30.1.205","TCP","54","135 > 44848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31543","14.699268","172.30.1.205","172.30.1.104","TCP","54","44848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31544","14.699387","172.30.1.104","172.30.1.205","TCP","66","49671 > 37486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31545","14.699396","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31546","14.699740","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31547","14.700193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31548","14.700201","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31549","14.702115","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31550","14.704889","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31551","14.704899","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31552","14.706367","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31553","14.709018","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31554","14.709035","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31555","14.710072","172.30.1.205","172.30.1.104","TCP","74","44852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917936 TSecr=0 WS=128" +"31556","14.710454","172.30.1.104","172.30.1.205","TCP","66","135 > 44852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31557","14.710468","172.30.1.205","172.30.1.104","TCP","54","44852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31558","14.710834","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31559","14.711161","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31560","14.711170","172.30.1.205","172.30.1.104","TCP","54","44852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31561","14.713424","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31562","14.713943","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31563","14.713951","172.30.1.205","172.30.1.104","TCP","54","44852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31564","14.715776","172.30.1.205","172.30.1.104","TCP","54","44852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31565","14.715893","172.30.1.205","172.30.1.104","TCP","74","37490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917942 TSecr=0 WS=128" +"31566","14.716072","172.30.1.104","172.30.1.205","TCP","54","135 > 44852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31567","14.716104","172.30.1.104","172.30.1.205","TCP","54","135 > 44852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31568","14.716112","172.30.1.205","172.30.1.104","TCP","54","44852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31569","14.716191","172.30.1.104","172.30.1.205","TCP","66","49671 > 37490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31570","14.716199","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31571","14.716550","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31572","14.716862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31573","14.716871","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31574","14.718774","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31575","14.720142","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31576","14.720148","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31577","14.721541","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31578","14.724186","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31579","14.724200","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31580","14.725259","172.30.1.205","172.30.1.104","TCP","74","44856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917951 TSecr=0 WS=128" +"31581","14.725573","172.30.1.104","172.30.1.205","TCP","66","135 > 44856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31582","14.725585","172.30.1.205","172.30.1.104","TCP","54","44856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31583","14.725946","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31584","14.726314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31585","14.726327","172.30.1.205","172.30.1.104","TCP","54","44856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31586","14.728595","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31587","14.729014","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31588","14.729022","172.30.1.205","172.30.1.104","TCP","54","44856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31589","14.730861","172.30.1.205","172.30.1.104","TCP","54","44856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31590","14.730980","172.30.1.205","172.30.1.104","TCP","74","37494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917957 TSecr=0 WS=128" +"31591","14.731177","172.30.1.104","172.30.1.205","TCP","54","135 > 44856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31592","14.731192","172.30.1.104","172.30.1.205","TCP","54","135 > 44856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31593","14.731198","172.30.1.205","172.30.1.104","TCP","54","44856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31594","14.731281","172.30.1.104","172.30.1.205","TCP","66","49671 > 37494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31595","14.731290","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31596","14.731640","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31597","14.731958","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31598","14.731967","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31599","14.733901","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31600","14.734335","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31601","14.734343","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31602","14.735723","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31603","14.738377","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31604","14.738387","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31605","14.739361","172.30.1.205","172.30.1.104","TCP","74","44860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917965 TSecr=0 WS=128" +"31606","14.739686","172.30.1.104","172.30.1.205","TCP","66","135 > 44860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31607","14.739696","172.30.1.205","172.30.1.104","TCP","54","44860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31608","14.740058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31609","14.740348","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31610","14.740359","172.30.1.205","172.30.1.104","TCP","54","44860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31611","14.742589","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31612","14.743003","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31613","14.743010","172.30.1.205","172.30.1.104","TCP","54","44860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31614","14.744851","172.30.1.205","172.30.1.104","TCP","54","44860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31615","14.744962","172.30.1.205","172.30.1.104","TCP","74","37498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917971 TSecr=0 WS=128" +"31616","14.745161","172.30.1.104","172.30.1.205","TCP","54","135 > 44860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31617","14.745231","172.30.1.104","172.30.1.205","TCP","54","135 > 44860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31618","14.745236","172.30.1.205","172.30.1.104","TCP","54","44860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31619","14.745316","172.30.1.104","172.30.1.205","TCP","66","49671 > 37498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31620","14.745324","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31621","14.745675","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31622","14.746020","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31623","14.746029","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31624","14.747908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31625","14.748301","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31626","14.748307","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31627","14.749687","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31628","14.752423","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31629","14.752432","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31630","14.753386","172.30.1.205","172.30.1.104","TCP","74","44864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917979 TSecr=0 WS=128" +"31631","14.753713","172.30.1.104","172.30.1.205","TCP","66","135 > 44864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31632","14.753723","172.30.1.205","172.30.1.104","TCP","54","44864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31633","14.754075","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31634","14.754394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31635","14.754403","172.30.1.205","172.30.1.104","TCP","54","44864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31636","14.756594","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31637","14.757060","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31638","14.757067","172.30.1.205","172.30.1.104","TCP","54","44864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31639","14.758881","172.30.1.205","172.30.1.104","TCP","54","44864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31640","14.758995","172.30.1.205","172.30.1.104","TCP","74","37502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917985 TSecr=0 WS=128" +"31641","14.759170","172.30.1.104","172.30.1.205","TCP","54","135 > 44864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31642","14.759211","172.30.1.104","172.30.1.205","TCP","54","135 > 44864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31643","14.759217","172.30.1.205","172.30.1.104","TCP","54","44864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31644","14.759298","172.30.1.104","172.30.1.205","TCP","66","49671 > 37502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31645","14.759306","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31646","14.759655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31647","14.759983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31648","14.759991","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31649","14.761901","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31650","14.762336","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31651","14.762342","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31652","14.763710","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31653","14.766426","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31654","14.766436","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31655","14.767391","172.30.1.205","172.30.1.104","TCP","74","44868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917993 TSecr=0 WS=128" +"31656","14.767702","172.30.1.104","172.30.1.205","TCP","66","135 > 44868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31657","14.767713","172.30.1.205","172.30.1.104","TCP","54","44868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31658","14.768061","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31659","14.768373","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31660","14.768382","172.30.1.205","172.30.1.104","TCP","54","44868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31661","14.770590","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31662","14.771022","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31663","14.771028","172.30.1.205","172.30.1.104","TCP","54","44868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31664","14.772859","172.30.1.205","172.30.1.104","TCP","54","44868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31665","14.772968","172.30.1.205","172.30.1.104","TCP","74","37506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917999 TSecr=0 WS=128" +"31666","14.773152","172.30.1.104","172.30.1.205","TCP","54","135 > 44868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31667","14.773190","172.30.1.104","172.30.1.205","TCP","54","135 > 44868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31668","14.773195","172.30.1.205","172.30.1.104","TCP","54","44868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31669","14.773332","172.30.1.104","172.30.1.205","TCP","66","49671 > 37506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31670","14.773340","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31671","14.773691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31672","14.774005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31673","14.774014","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31674","14.775886","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31675","14.776614","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31676","14.776626","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31677","14.778072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31678","14.780831","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31679","14.780841","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31680","14.781779","172.30.1.205","172.30.1.104","TCP","74","44872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918008 TSecr=0 WS=128" +"31681","14.782139","172.30.1.104","172.30.1.205","TCP","66","135 > 44872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31682","14.782149","172.30.1.205","172.30.1.104","TCP","54","44872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31683","14.782504","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31684","14.782850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31685","14.782858","172.30.1.205","172.30.1.104","TCP","54","44872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31686","14.785066","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31687","14.785701","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31688","14.785708","172.30.1.205","172.30.1.104","TCP","54","44872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31689","14.786549","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31690","14.786599","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31691","14.786638","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31692","14.786667","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31693","14.786700","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31694","14.786726","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31695","14.786753","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31696","14.786780","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31697","14.786802","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31698","14.786832","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31699","14.786859","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31700","14.786929","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31701","14.787205","172.30.1.104","172.30.1.205","TCP","54","49671 > 37466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31702","14.787226","172.30.1.104","172.30.1.205","TCP","54","49671 > 37470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31703","14.787253","172.30.1.104","172.30.1.205","TCP","54","49671 > 37466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31704","14.787259","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31705","14.787278","172.30.1.104","172.30.1.205","TCP","54","49671 > 37474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31706","14.787317","172.30.1.104","172.30.1.205","TCP","54","49671 > 37478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31707","14.787369","172.30.1.104","172.30.1.205","TCP","54","49671 > 37478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31708","14.787375","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31709","14.787392","172.30.1.104","172.30.1.205","TCP","54","49671 > 37482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31710","14.787468","172.30.1.104","172.30.1.205","TCP","54","49671 > 37486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31711","14.787471","172.30.1.104","172.30.1.205","TCP","54","49671 > 37486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31712","14.787474","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31713","14.787504","172.30.1.104","172.30.1.205","TCP","54","49671 > 37490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31714","14.787529","172.30.1.104","172.30.1.205","TCP","54","49671 > 37482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31715","14.787534","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31716","14.787550","172.30.1.104","172.30.1.205","TCP","54","49671 > 37494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31717","14.787571","172.30.1.104","172.30.1.205","TCP","54","49671 > 37490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31718","14.787575","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31719","14.787591","172.30.1.104","172.30.1.205","TCP","54","49671 > 37498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31720","14.787610","172.30.1.104","172.30.1.205","TCP","54","49671 > 37494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31721","14.787614","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31722","14.787631","172.30.1.104","172.30.1.205","TCP","54","49671 > 37498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31723","14.787634","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31724","14.787650","172.30.1.104","172.30.1.205","TCP","54","49671 > 37502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31725","14.787671","172.30.1.104","172.30.1.205","TCP","54","49671 > 37506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31726","14.787692","172.30.1.104","172.30.1.205","TCP","54","49671 > 37502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31727","14.787696","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31728","14.787853","172.30.1.104","172.30.1.205","TCP","54","49671 > 37506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31729","14.787856","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31730","14.788122","172.30.1.104","172.30.1.205","TCP","54","49671 > 37462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31731","14.788139","172.30.1.104","172.30.1.205","TCP","54","49671 > 37462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31732","14.788143","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31733","14.788166","172.30.1.104","172.30.1.205","TCP","54","49671 > 37470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31734","14.788169","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31735","14.788191","172.30.1.104","172.30.1.205","TCP","54","49671 > 37474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"31736","14.788194","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"31737","14.788656","172.30.1.205","172.30.1.104","TCP","54","44872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31738","14.788767","172.30.1.205","172.30.1.104","TCP","74","37510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918015 TSecr=0 WS=128" +"31739","14.789149","172.30.1.104","172.30.1.205","TCP","66","49671 > 37510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31740","14.789160","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31741","14.789175","172.30.1.104","172.30.1.205","TCP","54","135 > 44872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31742","14.789183","172.30.1.104","172.30.1.205","TCP","54","135 > 44872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31743","14.789187","172.30.1.205","172.30.1.104","TCP","54","44872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31744","14.789535","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31745","14.789868","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31746","14.789877","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31747","14.791747","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31748","14.792294","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31749","14.792300","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31750","14.793697","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31751","14.796459","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31752","14.796468","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31753","14.797417","172.30.1.205","172.30.1.104","TCP","74","44876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918023 TSecr=0 WS=128" +"31754","14.797768","172.30.1.104","172.30.1.205","TCP","66","135 > 44876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31755","14.797778","172.30.1.205","172.30.1.104","TCP","54","44876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31756","14.798128","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31757","14.798435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31758","14.798444","172.30.1.205","172.30.1.104","TCP","54","44876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31759","14.800618","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31760","14.801039","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31761","14.801046","172.30.1.205","172.30.1.104","TCP","54","44876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31762","14.802878","172.30.1.205","172.30.1.104","TCP","54","44876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31763","14.802991","172.30.1.205","172.30.1.104","TCP","74","37514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918029 TSecr=0 WS=128" +"31764","14.803142","172.30.1.104","172.30.1.205","TCP","54","135 > 44876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31765","14.803176","172.30.1.104","172.30.1.205","TCP","54","135 > 44876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31766","14.803181","172.30.1.205","172.30.1.104","TCP","54","44876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31767","14.803285","172.30.1.104","172.30.1.205","TCP","66","49671 > 37514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31768","14.803294","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31769","14.803636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31770","14.803930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31771","14.803937","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31772","14.805827","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31773","14.806204","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31774","14.806211","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31775","14.807560","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31776","14.810338","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31777","14.810348","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31778","14.811286","172.30.1.205","172.30.1.104","TCP","74","44880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918037 TSecr=0 WS=128" +"31779","14.811596","172.30.1.104","172.30.1.205","TCP","66","135 > 44880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31780","14.811606","172.30.1.205","172.30.1.104","TCP","54","44880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31781","14.811966","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31782","14.812263","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31783","14.812272","172.30.1.205","172.30.1.104","TCP","54","44880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31784","14.814483","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31785","14.814845","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31786","14.814852","172.30.1.205","172.30.1.104","TCP","54","44880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31787","14.816663","172.30.1.205","172.30.1.104","TCP","54","44880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31788","14.816792","172.30.1.205","172.30.1.104","TCP","74","37518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918043 TSecr=0 WS=128" +"31789","14.817214","172.30.1.104","172.30.1.205","TCP","54","135 > 44880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31790","14.817252","172.30.1.104","172.30.1.205","TCP","54","135 > 44880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31791","14.817258","172.30.1.205","172.30.1.104","TCP","54","44880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31792","14.817276","172.30.1.104","172.30.1.205","TCP","66","49671 > 37518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31793","14.817284","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31794","14.817626","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31795","14.817899","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31796","14.817908","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31797","14.819810","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31798","14.820152","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31799","14.820159","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31800","14.821533","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31801","14.824133","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31802","14.824142","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31803","14.825097","172.30.1.205","172.30.1.104","TCP","74","44884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918051 TSecr=0 WS=128" +"31804","14.825466","172.30.1.104","172.30.1.205","TCP","66","135 > 44884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31805","14.825477","172.30.1.205","172.30.1.104","TCP","54","44884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31806","14.825834","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31807","14.826113","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31808","14.826122","172.30.1.205","172.30.1.104","TCP","54","44884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31809","14.828324","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31810","14.828709","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31811","14.828716","172.30.1.205","172.30.1.104","TCP","54","44884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31812","14.830567","172.30.1.205","172.30.1.104","TCP","54","44884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31813","14.830697","172.30.1.205","172.30.1.104","TCP","74","37522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918057 TSecr=0 WS=128" +"31814","14.830843","172.30.1.104","172.30.1.205","TCP","54","135 > 44884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31815","14.830852","172.30.1.104","172.30.1.205","TCP","54","135 > 44884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31816","14.830857","172.30.1.205","172.30.1.104","TCP","54","44884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31817","14.830960","172.30.1.104","172.30.1.205","TCP","66","49671 > 37522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31818","14.830968","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31819","14.831342","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31820","14.831629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31821","14.831639","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31822","14.833697","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31823","14.834219","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31824","14.834226","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31825","14.835643","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31826","14.838278","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31827","14.838288","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31828","14.839228","172.30.1.205","172.30.1.104","TCP","74","44888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918065 TSecr=0 WS=128" +"31829","14.839543","172.30.1.104","172.30.1.205","TCP","66","135 > 44888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31830","14.839553","172.30.1.205","172.30.1.104","TCP","54","44888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31831","14.839922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31832","14.840239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31833","14.840250","172.30.1.205","172.30.1.104","TCP","54","44888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31834","14.842512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31835","14.842900","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31836","14.842907","172.30.1.205","172.30.1.104","TCP","54","44888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31837","14.844738","172.30.1.205","172.30.1.104","TCP","54","44888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31838","14.844875","172.30.1.205","172.30.1.104","TCP","74","37526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918071 TSecr=0 WS=128" +"31839","14.845146","172.30.1.104","172.30.1.205","TCP","54","135 > 44888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31840","14.845161","172.30.1.104","172.30.1.205","TCP","54","135 > 44888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31841","14.845167","172.30.1.205","172.30.1.104","TCP","54","44888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31842","14.845284","172.30.1.104","172.30.1.205","TCP","66","49671 > 37526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31843","14.845293","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31844","14.845641","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31845","14.846065","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31846","14.846074","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31847","14.847930","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31848","14.848339","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31849","14.848345","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31850","14.849742","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31851","14.853663","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31852","14.853677","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31853","14.854671","172.30.1.205","172.30.1.104","TCP","74","44892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918081 TSecr=0 WS=128" +"31854","14.854994","172.30.1.104","172.30.1.205","TCP","66","135 > 44892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31855","14.855007","172.30.1.205","172.30.1.104","TCP","54","44892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31856","14.855365","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31857","14.855690","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31858","14.855700","172.30.1.205","172.30.1.104","TCP","54","44892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31859","14.857945","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31860","14.858308","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31861","14.858315","172.30.1.205","172.30.1.104","TCP","54","44892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31862","14.860145","172.30.1.205","172.30.1.104","TCP","54","44892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31863","14.860258","172.30.1.205","172.30.1.104","TCP","74","37530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918086 TSecr=0 WS=128" +"31864","14.860397","172.30.1.104","172.30.1.205","TCP","54","135 > 44892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31865","14.860439","172.30.1.104","172.30.1.205","TCP","54","135 > 44892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31866","14.860445","172.30.1.205","172.30.1.104","TCP","54","44892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31867","14.860531","172.30.1.104","172.30.1.205","TCP","66","49671 > 37530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31868","14.860541","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31869","14.860927","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31870","14.861221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31871","14.861230","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31872","14.863125","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31873","14.863482","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31874","14.863488","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31875","14.864868","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31876","14.867491","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31877","14.867500","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31878","14.868437","172.30.1.205","172.30.1.104","TCP","74","44896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918094 TSecr=0 WS=128" +"31879","14.868718","172.30.1.104","172.30.1.205","TCP","66","135 > 44896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31880","14.868729","172.30.1.205","172.30.1.104","TCP","54","44896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31881","14.869100","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31882","14.869374","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31883","14.869384","172.30.1.205","172.30.1.104","TCP","54","44896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31884","14.871601","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31885","14.871981","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31886","14.871991","172.30.1.205","172.30.1.104","TCP","54","44896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31887","14.873933","172.30.1.205","172.30.1.104","TCP","54","44896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31888","14.874061","172.30.1.205","172.30.1.104","TCP","74","37534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918100 TSecr=0 WS=128" +"31889","14.874229","172.30.1.104","172.30.1.205","TCP","54","135 > 44896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31890","14.874239","172.30.1.104","172.30.1.205","TCP","54","135 > 44896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31891","14.874245","172.30.1.205","172.30.1.104","TCP","54","44896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31892","14.874423","172.30.1.104","172.30.1.205","TCP","66","49671 > 37534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31893","14.874432","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31894","14.874784","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31895","14.875069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31896","14.875081","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31897","14.877027","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31898","14.877411","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31899","14.877418","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31900","14.878787","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31901","14.881418","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31902","14.881429","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31903","14.882400","172.30.1.205","172.30.1.104","TCP","74","44900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918108 TSecr=0 WS=128" +"31904","14.882722","172.30.1.104","172.30.1.205","TCP","66","135 > 44900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31905","14.882733","172.30.1.205","172.30.1.104","TCP","54","44900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31906","14.883093","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31907","14.883389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31908","14.883400","172.30.1.205","172.30.1.104","TCP","54","44900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31909","14.885652","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31910","14.886113","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31911","14.886120","172.30.1.205","172.30.1.104","TCP","54","44900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31912","14.887946","172.30.1.205","172.30.1.104","TCP","54","44900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31913","14.888072","172.30.1.205","172.30.1.104","TCP","74","37538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918114 TSecr=0 WS=128" +"31914","14.888218","172.30.1.104","172.30.1.205","TCP","54","135 > 44900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31915","14.888230","172.30.1.104","172.30.1.205","TCP","54","135 > 44900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31916","14.888236","172.30.1.205","172.30.1.104","TCP","54","44900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31917","14.888336","172.30.1.104","172.30.1.205","TCP","66","49671 > 37538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31918","14.888346","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31919","14.888696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31920","14.888971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31921","14.888987","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31922","14.890894","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31923","14.891302","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31924","14.891308","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31925","14.892673","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31926","14.895257","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31927","14.895269","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31928","14.896256","172.30.1.205","172.30.1.104","TCP","74","44904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918122 TSecr=0 WS=128" +"31929","14.896533","172.30.1.104","172.30.1.205","TCP","66","135 > 44904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31930","14.896544","172.30.1.205","172.30.1.104","TCP","54","44904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31931","14.896929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31932","14.897194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31933","14.897203","172.30.1.205","172.30.1.104","TCP","54","44904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31934","14.899505","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31935","14.899868","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31936","14.899875","172.30.1.205","172.30.1.104","TCP","54","44904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31937","14.901713","172.30.1.205","172.30.1.104","TCP","54","44904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31938","14.901827","172.30.1.205","172.30.1.104","TCP","74","37542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918128 TSecr=0 WS=128" +"31939","14.901978","172.30.1.104","172.30.1.205","TCP","54","135 > 44904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31940","14.902036","172.30.1.104","172.30.1.205","TCP","54","135 > 44904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31941","14.902042","172.30.1.205","172.30.1.104","TCP","54","44904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31942","14.902083","172.30.1.104","172.30.1.205","TCP","66","49671 > 37542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31943","14.902091","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31944","14.902454","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31945","14.902739","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31946","14.902747","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31947","14.904620","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31948","14.904974","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31949","14.904981","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31950","14.906338","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31951","14.908935","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31952","14.908948","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31953","14.909911","172.30.1.205","172.30.1.104","TCP","74","44908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918136 TSecr=0 WS=128" +"31954","14.910295","172.30.1.104","172.30.1.205","TCP","66","135 > 44908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31955","14.910306","172.30.1.205","172.30.1.104","TCP","54","44908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31956","14.910657","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31957","14.910942","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31958","14.910952","172.30.1.205","172.30.1.104","TCP","54","44908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31959","14.913189","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31960","14.913563","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31961","14.913570","172.30.1.205","172.30.1.104","TCP","54","44908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31962","14.915393","172.30.1.205","172.30.1.104","TCP","54","44908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31963","14.915508","172.30.1.205","172.30.1.104","TCP","74","37546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918141 TSecr=0 WS=128" +"31964","14.915648","172.30.1.104","172.30.1.205","TCP","54","135 > 44908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31965","14.915659","172.30.1.104","172.30.1.205","TCP","54","135 > 44908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31966","14.915665","172.30.1.205","172.30.1.104","TCP","54","44908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31967","14.915822","172.30.1.104","172.30.1.205","TCP","66","49671 > 37546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31968","14.915830","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31969","14.916182","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31970","14.917068","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31971","14.917076","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31972","14.918963","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31973","14.919336","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31974","14.919342","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"31975","14.920697","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"31976","14.923316","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"31977","14.923326","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"31978","14.924319","172.30.1.205","172.30.1.104","TCP","74","44912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918150 TSecr=0 WS=128" +"31979","14.924659","172.30.1.104","172.30.1.205","TCP","66","135 > 44912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31980","14.924670","172.30.1.205","172.30.1.104","TCP","54","44912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31981","14.925054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"31982","14.925341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31983","14.925350","172.30.1.205","172.30.1.104","TCP","54","44912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31984","14.927574","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"31985","14.927968","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"31986","14.927974","172.30.1.205","172.30.1.104","TCP","54","44912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31987","14.929828","172.30.1.205","172.30.1.104","TCP","54","44912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"31988","14.929962","172.30.1.205","172.30.1.104","TCP","74","37550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918156 TSecr=0 WS=128" +"31989","14.930072","172.30.1.104","172.30.1.205","TCP","54","135 > 44912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31990","14.930088","172.30.1.104","172.30.1.205","TCP","54","135 > 44912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"31991","14.930094","172.30.1.205","172.30.1.104","TCP","54","44912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"31992","14.930240","172.30.1.104","172.30.1.205","TCP","66","49671 > 37550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"31993","14.930248","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"31994","14.930603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"31995","14.930980","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"31996","14.930995","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"31997","14.932904","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"31998","14.933247","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"31999","14.933253","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32000","14.934618","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32001","14.939809","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32002","14.939821","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32003","14.940868","172.30.1.205","172.30.1.104","TCP","74","44916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918167 TSecr=0 WS=128" +"32004","14.941211","172.30.1.104","172.30.1.205","TCP","66","135 > 44916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32005","14.941223","172.30.1.205","172.30.1.104","TCP","54","44916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32006","14.941582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32007","14.941901","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32008","14.941910","172.30.1.205","172.30.1.104","TCP","54","44916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32009","14.944121","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32010","14.944526","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32011","14.944533","172.30.1.205","172.30.1.104","TCP","54","44916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32012","14.946371","172.30.1.205","172.30.1.104","TCP","54","44916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32013","14.946485","172.30.1.205","172.30.1.104","TCP","74","37554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918172 TSecr=0 WS=128" +"32014","14.946629","172.30.1.104","172.30.1.205","TCP","54","135 > 44916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32015","14.946645","172.30.1.104","172.30.1.205","TCP","54","135 > 44916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32016","14.946652","172.30.1.205","172.30.1.104","TCP","54","44916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32017","14.946777","172.30.1.104","172.30.1.205","TCP","66","49671 > 37554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32018","14.946786","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32019","14.947140","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32020","14.947473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32021","14.947480","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32022","14.949378","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32023","14.949750","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32024","14.949756","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32025","14.951110","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32026","14.954736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32027","14.954747","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32028","14.955702","172.30.1.205","172.30.1.104","TCP","74","44920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918182 TSecr=0 WS=128" +"32029","14.956075","172.30.1.104","172.30.1.205","TCP","66","135 > 44920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32030","14.956088","172.30.1.205","172.30.1.104","TCP","54","44920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32031","14.956449","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32032","14.956770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32033","14.956788","172.30.1.205","172.30.1.104","TCP","54","44920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32034","14.958982","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32035","14.959384","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32036","14.959390","172.30.1.205","172.30.1.104","TCP","54","44920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32037","14.960243","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32038","14.960297","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32039","14.960335","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32040","14.960368","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32041","14.960400","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32042","14.960432","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32043","14.960459","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32044","14.960484","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32045","14.960501","172.30.1.104","172.30.1.205","TCP","54","49671 > 37514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32046","14.960537","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32047","14.960570","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32048","14.960596","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32049","14.960614","172.30.1.104","172.30.1.205","TCP","54","49671 > 37518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32050","14.960632","172.30.1.104","172.30.1.205","TCP","54","49671 > 37514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32051","14.960639","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32052","14.960653","172.30.1.104","172.30.1.205","TCP","54","49671 > 37518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32053","14.960656","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32054","14.960674","172.30.1.104","172.30.1.205","TCP","54","49671 > 37522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32055","14.960696","172.30.1.104","172.30.1.205","TCP","54","49671 > 37526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32056","14.960732","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32057","14.960808","172.30.1.104","172.30.1.205","TCP","54","49671 > 37530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32058","14.960828","172.30.1.104","172.30.1.205","TCP","54","49671 > 37534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32059","14.960849","172.30.1.104","172.30.1.205","TCP","54","49671 > 37530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32060","14.960855","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32061","14.960870","172.30.1.104","172.30.1.205","TCP","54","49671 > 37522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32062","14.960873","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32063","14.960890","172.30.1.104","172.30.1.205","TCP","54","49671 > 37526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32064","14.960893","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32065","14.960912","172.30.1.104","172.30.1.205","TCP","54","49671 > 37534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32066","14.960915","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32067","14.960933","172.30.1.104","172.30.1.205","TCP","54","49671 > 37538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32068","14.961089","172.30.1.104","172.30.1.205","TCP","54","49671 > 37542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32069","14.961108","172.30.1.104","172.30.1.205","TCP","54","49671 > 37546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32070","14.961143","172.30.1.104","172.30.1.205","TCP","54","49671 > 37538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32071","14.961147","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32072","14.961161","172.30.1.104","172.30.1.205","TCP","54","49671 > 37542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32073","14.961164","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32074","14.961191","172.30.1.104","172.30.1.205","TCP","54","49671 > 37546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32075","14.961194","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32076","14.961218","172.30.1.104","172.30.1.205","TCP","54","49671 > 37550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32077","14.961244","172.30.1.104","172.30.1.205","TCP","54","49671 > 37554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32078","14.961339","172.30.1.104","172.30.1.205","TCP","54","49671 > 37550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32079","14.961344","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32080","14.961366","172.30.1.104","172.30.1.205","TCP","54","49671 > 37554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32081","14.961369","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32082","14.961393","172.30.1.104","172.30.1.205","TCP","54","49671 > 37510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32083","14.961430","172.30.1.104","172.30.1.205","TCP","54","49671 > 37510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32084","14.961433","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32085","14.962261","172.30.1.205","172.30.1.104","TCP","54","44920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32086","14.962373","172.30.1.205","172.30.1.104","TCP","74","37558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918188 TSecr=0 WS=128" +"32087","14.962539","172.30.1.104","172.30.1.205","TCP","54","135 > 44920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32088","14.962594","172.30.1.104","172.30.1.205","TCP","54","135 > 44920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32089","14.962599","172.30.1.205","172.30.1.104","TCP","54","44920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32090","14.962641","172.30.1.104","172.30.1.205","TCP","66","49671 > 37558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32091","14.962650","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32092","14.963011","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32093","14.963316","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32094","14.963325","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32095","14.965228","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32096","14.965656","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32097","14.965699","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32098","14.967046","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32099","14.969814","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32100","14.969824","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32101","14.970765","172.30.1.205","172.30.1.104","TCP","74","44924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918197 TSecr=0 WS=128" +"32102","14.971108","172.30.1.104","172.30.1.205","TCP","66","135 > 44924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32103","14.971130","172.30.1.205","172.30.1.104","TCP","54","44924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32104","14.971660","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32105","14.972035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32106","14.972043","172.30.1.205","172.30.1.104","TCP","54","44924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32107","14.974264","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32108","14.974698","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32109","14.974711","172.30.1.205","172.30.1.104","TCP","54","44924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32110","14.976523","172.30.1.205","172.30.1.104","TCP","54","44924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32111","14.976636","172.30.1.205","172.30.1.104","TCP","74","37562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918203 TSecr=0 WS=128" +"32112","14.976816","172.30.1.104","172.30.1.205","TCP","54","135 > 44924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32113","14.976840","172.30.1.104","172.30.1.205","TCP","54","135 > 44924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32114","14.976846","172.30.1.205","172.30.1.104","TCP","54","44924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32115","14.976939","172.30.1.104","172.30.1.205","TCP","66","49671 > 37562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32116","14.976947","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32117","14.977298","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32118","14.977591","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32119","14.977600","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32120","14.979478","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32121","14.979843","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32122","14.979849","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32123","14.981228","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32124","14.983912","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32125","14.983921","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32126","14.984877","172.30.1.205","172.30.1.104","TCP","74","44928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918211 TSecr=0 WS=128" +"32127","14.985197","172.30.1.104","172.30.1.205","TCP","66","135 > 44928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32128","14.985207","172.30.1.205","172.30.1.104","TCP","54","44928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32129","14.985563","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32130","14.985847","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32131","14.985862","172.30.1.205","172.30.1.104","TCP","54","44928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32132","14.988173","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32133","14.988597","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32134","14.988615","172.30.1.205","172.30.1.104","TCP","54","44928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32135","14.990686","172.30.1.205","172.30.1.104","TCP","54","44928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32136","14.990812","172.30.1.205","172.30.1.104","TCP","74","37566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918217 TSecr=0 WS=128" +"32137","14.990980","172.30.1.104","172.30.1.205","TCP","54","135 > 44928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32138","14.991033","172.30.1.104","172.30.1.205","TCP","54","135 > 44928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32139","14.991058","172.30.1.205","172.30.1.104","TCP","54","44928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32140","14.991065","172.30.1.104","172.30.1.205","TCP","66","49671 > 37566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32141","14.991077","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32142","14.991431","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32143","14.991747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32144","14.991756","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32145","14.993682","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32146","14.994083","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32147","14.994096","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32148","14.995711","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32149","14.998479","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32150","14.998491","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32151","14.999546","172.30.1.205","172.30.1.104","TCP","74","44932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918225 TSecr=0 WS=128" +"32152","14.999870","172.30.1.104","172.30.1.205","TCP","66","135 > 44932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32153","14.999882","172.30.1.205","172.30.1.104","TCP","54","44932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32154","15.000241","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32155","15.003460","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32156","15.003469","172.30.1.205","172.30.1.104","TCP","54","44932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32157","15.005745","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32158","15.006152","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32159","15.006159","172.30.1.205","172.30.1.104","TCP","54","44932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32160","15.007982","172.30.1.205","172.30.1.104","TCP","54","44932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32161","15.008091","172.30.1.205","172.30.1.104","TCP","74","37570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918234 TSecr=0 WS=128" +"32162","15.008252","172.30.1.104","172.30.1.205","TCP","54","135 > 44932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32163","15.008362","172.30.1.104","172.30.1.205","TCP","66","49671 > 37570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32164","15.008371","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32165","15.008472","172.30.1.104","172.30.1.205","TCP","54","135 > 44932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32166","15.008479","172.30.1.205","172.30.1.104","TCP","54","44932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32167","15.008752","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32168","15.009056","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32169","15.009064","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32170","15.010953","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32171","15.011315","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32172","15.011321","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32173","15.012688","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32174","15.015402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32175","15.015418","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32176","15.016542","172.30.1.205","172.30.1.104","TCP","74","44936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918242 TSecr=0 WS=128" +"32177","15.016893","172.30.1.104","172.30.1.205","TCP","66","135 > 44936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32178","15.016908","172.30.1.205","172.30.1.104","TCP","54","44936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32179","15.017312","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32180","15.017602","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32181","15.017611","172.30.1.205","172.30.1.104","TCP","54","44936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32182","15.019872","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32183","15.020298","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32184","15.020305","172.30.1.205","172.30.1.104","TCP","54","44936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32185","15.022160","172.30.1.205","172.30.1.104","TCP","54","44936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32186","15.022285","172.30.1.205","172.30.1.104","TCP","74","37574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918248 TSecr=0 WS=128" +"32187","15.022423","172.30.1.104","172.30.1.205","TCP","54","135 > 44936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32188","15.022451","172.30.1.104","172.30.1.205","TCP","54","135 > 44936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32189","15.022458","172.30.1.205","172.30.1.104","TCP","54","44936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32190","15.022548","172.30.1.104","172.30.1.205","TCP","66","49671 > 37574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32191","15.022557","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32192","15.022907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32193","15.023205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32194","15.023214","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32195","15.025151","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32196","15.025524","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32197","15.025530","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32198","15.026906","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32199","15.029665","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32200","15.029675","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32201","15.030662","172.30.1.205","172.30.1.104","TCP","74","44940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918257 TSecr=0 WS=128" +"32202","15.030962","172.30.1.104","172.30.1.205","TCP","66","135 > 44940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32203","15.030974","172.30.1.205","172.30.1.104","TCP","54","44940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32204","15.031330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32205","15.031633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32206","15.031642","172.30.1.205","172.30.1.104","TCP","54","44940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32207","15.033882","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32208","15.034291","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32209","15.034298","172.30.1.205","172.30.1.104","TCP","54","44940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32210","15.036126","172.30.1.205","172.30.1.104","TCP","54","44940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32211","15.036244","172.30.1.205","172.30.1.104","TCP","74","37578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918262 TSecr=0 WS=128" +"32212","15.036413","172.30.1.104","172.30.1.205","TCP","54","135 > 44940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32213","15.036450","172.30.1.104","172.30.1.205","TCP","54","135 > 44940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32214","15.036456","172.30.1.205","172.30.1.104","TCP","54","44940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32215","15.036539","172.30.1.104","172.30.1.205","TCP","66","49671 > 37578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32216","15.036548","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32217","15.036924","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32218","15.037211","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32219","15.037221","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32220","15.039133","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32221","15.040909","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32222","15.040916","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32223","15.042288","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32224","15.045149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32225","15.045159","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32226","15.046155","172.30.1.205","172.30.1.104","TCP","74","44944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918272 TSecr=0 WS=128" +"32227","15.046497","172.30.1.104","172.30.1.205","TCP","66","135 > 44944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32228","15.046511","172.30.1.205","172.30.1.104","TCP","54","44944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32229","15.046880","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32230","15.047185","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32231","15.047195","172.30.1.205","172.30.1.104","TCP","54","44944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32232","15.049428","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32233","15.049844","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32234","15.049851","172.30.1.205","172.30.1.104","TCP","54","44944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32235","15.051667","172.30.1.205","172.30.1.104","TCP","54","44944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32236","15.051784","172.30.1.205","172.30.1.104","TCP","74","37582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918278 TSecr=0 WS=128" +"32237","15.051937","172.30.1.104","172.30.1.205","TCP","54","135 > 44944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32238","15.051961","172.30.1.104","172.30.1.205","TCP","54","135 > 44944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32239","15.051967","172.30.1.205","172.30.1.104","TCP","54","44944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32240","15.052051","172.30.1.104","172.30.1.205","TCP","66","49671 > 37582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32241","15.052060","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32242","15.052414","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32243","15.053641","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32244","15.053651","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32245","15.055530","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32246","15.055892","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32247","15.055898","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32248","15.057320","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32249","15.060125","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32250","15.060134","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32251","15.061099","172.30.1.205","172.30.1.104","TCP","74","44948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918287 TSecr=0 WS=128" +"32252","15.061396","172.30.1.104","172.30.1.205","TCP","66","135 > 44948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32253","15.061408","172.30.1.205","172.30.1.104","TCP","54","44948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32254","15.061767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32255","15.062061","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32256","15.062070","172.30.1.205","172.30.1.104","TCP","54","44948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32257","15.064307","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32258","15.064730","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32259","15.064737","172.30.1.205","172.30.1.104","TCP","54","44948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32260","15.066556","172.30.1.205","172.30.1.104","TCP","54","44948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32261","15.066680","172.30.1.205","172.30.1.104","TCP","74","37586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918293 TSecr=0 WS=128" +"32262","15.066853","172.30.1.104","172.30.1.205","TCP","54","135 > 44948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32263","15.066877","172.30.1.104","172.30.1.205","TCP","54","135 > 44948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32264","15.066882","172.30.1.205","172.30.1.104","TCP","54","44948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32265","15.066971","172.30.1.104","172.30.1.205","TCP","66","49671 > 37586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32266","15.066987","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32267","15.067603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32268","15.068766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32269","15.068784","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32270","15.070686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32271","15.071035","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32272","15.071042","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32273","15.072394","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32274","15.075119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32275","15.075129","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32276","15.076075","172.30.1.205","172.30.1.104","TCP","74","44952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918302 TSecr=0 WS=128" +"32277","15.076408","172.30.1.104","172.30.1.205","TCP","66","135 > 44952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32278","15.076419","172.30.1.205","172.30.1.104","TCP","54","44952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32279","15.076767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32280","15.077063","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32281","15.077072","172.30.1.205","172.30.1.104","TCP","54","44952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32282","15.079254","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32283","15.079633","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32284","15.079640","172.30.1.205","172.30.1.104","TCP","54","44952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32285","15.081472","172.30.1.205","172.30.1.104","TCP","54","44952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32286","15.081585","172.30.1.205","172.30.1.104","TCP","74","37590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918308 TSecr=0 WS=128" +"32287","15.081749","172.30.1.104","172.30.1.205","TCP","54","135 > 44952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32288","15.081794","172.30.1.104","172.30.1.205","TCP","54","135 > 44952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32289","15.081800","172.30.1.205","172.30.1.104","TCP","54","44952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32290","15.081894","172.30.1.104","172.30.1.205","TCP","66","49671 > 37590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32291","15.081902","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32292","15.082246","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32293","15.082519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32294","15.082527","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32295","15.084404","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32296","15.084803","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32297","15.084810","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32298","15.086167","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32299","15.088750","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32300","15.088759","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32301","15.089721","172.30.1.205","172.30.1.104","TCP","74","44956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918316 TSecr=0 WS=128" +"32302","15.090080","172.30.1.104","172.30.1.205","TCP","66","135 > 44956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32303","15.090091","172.30.1.205","172.30.1.104","TCP","54","44956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32304","15.090439","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32305","15.090739","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32306","15.090748","172.30.1.205","172.30.1.104","TCP","54","44956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32307","15.092952","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32308","15.093343","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32309","15.093350","172.30.1.205","172.30.1.104","TCP","54","44956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32310","15.095159","172.30.1.205","172.30.1.104","TCP","54","44956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32311","15.095272","172.30.1.205","172.30.1.104","TCP","74","37594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918321 TSecr=0 WS=128" +"32312","15.095437","172.30.1.104","172.30.1.205","TCP","54","135 > 44956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32313","15.095461","172.30.1.104","172.30.1.205","TCP","54","135 > 44956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32314","15.095466","172.30.1.205","172.30.1.104","TCP","54","44956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32315","15.095548","172.30.1.104","172.30.1.205","TCP","66","49671 > 37594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32316","15.095557","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32317","15.095902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32318","15.097778","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32319","15.097803","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32320","15.099666","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32321","15.100033","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32322","15.100040","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32323","15.101425","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32324","15.104056","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32325","15.104074","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32326","15.105257","172.30.1.205","172.30.1.104","TCP","74","44960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918331 TSecr=0 WS=128" +"32327","15.105619","172.30.1.104","172.30.1.205","TCP","66","135 > 44960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32328","15.105630","172.30.1.205","172.30.1.104","TCP","54","44960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32329","15.105984","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32330","15.106293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32331","15.106303","172.30.1.205","172.30.1.104","TCP","54","44960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32332","15.108494","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32333","15.108872","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32334","15.108879","172.30.1.205","172.30.1.104","TCP","54","44960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32335","15.110684","172.30.1.205","172.30.1.104","TCP","54","44960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32336","15.110796","172.30.1.205","172.30.1.104","TCP","74","37598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918337 TSecr=0 WS=128" +"32337","15.110936","172.30.1.104","172.30.1.205","TCP","54","135 > 44960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32338","15.110958","172.30.1.104","172.30.1.205","TCP","54","135 > 44960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32339","15.110965","172.30.1.205","172.30.1.104","TCP","54","44960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32340","15.111080","172.30.1.104","172.30.1.205","TCP","66","49671 > 37598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32341","15.111088","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32342","15.111438","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32343","15.111762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32344","15.111771","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32345","15.113703","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32346","15.114097","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32347","15.114102","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32348","15.115492","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32349","15.118153","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32350","15.118168","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32351","15.119189","172.30.1.205","172.30.1.104","TCP","74","44964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918345 TSecr=0 WS=128" +"32352","15.119507","172.30.1.104","172.30.1.205","TCP","66","135 > 44964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32353","15.119528","172.30.1.205","172.30.1.104","TCP","54","44964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32354","15.120136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32355","15.120438","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32356","15.120455","172.30.1.205","172.30.1.104","TCP","54","44964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32357","15.122977","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32358","15.123374","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32359","15.123381","172.30.1.205","172.30.1.104","TCP","54","44964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32360","15.125213","172.30.1.205","172.30.1.104","TCP","54","44964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32361","15.125324","172.30.1.205","172.30.1.104","TCP","74","37602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918351 TSecr=0 WS=128" +"32362","15.125475","172.30.1.104","172.30.1.205","TCP","54","135 > 44964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32363","15.125514","172.30.1.104","172.30.1.205","TCP","54","135 > 44964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32364","15.125519","172.30.1.205","172.30.1.104","TCP","54","44964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32365","15.125633","172.30.1.104","172.30.1.205","TCP","66","49671 > 37602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32366","15.125642","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32367","15.126002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32368","15.126290","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32369","15.126299","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32370","15.128159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32371","15.129349","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32372","15.129356","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32373","15.130715","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32374","15.133451","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32375","15.133460","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32376","15.134404","172.30.1.205","172.30.1.104","TCP","74","44968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918360 TSecr=0 WS=128" +"32377","15.134715","172.30.1.104","172.30.1.205","TCP","66","135 > 44968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32378","15.134726","172.30.1.205","172.30.1.104","TCP","54","44968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32379","15.135089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32380","15.135375","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32381","15.135384","172.30.1.205","172.30.1.104","TCP","54","44968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32382","15.137614","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32383","15.138021","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32384","15.138027","172.30.1.205","172.30.1.104","TCP","54","44968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32385","15.138903","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32386","15.138951","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32387","15.138989","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32388","15.139025","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32389","15.139053","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32390","15.139088","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32391","15.139116","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32392","15.139139","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32393","15.139156","172.30.1.104","172.30.1.205","TCP","54","49671 > 37558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32394","15.139186","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32395","15.139217","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32396","15.139244","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32397","15.139277","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32398","15.139551","172.30.1.104","172.30.1.205","TCP","54","49671 > 37562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32399","15.139572","172.30.1.104","172.30.1.205","TCP","54","49671 > 37562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32400","15.139589","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32401","15.139602","172.30.1.104","172.30.1.205","TCP","54","49671 > 37558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32402","15.139605","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32403","15.139634","172.30.1.104","172.30.1.205","TCP","54","49671 > 37566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32404","15.139659","172.30.1.104","172.30.1.205","TCP","54","49671 > 37570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32405","15.139685","172.30.1.104","172.30.1.205","TCP","54","49671 > 37570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32406","15.139689","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32407","15.139711","172.30.1.104","172.30.1.205","TCP","54","49671 > 37566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32408","15.139714","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32409","15.139738","172.30.1.104","172.30.1.205","TCP","54","49671 > 37574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32410","15.139765","172.30.1.104","172.30.1.205","TCP","54","49671 > 37578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32411","15.139790","172.30.1.104","172.30.1.205","TCP","54","49671 > 37574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32412","15.139794","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32413","15.139817","172.30.1.104","172.30.1.205","TCP","54","49671 > 37582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32414","15.139843","172.30.1.104","172.30.1.205","TCP","54","49671 > 37586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32415","15.139874","172.30.1.104","172.30.1.205","TCP","54","49671 > 37586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32416","15.139878","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32417","15.139899","172.30.1.104","172.30.1.205","TCP","54","49671 > 37578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32418","15.139902","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32419","15.139926","172.30.1.104","172.30.1.205","TCP","54","49671 > 37590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32420","15.139953","172.30.1.104","172.30.1.205","TCP","54","49671 > 37594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32421","15.139980","172.30.1.104","172.30.1.205","TCP","54","49671 > 37594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32422","15.139984","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32423","15.140006","172.30.1.104","172.30.1.205","TCP","54","49671 > 37598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32424","15.140033","172.30.1.104","172.30.1.205","TCP","54","49671 > 37598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32425","15.140037","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32426","15.140060","172.30.1.104","172.30.1.205","TCP","54","49671 > 37602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32427","15.140087","172.30.1.104","172.30.1.205","TCP","54","49671 > 37602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32428","15.140091","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32429","15.140113","172.30.1.104","172.30.1.205","TCP","54","49671 > 37582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32430","15.140116","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32431","15.140140","172.30.1.104","172.30.1.205","TCP","54","49671 > 37590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32432","15.140143","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32433","15.140948","172.30.1.205","172.30.1.104","TCP","54","44968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32434","15.141059","172.30.1.205","172.30.1.104","TCP","74","37606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918367 TSecr=0 WS=128" +"32435","15.141208","172.30.1.104","172.30.1.205","TCP","54","135 > 44968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32436","15.141232","172.30.1.104","172.30.1.205","TCP","54","135 > 44968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32437","15.141237","172.30.1.205","172.30.1.104","TCP","54","44968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32438","15.141358","172.30.1.104","172.30.1.205","TCP","66","49671 > 37606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32439","15.141366","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32440","15.141727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32441","15.142016","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32442","15.142025","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32443","15.143917","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32444","15.146107","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32445","15.146124","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32446","15.147537","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32447","15.150202","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32448","15.150212","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32449","15.151159","172.30.1.205","172.30.1.104","TCP","74","44972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918377 TSecr=0 WS=128" +"32450","15.151481","172.30.1.104","172.30.1.205","TCP","66","135 > 44972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32451","15.151492","172.30.1.205","172.30.1.104","TCP","54","44972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32452","15.151843","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32453","15.152133","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32454","15.152142","172.30.1.205","172.30.1.104","TCP","54","44972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32455","15.154353","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32456","15.154748","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32457","15.154755","172.30.1.205","172.30.1.104","TCP","54","44972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32458","15.156567","172.30.1.205","172.30.1.104","TCP","54","44972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32459","15.156679","172.30.1.205","172.30.1.104","TCP","74","37610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918383 TSecr=0 WS=128" +"32460","15.156844","172.30.1.104","172.30.1.205","TCP","54","135 > 44972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32461","15.156868","172.30.1.104","172.30.1.205","TCP","54","135 > 44972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32462","15.156874","172.30.1.205","172.30.1.104","TCP","54","44972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32463","15.156962","172.30.1.104","172.30.1.205","TCP","66","49671 > 37610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32464","15.156970","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32465","15.157327","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32466","15.157637","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32467","15.157646","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32468","15.159518","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32469","15.159913","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32470","15.159928","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32471","15.161574","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32472","15.164266","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32473","15.164277","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32474","15.165305","172.30.1.205","172.30.1.104","TCP","74","44976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918391 TSecr=0 WS=128" +"32475","15.165609","172.30.1.104","172.30.1.205","TCP","66","135 > 44976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32476","15.165621","172.30.1.205","172.30.1.104","TCP","54","44976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32477","15.165976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32478","15.166267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32479","15.166276","172.30.1.205","172.30.1.104","TCP","54","44976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32480","15.168508","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32481","15.168909","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32482","15.168916","172.30.1.205","172.30.1.104","TCP","54","44976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32483","15.170730","172.30.1.205","172.30.1.104","TCP","54","44976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32484","15.170856","172.30.1.205","172.30.1.104","TCP","74","37614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918397 TSecr=0 WS=128" +"32485","15.170996","172.30.1.104","172.30.1.205","TCP","54","135 > 44976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32486","15.171022","172.30.1.104","172.30.1.205","TCP","54","135 > 44976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32487","15.171037","172.30.1.205","172.30.1.104","TCP","54","44976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32488","15.171140","172.30.1.104","172.30.1.205","TCP","66","49671 > 37614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32489","15.171149","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32490","15.171498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32491","15.171814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32492","15.171823","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32493","15.173767","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32494","15.174131","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32495","15.174138","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32496","15.175502","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32497","15.178141","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32498","15.178156","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32499","15.179184","172.30.1.205","172.30.1.104","TCP","74","44980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918405 TSecr=0 WS=128" +"32500","15.179505","172.30.1.104","172.30.1.205","TCP","66","135 > 44980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32501","15.179517","172.30.1.205","172.30.1.104","TCP","54","44980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32502","15.179870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32503","15.180159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32504","15.180168","172.30.1.205","172.30.1.104","TCP","54","44980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32505","15.182423","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32506","15.182848","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32507","15.182854","172.30.1.205","172.30.1.104","TCP","54","44980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32508","15.184684","172.30.1.205","172.30.1.104","TCP","54","44980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32509","15.184822","172.30.1.205","172.30.1.104","TCP","74","37618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918411 TSecr=0 WS=128" +"32510","15.184958","172.30.1.104","172.30.1.205","TCP","54","135 > 44980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32511","15.184982","172.30.1.104","172.30.1.205","TCP","54","135 > 44980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32512","15.184989","172.30.1.205","172.30.1.104","TCP","54","44980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32513","15.185122","172.30.1.104","172.30.1.205","TCP","66","49671 > 37618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32514","15.185131","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32515","15.185479","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32516","15.185774","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32517","15.185781","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32518","15.187652","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32519","15.188044","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32520","15.188050","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32521","15.189446","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32522","15.192157","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32523","15.192166","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32524","15.193129","172.30.1.205","172.30.1.104","TCP","74","44984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918419 TSecr=0 WS=128" +"32525","15.193453","172.30.1.104","172.30.1.205","TCP","66","135 > 44984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32526","15.193464","172.30.1.205","172.30.1.104","TCP","54","44984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32527","15.193818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32528","15.194267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32529","15.194276","172.30.1.205","172.30.1.104","TCP","54","44984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32530","15.196451","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32531","15.196863","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32532","15.196870","172.30.1.205","172.30.1.104","TCP","54","44984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32533","15.198677","172.30.1.205","172.30.1.104","TCP","54","44984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32534","15.198789","172.30.1.205","172.30.1.104","TCP","74","37622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918425 TSecr=0 WS=128" +"32535","15.198945","172.30.1.104","172.30.1.205","TCP","54","135 > 44984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32536","15.198998","172.30.1.104","172.30.1.205","TCP","54","135 > 44984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32537","15.199004","172.30.1.205","172.30.1.104","TCP","54","44984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32538","15.199084","172.30.1.104","172.30.1.205","TCP","66","49671 > 37622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32539","15.199092","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32540","15.199467","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32541","15.199757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32542","15.199766","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32543","15.201663","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32544","15.202041","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32545","15.202047","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32546","15.203397","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32547","15.206197","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32548","15.206206","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32549","15.207169","172.30.1.205","172.30.1.104","TCP","74","44988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918433 TSecr=0 WS=128" +"32550","15.207496","172.30.1.104","172.30.1.205","TCP","66","135 > 44988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32551","15.207507","172.30.1.205","172.30.1.104","TCP","54","44988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32552","15.207859","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32553","15.208149","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32554","15.208158","172.30.1.205","172.30.1.104","TCP","54","44988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32555","15.210399","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32556","15.210811","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32557","15.210818","172.30.1.205","172.30.1.104","TCP","54","44988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32558","15.212647","172.30.1.205","172.30.1.104","TCP","54","44988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32559","15.212761","172.30.1.205","172.30.1.104","TCP","74","37626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918439 TSecr=0 WS=128" +"32560","15.212937","172.30.1.104","172.30.1.205","TCP","54","135 > 44988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32561","15.212962","172.30.1.104","172.30.1.205","TCP","54","135 > 44988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32562","15.212969","172.30.1.205","172.30.1.104","TCP","54","44988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32563","15.213063","172.30.1.104","172.30.1.205","TCP","66","49671 > 37626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32564","15.213070","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32565","15.213420","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32566","15.213732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32567","15.213740","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32568","15.215609","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32569","15.216005","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32570","15.216012","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32571","15.217411","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32572","15.220180","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32573","15.220189","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32574","15.221176","172.30.1.205","172.30.1.104","TCP","74","44992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918447 TSecr=0 WS=128" +"32575","15.221506","172.30.1.104","172.30.1.205","TCP","66","135 > 44992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32576","15.221517","172.30.1.205","172.30.1.104","TCP","54","44992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32577","15.221869","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32578","15.222182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32579","15.222191","172.30.1.205","172.30.1.104","TCP","54","44992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32580","15.224400","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32581","15.224844","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32582","15.224851","172.30.1.205","172.30.1.104","TCP","54","44992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32583","15.226698","172.30.1.205","172.30.1.104","TCP","54","44992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32584","15.226813","172.30.1.205","172.30.1.104","TCP","74","37630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918453 TSecr=0 WS=128" +"32585","15.226963","172.30.1.104","172.30.1.205","TCP","54","135 > 44992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32586","15.226987","172.30.1.104","172.30.1.205","TCP","54","135 > 44992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32587","15.226993","172.30.1.205","172.30.1.104","TCP","54","44992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32588","15.227158","172.30.1.104","172.30.1.205","TCP","66","49671 > 37630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32589","15.227166","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32590","15.227522","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32591","15.227820","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32592","15.227829","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32593","15.229734","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32594","15.230134","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32595","15.230141","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32596","15.231502","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32597","15.234310","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32598","15.234320","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32599","15.235273","172.30.1.205","172.30.1.104","TCP","74","44996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918461 TSecr=0 WS=128" +"32600","15.235604","172.30.1.104","172.30.1.205","TCP","66","135 > 44996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32601","15.235614","172.30.1.205","172.30.1.104","TCP","54","44996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32602","15.235966","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32603","15.236326","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32604","15.236335","172.30.1.205","172.30.1.104","TCP","54","44996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32605","15.238566","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32606","15.238994","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32607","15.239001","172.30.1.205","172.30.1.104","TCP","54","44996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32608","15.240831","172.30.1.205","172.30.1.104","TCP","54","44996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32609","15.240944","172.30.1.205","172.30.1.104","TCP","74","37634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918467 TSecr=0 WS=128" +"32610","15.241108","172.30.1.104","172.30.1.205","TCP","54","135 > 44996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32611","15.241133","172.30.1.104","172.30.1.205","TCP","54","135 > 44996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32612","15.241138","172.30.1.205","172.30.1.104","TCP","54","44996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32613","15.241256","172.30.1.104","172.30.1.205","TCP","66","49671 > 37634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32614","15.241264","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32615","15.241616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32616","15.242907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32617","15.242918","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32618","15.245111","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32619","15.245540","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32620","15.245547","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32621","15.246910","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32622","15.249748","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32623","15.249759","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32624","15.250733","172.30.1.205","172.30.1.104","TCP","74","45000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918477 TSecr=0 WS=128" +"32625","15.251050","172.30.1.104","172.30.1.205","TCP","66","135 > 45000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32626","15.251062","172.30.1.205","172.30.1.104","TCP","54","45000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32627","15.251415","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32628","15.251720","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32629","15.251729","172.30.1.205","172.30.1.104","TCP","54","45000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32630","15.253949","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32631","15.254368","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32632","15.254380","172.30.1.205","172.30.1.104","TCP","54","45000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32633","15.256203","172.30.1.205","172.30.1.104","TCP","54","45000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32634","15.256318","172.30.1.205","172.30.1.104","TCP","74","37638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918482 TSecr=0 WS=128" +"32635","15.256479","172.30.1.104","172.30.1.205","TCP","54","135 > 45000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32636","15.256507","172.30.1.104","172.30.1.205","TCP","54","135 > 45000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32637","15.256513","172.30.1.205","172.30.1.104","TCP","54","45000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32638","15.256637","172.30.1.104","172.30.1.205","TCP","66","49671 > 37638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32639","15.256646","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32640","15.257025","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32641","15.257361","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32642","15.257371","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32643","15.259248","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32644","15.259664","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32645","15.259671","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32646","15.261060","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32647","15.263920","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32648","15.263932","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32649","15.264932","172.30.1.205","172.30.1.104","TCP","74","45004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918491 TSecr=0 WS=128" +"32650","15.265243","172.30.1.104","172.30.1.205","TCP","66","135 > 45004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32651","15.265254","172.30.1.205","172.30.1.104","TCP","54","45004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32652","15.265617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32653","15.265916","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32654","15.265926","172.30.1.205","172.30.1.104","TCP","54","45004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32655","15.268125","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32656","15.268551","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32657","15.268557","172.30.1.205","172.30.1.104","TCP","54","45004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32658","15.270402","172.30.1.205","172.30.1.104","TCP","54","45004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32659","15.270515","172.30.1.205","172.30.1.104","TCP","74","37642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918496 TSecr=0 WS=128" +"32660","15.270673","172.30.1.104","172.30.1.205","TCP","54","135 > 45004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32661","15.270684","172.30.1.104","172.30.1.205","TCP","54","135 > 45004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32662","15.270690","172.30.1.205","172.30.1.104","TCP","54","45004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32663","15.270786","172.30.1.104","172.30.1.205","TCP","66","49671 > 37642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32664","15.270795","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32665","15.271145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32666","15.271428","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32667","15.271437","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32668","15.273353","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32669","15.273731","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32670","15.273742","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32671","15.275331","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32672","15.278046","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32673","15.278056","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32674","15.279025","172.30.1.205","172.30.1.104","TCP","74","45008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918505 TSecr=0 WS=128" +"32675","15.279382","172.30.1.104","172.30.1.205","TCP","66","135 > 45008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32676","15.279395","172.30.1.205","172.30.1.104","TCP","54","45008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32677","15.279755","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32678","15.280036","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32679","15.280045","172.30.1.205","172.30.1.104","TCP","54","45008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32680","15.282270","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32681","15.282673","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32682","15.282686","172.30.1.205","172.30.1.104","TCP","54","45008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32683","15.284654","172.30.1.205","172.30.1.104","TCP","54","45008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32684","15.284768","172.30.1.205","172.30.1.104","TCP","74","37646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918511 TSecr=0 WS=128" +"32685","15.284976","172.30.1.104","172.30.1.205","TCP","54","135 > 45008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32686","15.284984","172.30.1.104","172.30.1.205","TCP","54","135 > 45008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32687","15.284989","172.30.1.205","172.30.1.104","TCP","54","45008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32688","15.285101","172.30.1.104","172.30.1.205","TCP","66","49671 > 37646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32689","15.285109","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32690","15.285460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32691","15.285758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32692","15.285767","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32693","15.287657","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32694","15.288025","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32695","15.288031","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32696","15.289415","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32697","15.292142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32698","15.292165","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32699","15.293279","172.30.1.205","172.30.1.104","TCP","74","45012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918519 TSecr=0 WS=128" +"32700","15.293623","172.30.1.104","172.30.1.205","TCP","66","135 > 45012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32701","15.293634","172.30.1.205","172.30.1.104","TCP","54","45012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32702","15.293988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32703","15.294311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32704","15.294329","172.30.1.205","172.30.1.104","TCP","54","45012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32705","15.296812","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32706","15.297220","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32707","15.297227","172.30.1.205","172.30.1.104","TCP","54","45012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32708","15.299036","172.30.1.205","172.30.1.104","TCP","54","45012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32709","15.299148","172.30.1.205","172.30.1.104","TCP","74","37650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918525 TSecr=0 WS=128" +"32710","15.299343","172.30.1.104","172.30.1.205","TCP","54","135 > 45012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32711","15.299352","172.30.1.104","172.30.1.205","TCP","54","135 > 45012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32712","15.299357","172.30.1.205","172.30.1.104","TCP","54","45012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32713","15.299444","172.30.1.104","172.30.1.205","TCP","66","49671 > 37650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32714","15.299452","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32715","15.299795","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32716","15.300092","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32717","15.300100","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32718","15.301989","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32719","15.302357","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32720","15.302362","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32721","15.303704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32722","15.306340","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32723","15.306351","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32724","15.307301","172.30.1.205","172.30.1.104","TCP","74","45016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918533 TSecr=0 WS=128" +"32725","15.307604","172.30.1.104","172.30.1.205","TCP","66","135 > 45016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32726","15.307615","172.30.1.205","172.30.1.104","TCP","54","45016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32727","15.307995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32728","15.308271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32729","15.308280","172.30.1.205","172.30.1.104","TCP","54","45016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32730","15.310476","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32731","15.310853","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32732","15.310859","172.30.1.205","172.30.1.104","TCP","54","45016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32733","15.311704","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32734","15.311754","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32735","15.311786","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32736","15.311821","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32737","15.311854","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32738","15.311885","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32739","15.311918","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32740","15.311950","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32741","15.311977","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32742","15.312004","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32743","15.312030","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32744","15.312094","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32745","15.312330","172.30.1.104","172.30.1.205","TCP","54","49671 > 37610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32746","15.312339","172.30.1.104","172.30.1.205","TCP","54","49671 > 37614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32747","15.312343","172.30.1.104","172.30.1.205","TCP","54","49671 > 37618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32748","15.312345","172.30.1.104","172.30.1.205","TCP","54","49671 > 37610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32749","15.312351","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32750","15.312358","172.30.1.104","172.30.1.205","TCP","54","49671 > 37622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32751","15.312361","172.30.1.104","172.30.1.205","TCP","54","49671 > 37626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32752","15.312364","172.30.1.104","172.30.1.205","TCP","54","49671 > 37614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32753","15.312367","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32754","15.312372","172.30.1.104","172.30.1.205","TCP","54","49671 > 37630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32755","15.312375","172.30.1.104","172.30.1.205","TCP","54","49671 > 37630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32756","15.312377","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32757","15.312378","172.30.1.104","172.30.1.205","TCP","54","49671 > 37626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32758","15.312380","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32759","15.312381","172.30.1.104","172.30.1.205","TCP","54","49671 > 37618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32760","15.312383","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32761","15.312385","172.30.1.104","172.30.1.205","TCP","54","49671 > 37622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32762","15.312386","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32763","15.312594","172.30.1.104","172.30.1.205","TCP","54","49671 > 37634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32764","15.312601","172.30.1.104","172.30.1.205","TCP","54","49671 > 37638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32765","15.312603","172.30.1.104","172.30.1.205","TCP","54","49671 > 37642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32766","15.312605","172.30.1.104","172.30.1.205","TCP","54","49671 > 37634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32767","15.312610","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32768","15.312616","172.30.1.104","172.30.1.205","TCP","54","49671 > 37638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32769","15.312618","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32770","15.312619","172.30.1.104","172.30.1.205","TCP","54","49671 > 37642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32771","15.312621","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32772","15.312831","172.30.1.104","172.30.1.205","TCP","54","49671 > 37646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32773","15.312837","172.30.1.104","172.30.1.205","TCP","54","49671 > 37650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32774","15.312840","172.30.1.104","172.30.1.205","TCP","54","49671 > 37606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32775","15.312843","172.30.1.104","172.30.1.205","TCP","54","49671 > 37646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32776","15.312847","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32777","15.312853","172.30.1.104","172.30.1.205","TCP","54","49671 > 37650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32778","15.312855","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32779","15.312857","172.30.1.104","172.30.1.205","TCP","54","49671 > 37606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"32780","15.312858","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"32781","15.313579","172.30.1.205","172.30.1.104","TCP","54","45016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32782","15.313691","172.30.1.205","172.30.1.104","TCP","74","37654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918540 TSecr=0 WS=128" +"32783","15.313811","172.30.1.104","172.30.1.205","TCP","54","135 > 45016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32784","15.313853","172.30.1.104","172.30.1.205","TCP","54","135 > 45016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32785","15.313858","172.30.1.205","172.30.1.104","TCP","54","45016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32786","15.313965","172.30.1.104","172.30.1.205","TCP","66","49671 > 37654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32787","15.313974","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32788","15.314329","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32789","15.314614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32790","15.314623","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32791","15.316497","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32792","15.316889","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32793","15.316896","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32794","15.318262","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32795","15.320893","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32796","15.320902","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32797","15.321851","172.30.1.205","172.30.1.104","TCP","74","45020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918548 TSecr=0 WS=128" +"32798","15.322148","172.30.1.104","172.30.1.205","TCP","66","135 > 45020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32799","15.322159","172.30.1.205","172.30.1.104","TCP","54","45020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32800","15.322513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32801","15.322783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32802","15.322792","172.30.1.205","172.30.1.104","TCP","54","45020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32803","15.324991","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32804","15.325390","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32805","15.325397","172.30.1.205","172.30.1.104","TCP","54","45020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32806","15.327211","172.30.1.205","172.30.1.104","TCP","54","45020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32807","15.327323","172.30.1.205","172.30.1.104","TCP","74","37658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918553 TSecr=0 WS=128" +"32808","15.327516","172.30.1.104","172.30.1.205","TCP","54","135 > 45020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32809","15.327525","172.30.1.104","172.30.1.205","TCP","54","135 > 45020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32810","15.327530","172.30.1.205","172.30.1.104","TCP","54","45020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32811","15.327618","172.30.1.104","172.30.1.205","TCP","66","49671 > 37658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32812","15.327635","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32813","15.328037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32814","15.329220","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32815","15.329236","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32816","15.331316","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32817","15.331724","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32818","15.331730","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32819","15.333134","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32820","15.335863","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32821","15.335874","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32822","15.336866","172.30.1.205","172.30.1.104","TCP","74","45024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918563 TSecr=0 WS=128" +"32823","15.337174","172.30.1.104","172.30.1.205","TCP","66","135 > 45024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32824","15.337188","172.30.1.205","172.30.1.104","TCP","54","45024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32825","15.337575","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32826","15.337856","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32827","15.337865","172.30.1.205","172.30.1.104","TCP","54","45024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32828","15.340073","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32829","15.340463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32830","15.340469","172.30.1.205","172.30.1.104","TCP","54","45024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32831","15.342296","172.30.1.205","172.30.1.104","TCP","54","45024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32832","15.342410","172.30.1.205","172.30.1.104","TCP","74","37662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918568 TSecr=0 WS=128" +"32833","15.342565","172.30.1.104","172.30.1.205","TCP","54","135 > 45024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32834","15.342612","172.30.1.104","172.30.1.205","TCP","54","135 > 45024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32835","15.342617","172.30.1.205","172.30.1.104","TCP","54","45024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32836","15.342684","172.30.1.104","172.30.1.205","TCP","66","49671 > 37662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32837","15.342693","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32838","15.343067","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32839","15.343334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32840","15.343343","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32841","15.345248","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32842","15.345606","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32843","15.345612","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32844","15.346965","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32845","15.349725","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32846","15.349735","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32847","15.350693","172.30.1.205","172.30.1.104","TCP","74","45028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918577 TSecr=0 WS=128" +"32848","15.350997","172.30.1.104","172.30.1.205","TCP","66","135 > 45028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32849","15.351008","172.30.1.205","172.30.1.104","TCP","54","45028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32850","15.351358","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32851","15.351644","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32852","15.351653","172.30.1.205","172.30.1.104","TCP","54","45028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32853","15.353890","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32854","15.354284","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32855","15.354291","172.30.1.205","172.30.1.104","TCP","54","45028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32856","15.356119","172.30.1.205","172.30.1.104","TCP","54","45028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32857","15.356249","172.30.1.205","172.30.1.104","TCP","74","37666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918582 TSecr=0 WS=128" +"32858","15.356409","172.30.1.104","172.30.1.205","TCP","54","135 > 45028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32859","15.356443","172.30.1.104","172.30.1.205","TCP","54","135 > 45028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32860","15.356449","172.30.1.205","172.30.1.104","TCP","54","45028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32861","15.356519","172.30.1.104","172.30.1.205","TCP","66","49671 > 37666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32862","15.356527","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32863","15.356907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32864","15.357222","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32865","15.357231","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32866","15.359137","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32867","15.359506","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32868","15.359513","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32869","15.360907","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32870","15.363583","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32871","15.363595","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32872","15.364621","172.30.1.205","172.30.1.104","TCP","74","45032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918591 TSecr=0 WS=128" +"32873","15.364947","172.30.1.104","172.30.1.205","TCP","66","135 > 45032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32874","15.364959","172.30.1.205","172.30.1.104","TCP","54","45032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32875","15.365321","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32876","15.365611","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32877","15.365620","172.30.1.205","172.30.1.104","TCP","54","45032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32878","15.367836","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32879","15.368236","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32880","15.368243","172.30.1.205","172.30.1.104","TCP","54","45032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32881","15.370090","172.30.1.205","172.30.1.104","TCP","54","45032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32882","15.370214","172.30.1.205","172.30.1.104","TCP","74","37670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918596 TSecr=0 WS=128" +"32883","15.370370","172.30.1.104","172.30.1.205","TCP","54","135 > 45032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32884","15.370383","172.30.1.104","172.30.1.205","TCP","54","135 > 45032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32885","15.370390","172.30.1.205","172.30.1.104","TCP","54","45032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32886","15.370483","172.30.1.104","172.30.1.205","TCP","66","49671 > 37670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32887","15.370491","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32888","15.370849","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32889","15.371132","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32890","15.371141","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32891","15.373058","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32892","15.373412","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32893","15.373418","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32894","15.374778","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32895","15.377439","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32896","15.377448","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32897","15.378414","172.30.1.205","172.30.1.104","TCP","74","45036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918604 TSecr=0 WS=128" +"32898","15.378715","172.30.1.104","172.30.1.205","TCP","66","135 > 45036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32899","15.378726","172.30.1.205","172.30.1.104","TCP","54","45036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32900","15.379080","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32901","15.379368","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32902","15.379379","172.30.1.205","172.30.1.104","TCP","54","45036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32903","15.381621","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32904","15.382050","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32905","15.382056","172.30.1.205","172.30.1.104","TCP","54","45036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32906","15.383866","172.30.1.205","172.30.1.104","TCP","54","45036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32907","15.383984","172.30.1.205","172.30.1.104","TCP","74","37674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918610 TSecr=0 WS=128" +"32908","15.384127","172.30.1.104","172.30.1.205","TCP","54","135 > 45036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32909","15.384138","172.30.1.104","172.30.1.205","TCP","54","135 > 45036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32910","15.384144","172.30.1.205","172.30.1.104","TCP","54","45036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32911","15.384275","172.30.1.104","172.30.1.205","TCP","66","49671 > 37674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32912","15.384293","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32913","15.384706","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32914","15.385048","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32915","15.385057","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32916","15.386992","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32917","15.387374","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32918","15.387381","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32919","15.388756","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32920","15.391494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32921","15.391507","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32922","15.392489","172.30.1.205","172.30.1.104","TCP","74","45040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918618 TSecr=0 WS=128" +"32923","15.392769","172.30.1.104","172.30.1.205","TCP","66","135 > 45040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32924","15.392791","172.30.1.205","172.30.1.104","TCP","54","45040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32925","15.393155","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32926","15.393426","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32927","15.393435","172.30.1.205","172.30.1.104","TCP","54","45040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32928","15.395645","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32929","15.396020","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32930","15.396027","172.30.1.205","172.30.1.104","TCP","54","45040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32931","15.397878","172.30.1.205","172.30.1.104","TCP","54","45040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32932","15.397999","172.30.1.205","172.30.1.104","TCP","74","37678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918624 TSecr=0 WS=128" +"32933","15.398133","172.30.1.104","172.30.1.205","TCP","54","135 > 45040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32934","15.398145","172.30.1.104","172.30.1.205","TCP","54","135 > 45040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32935","15.398152","172.30.1.205","172.30.1.104","TCP","54","45040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32936","15.398305","172.30.1.104","172.30.1.205","TCP","66","49671 > 37678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32937","15.398314","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32938","15.398664","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32939","15.399235","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32940","15.399243","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32941","15.401152","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32942","15.401496","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32943","15.401503","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32944","15.402864","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32945","15.405503","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32946","15.405512","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32947","15.406507","172.30.1.205","172.30.1.104","TCP","74","45044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918632 TSecr=0 WS=128" +"32948","15.406809","172.30.1.104","172.30.1.205","TCP","66","135 > 45044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32949","15.406820","172.30.1.205","172.30.1.104","TCP","54","45044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32950","15.407168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32951","15.407488","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32952","15.407497","172.30.1.205","172.30.1.104","TCP","54","45044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32953","15.409749","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32954","15.410130","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32955","15.410137","172.30.1.205","172.30.1.104","TCP","54","45044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32956","15.411946","172.30.1.205","172.30.1.104","TCP","54","45044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32957","15.412061","172.30.1.205","172.30.1.104","TCP","74","37682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918638 TSecr=0 WS=128" +"32958","15.412231","172.30.1.104","172.30.1.205","TCP","54","135 > 45044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32959","15.412308","172.30.1.104","172.30.1.205","TCP","54","135 > 45044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32960","15.412314","172.30.1.205","172.30.1.104","TCP","54","45044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32961","15.412339","172.30.1.104","172.30.1.205","TCP","66","49671 > 37682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32962","15.412347","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32963","15.412699","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32964","15.412989","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32965","15.412999","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32966","15.414899","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32967","15.415245","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32968","15.415251","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32969","15.416623","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32970","15.419334","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32971","15.419345","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32972","15.420333","172.30.1.205","172.30.1.104","TCP","74","45048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918646 TSecr=0 WS=128" +"32973","15.420592","172.30.1.104","172.30.1.205","TCP","66","135 > 45048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32974","15.420603","172.30.1.205","172.30.1.104","TCP","54","45048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32975","15.420986","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"32976","15.421246","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32977","15.421255","172.30.1.205","172.30.1.104","TCP","54","45048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32978","15.423442","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"32979","15.423808","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"32980","15.423815","172.30.1.205","172.30.1.104","TCP","54","45048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32981","15.425653","172.30.1.205","172.30.1.104","TCP","54","45048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"32982","15.425768","172.30.1.205","172.30.1.104","TCP","74","37686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918652 TSecr=0 WS=128" +"32983","15.425893","172.30.1.104","172.30.1.205","TCP","54","135 > 45048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32984","15.425932","172.30.1.104","172.30.1.205","TCP","54","135 > 45048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"32985","15.425938","172.30.1.205","172.30.1.104","TCP","54","45048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"32986","15.426028","172.30.1.104","172.30.1.205","TCP","66","49671 > 37686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32987","15.426036","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"32988","15.426399","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"32989","15.426714","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"32990","15.426722","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"32991","15.428582","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"32992","15.428936","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"32993","15.428943","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"32994","15.430310","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"32995","15.432866","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"32996","15.432875","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"32997","15.433857","172.30.1.205","172.30.1.104","TCP","74","45052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918660 TSecr=0 WS=128" +"32998","15.434173","172.30.1.104","172.30.1.205","TCP","66","135 > 45052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"32999","15.434184","172.30.1.205","172.30.1.104","TCP","54","45052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33000","15.434533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33001","15.434834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33002","15.434843","172.30.1.205","172.30.1.104","TCP","54","45052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33003","15.437057","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33004","15.437517","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33005","15.437524","172.30.1.205","172.30.1.104","TCP","54","45052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33006","15.439375","172.30.1.205","172.30.1.104","TCP","54","45052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33007","15.439492","172.30.1.205","172.30.1.104","TCP","74","37690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918665 TSecr=0 WS=128" +"33008","15.439635","172.30.1.104","172.30.1.205","TCP","54","135 > 45052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33009","15.439647","172.30.1.104","172.30.1.205","TCP","54","135 > 45052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33010","15.439653","172.30.1.205","172.30.1.104","TCP","54","45052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33011","15.439760","172.30.1.104","172.30.1.205","TCP","66","49671 > 37690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33012","15.439769","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33013","15.440137","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33014","15.440404","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33015","15.440413","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33016","15.442313","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33017","15.442711","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33018","15.442718","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33019","15.444067","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33020","15.446848","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33021","15.446858","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33022","15.447822","172.30.1.205","172.30.1.104","TCP","74","45056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918674 TSecr=0 WS=128" +"33023","15.448121","172.30.1.104","172.30.1.205","TCP","66","135 > 45056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33024","15.448132","172.30.1.205","172.30.1.104","TCP","54","45056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33025","15.448486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33026","15.448770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33027","15.448788","172.30.1.205","172.30.1.104","TCP","54","45056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33028","15.450994","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33029","15.453774","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33030","15.453780","172.30.1.205","172.30.1.104","TCP","54","45056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33031","15.455622","172.30.1.205","172.30.1.104","TCP","54","45056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33032","15.455738","172.30.1.205","172.30.1.104","TCP","74","37694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918682 TSecr=0 WS=128" +"33033","15.455900","172.30.1.104","172.30.1.205","TCP","54","135 > 45056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33034","15.455934","172.30.1.104","172.30.1.205","TCP","54","135 > 45056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33035","15.455941","172.30.1.205","172.30.1.104","TCP","54","45056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33036","15.456019","172.30.1.104","172.30.1.205","TCP","66","49671 > 37694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33037","15.456027","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33038","15.456381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33039","15.456698","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33040","15.456707","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33041","15.458603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33042","15.458969","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33043","15.458976","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33044","15.460333","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33045","15.463153","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33046","15.463164","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33047","15.464161","172.30.1.205","172.30.1.104","TCP","74","45060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918690 TSecr=0 WS=128" +"33048","15.464524","172.30.1.104","172.30.1.205","TCP","66","135 > 45060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33049","15.464535","172.30.1.205","172.30.1.104","TCP","54","45060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33050","15.464922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33051","15.465272","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33052","15.465281","172.30.1.205","172.30.1.104","TCP","54","45060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33053","15.467485","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33054","15.467913","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33055","15.467920","172.30.1.205","172.30.1.104","TCP","54","45060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33056","15.469783","172.30.1.205","172.30.1.104","TCP","54","45060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33057","15.469900","172.30.1.205","172.30.1.104","TCP","74","37698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918696 TSecr=0 WS=128" +"33058","15.470127","172.30.1.104","172.30.1.205","TCP","54","135 > 45060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33059","15.470137","172.30.1.104","172.30.1.205","TCP","54","135 > 45060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33060","15.470144","172.30.1.205","172.30.1.104","TCP","54","45060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33061","15.470248","172.30.1.104","172.30.1.205","TCP","66","49671 > 37698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33062","15.470256","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33063","15.470602","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33064","15.470898","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33065","15.470907","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33066","15.472827","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33067","15.473222","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33068","15.473227","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33069","15.474590","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33070","15.477435","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33071","15.477445","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33072","15.478456","172.30.1.205","172.30.1.104","TCP","74","45064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918704 TSecr=0 WS=128" +"33073","15.478774","172.30.1.104","172.30.1.205","TCP","66","135 > 45064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33074","15.478786","172.30.1.205","172.30.1.104","TCP","54","45064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33075","15.479164","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33076","15.479462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33077","15.479470","172.30.1.205","172.30.1.104","TCP","54","45064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33078","15.481706","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33079","15.482103","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33080","15.482110","172.30.1.205","172.30.1.104","TCP","54","45064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33081","15.482975","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33082","15.483026","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33083","15.483064","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33084","15.483092","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33085","15.483121","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33086","15.483153","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33087","15.483180","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33088","15.483208","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33089","15.483235","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33090","15.483262","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33091","15.483289","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33092","15.483358","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33093","15.483389","172.30.1.104","172.30.1.205","TCP","54","49671 > 37658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33094","15.483417","172.30.1.104","172.30.1.205","TCP","54","49671 > 37662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33095","15.483437","172.30.1.104","172.30.1.205","TCP","54","49671 > 37658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33096","15.483445","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33097","15.483457","172.30.1.104","172.30.1.205","TCP","54","49671 > 37666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33098","15.483478","172.30.1.104","172.30.1.205","TCP","54","49671 > 37670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33099","15.483500","172.30.1.104","172.30.1.205","TCP","54","49671 > 37674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33100","15.483522","172.30.1.104","172.30.1.205","TCP","54","49671 > 37674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33101","15.483527","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33102","15.483540","172.30.1.104","172.30.1.205","TCP","54","49671 > 37678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33103","15.483656","172.30.1.104","172.30.1.205","TCP","54","49671 > 37682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33104","15.483687","172.30.1.104","172.30.1.205","TCP","54","49671 > 37670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33105","15.483692","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33106","15.483708","172.30.1.104","172.30.1.205","TCP","54","49671 > 37682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33107","15.483711","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33108","15.483732","172.30.1.104","172.30.1.205","TCP","54","49671 > 37678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33109","15.483736","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33110","15.483765","172.30.1.104","172.30.1.205","TCP","54","49671 > 37662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33111","15.483769","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33112","15.483795","172.30.1.104","172.30.1.205","TCP","54","49671 > 37666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33113","15.483798","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33114","15.483822","172.30.1.104","172.30.1.205","TCP","54","49671 > 37686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33115","15.483853","172.30.1.104","172.30.1.205","TCP","54","49671 > 37690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33116","15.483878","172.30.1.104","172.30.1.205","TCP","54","49671 > 37694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33117","15.484045","172.30.1.104","172.30.1.205","TCP","54","49671 > 37686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33118","15.484050","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33119","15.484077","172.30.1.104","172.30.1.205","TCP","54","49671 > 37698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33120","15.484097","172.30.1.104","172.30.1.205","TCP","54","49671 > 37698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33121","15.484101","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33122","15.484119","172.30.1.104","172.30.1.205","TCP","54","49671 > 37690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33123","15.484123","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33124","15.484144","172.30.1.104","172.30.1.205","TCP","54","49671 > 37694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33125","15.484148","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33126","15.484170","172.30.1.104","172.30.1.205","TCP","54","49671 > 37654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33127","15.484262","172.30.1.104","172.30.1.205","TCP","54","49671 > 37654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33128","15.484266","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33129","15.485017","172.30.1.205","172.30.1.104","TCP","54","45064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33130","15.485143","172.30.1.205","172.30.1.104","TCP","74","37702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918711 TSecr=0 WS=128" +"33131","15.485281","172.30.1.104","172.30.1.205","TCP","54","135 > 45064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33132","15.485301","172.30.1.104","172.30.1.205","TCP","54","135 > 45064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33133","15.485307","172.30.1.205","172.30.1.104","TCP","54","45064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33134","15.485429","172.30.1.104","172.30.1.205","TCP","66","49671 > 37702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33135","15.485437","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33136","15.485792","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33137","15.486077","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33138","15.486086","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33139","15.487995","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33140","15.488391","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33141","15.488397","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33142","15.489802","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33143","15.492568","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33144","15.492577","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33145","15.493609","172.30.1.205","172.30.1.104","TCP","74","45068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918720 TSecr=0 WS=128" +"33146","15.493926","172.30.1.104","172.30.1.205","TCP","66","135 > 45068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33147","15.493938","172.30.1.205","172.30.1.104","TCP","54","45068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33148","15.494298","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33149","15.494588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33150","15.494597","172.30.1.205","172.30.1.104","TCP","54","45068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33151","15.496821","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33152","15.497304","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33153","15.497311","172.30.1.205","172.30.1.104","TCP","54","45068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33154","15.499131","172.30.1.205","172.30.1.104","TCP","54","45068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33155","15.499247","172.30.1.205","172.30.1.104","TCP","74","37706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918725 TSecr=0 WS=128" +"33156","15.499401","172.30.1.104","172.30.1.205","TCP","54","135 > 45068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33157","15.499423","172.30.1.104","172.30.1.205","TCP","54","135 > 45068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33158","15.499430","172.30.1.205","172.30.1.104","TCP","54","45068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33159","15.499671","172.30.1.104","172.30.1.205","TCP","66","49671 > 37706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33160","15.499679","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33161","15.500035","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33162","15.500334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33163","15.500343","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33164","15.502234","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33165","15.502609","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33166","15.502616","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33167","15.503962","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33168","15.506754","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33169","15.506765","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33170","15.507740","172.30.1.205","172.30.1.104","TCP","74","45072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918734 TSecr=0 WS=128" +"33171","15.508038","172.30.1.104","172.30.1.205","TCP","66","135 > 45072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33172","15.508049","172.30.1.205","172.30.1.104","TCP","54","45072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33173","15.508405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33174","15.508713","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33175","15.508722","172.30.1.205","172.30.1.104","TCP","54","45072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33176","15.510954","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33177","15.511366","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33178","15.511374","172.30.1.205","172.30.1.104","TCP","54","45072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33179","15.513234","172.30.1.205","172.30.1.104","TCP","54","45072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33180","15.513352","172.30.1.205","172.30.1.104","TCP","74","37710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918739 TSecr=0 WS=128" +"33181","15.513506","172.30.1.104","172.30.1.205","TCP","54","135 > 45072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33182","15.513557","172.30.1.104","172.30.1.205","TCP","54","135 > 45072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33183","15.513563","172.30.1.205","172.30.1.104","TCP","54","45072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33184","15.513656","172.30.1.104","172.30.1.205","TCP","66","49671 > 37710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33185","15.513664","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33186","15.514007","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33187","15.514304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33188","15.514313","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33189","15.516213","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33190","15.516588","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33191","15.516594","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33192","15.517979","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33193","15.520793","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33194","15.520803","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33195","15.521799","172.30.1.205","172.30.1.104","TCP","74","45076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918748 TSecr=0 WS=128" +"33196","15.522169","172.30.1.104","172.30.1.205","TCP","66","135 > 45076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33197","15.522182","172.30.1.205","172.30.1.104","TCP","54","45076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33198","15.522549","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33199","15.522860","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33200","15.522868","172.30.1.205","172.30.1.104","TCP","54","45076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33201","15.525122","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33202","15.525521","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33203","15.525528","172.30.1.205","172.30.1.104","TCP","54","45076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33204","15.527363","172.30.1.205","172.30.1.104","TCP","54","45076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33205","15.527488","172.30.1.205","172.30.1.104","TCP","74","37714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918753 TSecr=0 WS=128" +"33206","15.527644","172.30.1.104","172.30.1.205","TCP","54","135 > 45076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33207","15.527664","172.30.1.104","172.30.1.205","TCP","54","135 > 45076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33208","15.527670","172.30.1.205","172.30.1.104","TCP","54","45076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33209","15.527782","172.30.1.104","172.30.1.205","TCP","66","49671 > 37714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33210","15.527790","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33211","15.528141","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33212","15.528439","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33213","15.528447","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33214","15.530376","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33215","15.530752","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33216","15.530760","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33217","15.532153","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33218","15.534950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33219","15.534961","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33220","15.535952","172.30.1.205","172.30.1.104","TCP","74","45080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918762 TSecr=0 WS=128" +"33221","15.536264","172.30.1.104","172.30.1.205","TCP","66","135 > 45080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33222","15.536276","172.30.1.205","172.30.1.104","TCP","54","45080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33223","15.536626","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33224","15.536915","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33225","15.536925","172.30.1.205","172.30.1.104","TCP","54","45080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33226","15.539136","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33227","15.539605","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33228","15.539612","172.30.1.205","172.30.1.104","TCP","54","45080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33229","15.541475","172.30.1.205","172.30.1.104","TCP","54","45080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33230","15.541604","172.30.1.205","172.30.1.104","TCP","74","37718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918768 TSecr=0 WS=128" +"33231","15.541743","172.30.1.104","172.30.1.205","TCP","54","135 > 45080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33232","15.541780","172.30.1.104","172.30.1.205","TCP","54","135 > 45080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33233","15.541787","172.30.1.205","172.30.1.104","TCP","54","45080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33234","15.541913","172.30.1.104","172.30.1.205","TCP","66","49671 > 37718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33235","15.541922","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33236","15.542266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33237","15.542571","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33238","15.542580","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33239","15.544464","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33240","15.544854","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33241","15.544861","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33242","15.546250","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33243","15.548917","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33244","15.548927","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33245","15.549912","172.30.1.205","172.30.1.104","TCP","74","45084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918776 TSecr=0 WS=128" +"33246","15.550216","172.30.1.104","172.30.1.205","TCP","66","135 > 45084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33247","15.550227","172.30.1.205","172.30.1.104","TCP","54","45084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33248","15.550577","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33249","15.550870","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33250","15.550880","172.30.1.205","172.30.1.104","TCP","54","45084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33251","15.553113","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33252","15.553513","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33253","15.553520","172.30.1.205","172.30.1.104","TCP","54","45084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33254","15.555347","172.30.1.205","172.30.1.104","TCP","54","45084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33255","15.555463","172.30.1.205","172.30.1.104","TCP","74","37722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918781 TSecr=0 WS=128" +"33256","15.555665","172.30.1.104","172.30.1.205","TCP","54","135 > 45084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33257","15.555702","172.30.1.104","172.30.1.205","TCP","54","135 > 45084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33258","15.555708","172.30.1.205","172.30.1.104","TCP","54","45084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33259","15.555732","172.30.1.104","172.30.1.205","TCP","66","49671 > 37722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33260","15.555741","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33261","15.556085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33262","15.557587","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33263","15.557596","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33264","15.559485","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33265","15.559862","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33266","15.559868","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33267","15.561262","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33268","15.563928","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33269","15.563938","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33270","15.564925","172.30.1.205","172.30.1.104","TCP","74","45088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918791 TSecr=0 WS=128" +"33271","15.565239","172.30.1.104","172.30.1.205","TCP","66","135 > 45088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33272","15.565250","172.30.1.205","172.30.1.104","TCP","54","45088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33273","15.565607","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33274","15.565928","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33275","15.565937","172.30.1.205","172.30.1.104","TCP","54","45088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33276","15.568146","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33277","15.568554","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33278","15.568560","172.30.1.205","172.30.1.104","TCP","54","45088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33279","15.570403","172.30.1.205","172.30.1.104","TCP","54","45088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33280","15.570518","172.30.1.205","172.30.1.104","TCP","74","37726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918796 TSecr=0 WS=128" +"33281","15.570670","172.30.1.104","172.30.1.205","TCP","54","135 > 45088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33282","15.570682","172.30.1.104","172.30.1.205","TCP","54","135 > 45088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33283","15.570688","172.30.1.205","172.30.1.104","TCP","54","45088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33284","15.570812","172.30.1.104","172.30.1.205","TCP","66","49671 > 37726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33285","15.570821","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33286","15.571175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33287","15.571471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33288","15.571479","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33289","15.573402","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33290","15.573772","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33291","15.573778","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33292","15.575139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33293","15.577866","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33294","15.577875","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33295","15.578839","172.30.1.205","172.30.1.104","TCP","74","45092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918805 TSecr=0 WS=128" +"33296","15.579123","172.30.1.104","172.30.1.205","TCP","66","135 > 45092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33297","15.579134","172.30.1.205","172.30.1.104","TCP","54","45092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33298","15.579484","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33299","15.579791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33300","15.579800","172.30.1.205","172.30.1.104","TCP","54","45092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33301","15.582027","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33302","15.582440","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33303","15.582447","172.30.1.205","172.30.1.104","TCP","54","45092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33304","15.584258","172.30.1.205","172.30.1.104","TCP","54","45092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33305","15.584369","172.30.1.205","172.30.1.104","TCP","74","37730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918810 TSecr=0 WS=128" +"33306","15.584539","172.30.1.104","172.30.1.205","TCP","54","135 > 45092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33307","15.584581","172.30.1.104","172.30.1.205","TCP","54","135 > 45092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33308","15.584587","172.30.1.205","172.30.1.104","TCP","54","45092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33309","15.584669","172.30.1.104","172.30.1.205","TCP","66","49671 > 37730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33310","15.584678","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33311","15.585053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33312","15.585356","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33313","15.585365","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33314","15.587255","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33315","15.587630","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33316","15.587637","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33317","15.589021","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33318","15.591827","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33319","15.591837","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33320","15.592771","172.30.1.205","172.30.1.104","TCP","74","45096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918819 TSecr=0 WS=128" +"33321","15.593071","172.30.1.104","172.30.1.205","TCP","66","135 > 45096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33322","15.593081","172.30.1.205","172.30.1.104","TCP","54","45096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33323","15.593439","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33324","15.593762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33325","15.593771","172.30.1.205","172.30.1.104","TCP","54","45096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33326","15.596002","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33327","15.596407","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33328","15.596414","172.30.1.205","172.30.1.104","TCP","54","45096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33329","15.598247","172.30.1.205","172.30.1.104","TCP","54","45096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33330","15.598357","172.30.1.205","172.30.1.104","TCP","74","37734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918824 TSecr=0 WS=128" +"33331","15.598522","172.30.1.104","172.30.1.205","TCP","54","135 > 45096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33332","15.598566","172.30.1.104","172.30.1.205","TCP","54","135 > 45096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33333","15.598572","172.30.1.205","172.30.1.104","TCP","54","45096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33334","15.598646","172.30.1.104","172.30.1.205","TCP","66","49671 > 37734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33335","15.598654","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33336","15.599003","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33337","15.599283","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33338","15.599290","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33339","15.601174","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33340","15.601545","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33341","15.601551","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33342","15.602896","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33343","15.605558","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33344","15.605569","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33345","15.606528","172.30.1.205","172.30.1.104","TCP","74","45100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918832 TSecr=0 WS=128" +"33346","15.606815","172.30.1.104","172.30.1.205","TCP","66","135 > 45100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33347","15.606825","172.30.1.205","172.30.1.104","TCP","54","45100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33348","15.607174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33349","15.607513","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33350","15.607522","172.30.1.205","172.30.1.104","TCP","54","45100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33351","15.609740","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33352","15.610138","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33353","15.610145","172.30.1.205","172.30.1.104","TCP","54","45100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33354","15.611958","172.30.1.205","172.30.1.104","TCP","54","45100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33355","15.612070","172.30.1.205","172.30.1.104","TCP","74","37738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918838 TSecr=0 WS=128" +"33356","15.612219","172.30.1.104","172.30.1.205","TCP","54","135 > 45100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33357","15.612234","172.30.1.104","172.30.1.205","TCP","54","135 > 45100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33358","15.612239","172.30.1.205","172.30.1.104","TCP","54","45100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33359","15.612353","172.30.1.104","172.30.1.205","TCP","66","49671 > 37738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33360","15.612362","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33361","15.612707","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33362","15.612985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33363","15.612991","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33364","15.614875","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33365","15.615259","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33366","15.615266","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33367","15.616614","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33368","15.619332","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33369","15.619341","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33370","15.620282","172.30.1.205","172.30.1.104","TCP","74","45104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918846 TSecr=0 WS=128" +"33371","15.620602","172.30.1.104","172.30.1.205","TCP","66","135 > 45104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33372","15.620612","172.30.1.205","172.30.1.104","TCP","54","45104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33373","15.620995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33374","15.621343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33375","15.621352","172.30.1.205","172.30.1.104","TCP","54","45104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33376","15.623552","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33377","15.623958","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33378","15.623964","172.30.1.205","172.30.1.104","TCP","54","45104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33379","15.625808","172.30.1.205","172.30.1.104","TCP","54","45104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33380","15.625918","172.30.1.205","172.30.1.104","TCP","74","37742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918852 TSecr=0 WS=128" +"33381","15.626087","172.30.1.104","172.30.1.205","TCP","54","135 > 45104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33382","15.626108","172.30.1.104","172.30.1.205","TCP","54","135 > 45104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33383","15.626114","172.30.1.205","172.30.1.104","TCP","54","45104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33384","15.626254","172.30.1.104","172.30.1.205","TCP","66","49671 > 37742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33385","15.626263","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33386","15.626618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33387","15.626907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33388","15.626916","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33389","15.628836","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33390","15.629240","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33391","15.629246","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33392","15.630592","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33393","15.633321","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33394","15.633331","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33395","15.634276","172.30.1.205","172.30.1.104","TCP","74","45108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918860 TSecr=0 WS=128" +"33396","15.634632","172.30.1.104","172.30.1.205","TCP","66","135 > 45108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33397","15.634642","172.30.1.205","172.30.1.104","TCP","54","45108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33398","15.634994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33399","15.635274","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33400","15.635282","172.30.1.205","172.30.1.104","TCP","54","45108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33401","15.637501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33402","15.637882","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33403","15.637888","172.30.1.205","172.30.1.104","TCP","54","45108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33404","15.639710","172.30.1.205","172.30.1.104","TCP","54","45108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33405","15.639822","172.30.1.205","172.30.1.104","TCP","74","37746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918866 TSecr=0 WS=128" +"33406","15.640077","172.30.1.104","172.30.1.205","TCP","54","135 > 45108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33407","15.640092","172.30.1.104","172.30.1.205","TCP","54","135 > 45108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33408","15.640100","172.30.1.205","172.30.1.104","TCP","54","45108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33409","15.640111","172.30.1.104","172.30.1.205","TCP","66","49671 > 37746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33410","15.640127","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33411","15.640542","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33412","15.640856","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33413","15.640865","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33414","15.642780","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33415","15.643196","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33416","15.643202","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33417","15.644555","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33418","15.647242","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33419","15.647251","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33420","15.648210","172.30.1.205","172.30.1.104","TCP","74","45112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918874 TSecr=0 WS=128" +"33421","15.648497","172.30.1.104","172.30.1.205","TCP","66","135 > 45112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33422","15.648508","172.30.1.205","172.30.1.104","TCP","54","45112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33423","15.648877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33424","15.649183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33425","15.649200","172.30.1.205","172.30.1.104","TCP","54","45112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33426","15.651543","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33427","15.651936","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33428","15.651942","172.30.1.205","172.30.1.104","TCP","54","45112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33429","15.652801","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33430","15.652848","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33431","15.652885","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33432","15.652918","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33433","15.652946","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33434","15.652977","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33435","15.653003","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33436","15.653024","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33437","15.653042","172.30.1.104","172.30.1.205","TCP","54","49671 > 37706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33438","15.653074","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33439","15.653108","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33440","15.653138","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33441","15.653179","172.30.1.104","172.30.1.205","TCP","54","49671 > 37710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33442","15.653200","172.30.1.104","172.30.1.205","TCP","54","49671 > 37706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33443","15.653206","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33444","15.653220","172.30.1.104","172.30.1.205","TCP","54","49671 > 37710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33445","15.653222","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33446","15.653240","172.30.1.104","172.30.1.205","TCP","54","49671 > 37714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33447","15.653256","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33448","15.653262","172.30.1.104","172.30.1.205","TCP","54","49671 > 37718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33449","15.653374","172.30.1.104","172.30.1.205","TCP","54","49671 > 37722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33450","15.653392","172.30.1.104","172.30.1.205","TCP","54","49671 > 37726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33451","15.653412","172.30.1.104","172.30.1.205","TCP","54","49671 > 37714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33452","15.653417","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33453","15.653433","172.30.1.104","172.30.1.205","TCP","54","49671 > 37726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33454","15.653436","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33455","15.653456","172.30.1.104","172.30.1.205","TCP","54","49671 > 37718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33456","15.653459","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33457","15.653476","172.30.1.104","172.30.1.205","TCP","54","49671 > 37722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33458","15.653479","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33459","15.653497","172.30.1.104","172.30.1.205","TCP","54","49671 > 37730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33460","15.653517","172.30.1.104","172.30.1.205","TCP","54","49671 > 37734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33461","15.653539","172.30.1.104","172.30.1.205","TCP","54","49671 > 37738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33462","15.653647","172.30.1.104","172.30.1.205","TCP","54","49671 > 37730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33463","15.653652","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33464","15.653666","172.30.1.104","172.30.1.205","TCP","54","49671 > 37742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33465","15.653690","172.30.1.104","172.30.1.205","TCP","54","49671 > 37742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33466","15.653693","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33467","15.653711","172.30.1.104","172.30.1.205","TCP","54","49671 > 37734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33468","15.653714","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33469","15.653730","172.30.1.104","172.30.1.205","TCP","54","49671 > 37738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33470","15.653733","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33471","15.653754","172.30.1.104","172.30.1.205","TCP","54","49671 > 37746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33472","15.653860","172.30.1.104","172.30.1.205","TCP","54","49671 > 37702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33473","15.653881","172.30.1.104","172.30.1.205","TCP","54","49671 > 37746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33474","15.653885","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33475","15.653902","172.30.1.104","172.30.1.205","TCP","54","49671 > 37702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33476","15.653905","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33477","15.654747","172.30.1.205","172.30.1.104","TCP","54","45112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33478","15.654859","172.30.1.205","172.30.1.104","TCP","74","37750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918881 TSecr=0 WS=128" +"33479","15.655045","172.30.1.104","172.30.1.205","TCP","54","135 > 45112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33480","15.655058","172.30.1.104","172.30.1.205","TCP","54","135 > 45112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33481","15.655063","172.30.1.205","172.30.1.104","TCP","54","45112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33482","15.655140","172.30.1.104","172.30.1.205","TCP","66","49671 > 37750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33483","15.655148","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33484","15.655514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33485","15.656390","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33486","15.656401","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33487","15.658321","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33488","15.658703","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33489","15.658709","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33490","15.660061","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33491","15.662775","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33492","15.662785","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33493","15.663723","172.30.1.205","172.30.1.104","TCP","74","45116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918890 TSecr=0 WS=128" +"33494","15.664014","172.30.1.104","172.30.1.205","TCP","66","135 > 45116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33495","15.664024","172.30.1.205","172.30.1.104","TCP","54","45116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33496","15.664376","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33497","15.664689","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33498","15.664697","172.30.1.205","172.30.1.104","TCP","54","45116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33499","15.666904","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33500","15.667310","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33501","15.667316","172.30.1.205","172.30.1.104","TCP","54","45116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33502","15.669151","172.30.1.205","172.30.1.104","TCP","54","45116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33503","15.669259","172.30.1.205","172.30.1.104","TCP","74","37754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918895 TSecr=0 WS=128" +"33504","15.669410","172.30.1.104","172.30.1.205","TCP","54","135 > 45116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33505","15.669420","172.30.1.104","172.30.1.205","TCP","54","135 > 45116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33506","15.669425","172.30.1.205","172.30.1.104","TCP","54","45116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33507","15.669544","172.30.1.104","172.30.1.205","TCP","66","49671 > 37754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33508","15.669552","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33509","15.669891","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33510","15.670196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33511","15.670205","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33512","15.672061","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33513","15.672459","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33514","15.672475","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33515","15.673841","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33516","15.676519","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33517","15.676528","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33518","15.677477","172.30.1.205","172.30.1.104","TCP","74","45120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918903 TSecr=0 WS=128" +"33519","15.677777","172.30.1.104","172.30.1.205","TCP","66","135 > 45120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33520","15.677788","172.30.1.205","172.30.1.104","TCP","54","45120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33521","15.678131","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33522","15.678409","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33523","15.678417","172.30.1.205","172.30.1.104","TCP","54","45120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33524","15.680602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33525","15.680991","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33526","15.680998","172.30.1.205","172.30.1.104","TCP","54","45120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33527","15.682818","172.30.1.205","172.30.1.104","TCP","54","45120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33528","15.682928","172.30.1.205","172.30.1.104","TCP","74","37758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918909 TSecr=0 WS=128" +"33529","15.683105","172.30.1.104","172.30.1.205","TCP","54","135 > 45120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33530","15.683129","172.30.1.104","172.30.1.205","TCP","54","135 > 45120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33531","15.683135","172.30.1.205","172.30.1.104","TCP","54","45120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33532","15.683223","172.30.1.104","172.30.1.205","TCP","66","49671 > 37758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33533","15.683231","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33534","15.683574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33535","15.683871","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33536","15.683879","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33537","15.685792","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33538","15.686146","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33539","15.686153","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33540","15.687493","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33541","15.690228","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33542","15.690239","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33543","15.691205","172.30.1.205","172.30.1.104","TCP","74","45124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918917 TSecr=0 WS=128" +"33544","15.691535","172.30.1.104","172.30.1.205","TCP","66","135 > 45124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33545","15.691546","172.30.1.205","172.30.1.104","TCP","54","45124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33546","15.691896","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33547","15.692191","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33548","15.692200","172.30.1.205","172.30.1.104","TCP","54","45124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33549","15.694407","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33550","15.695128","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33551","15.695135","172.30.1.205","172.30.1.104","TCP","54","45124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33552","15.696978","172.30.1.205","172.30.1.104","TCP","54","45124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33553","15.697087","172.30.1.205","172.30.1.104","TCP","74","37762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918923 TSecr=0 WS=128" +"33554","15.697238","172.30.1.104","172.30.1.205","TCP","54","135 > 45124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33555","15.697247","172.30.1.104","172.30.1.205","TCP","54","135 > 45124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33556","15.697253","172.30.1.205","172.30.1.104","TCP","54","45124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33557","15.697339","172.30.1.104","172.30.1.205","TCP","66","49671 > 37762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33558","15.697348","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33559","15.697696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33560","15.697976","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33561","15.697984","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33562","15.699848","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33563","15.700227","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33564","15.700234","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33565","15.701613","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33566","15.704392","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33567","15.704401","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33568","15.705362","172.30.1.205","172.30.1.104","TCP","74","45128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918931 TSecr=0 WS=128" +"33569","15.705669","172.30.1.104","172.30.1.205","TCP","66","135 > 45128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33570","15.705679","172.30.1.205","172.30.1.104","TCP","54","45128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33571","15.706033","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33572","15.706331","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33573","15.706340","172.30.1.205","172.30.1.104","TCP","54","45128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33574","15.708511","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33575","15.708880","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33576","15.708887","172.30.1.205","172.30.1.104","TCP","54","45128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33577","15.710716","172.30.1.205","172.30.1.104","TCP","54","45128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33578","15.710836","172.30.1.205","172.30.1.104","TCP","74","37766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918937 TSecr=0 WS=128" +"33579","15.711009","172.30.1.104","172.30.1.205","TCP","54","135 > 45128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33580","15.711022","172.30.1.104","172.30.1.205","TCP","54","135 > 45128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33581","15.711028","172.30.1.205","172.30.1.104","TCP","54","45128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33582","15.711106","172.30.1.104","172.30.1.205","TCP","66","49671 > 37766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33583","15.711114","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33584","15.711456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33585","15.712344","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33586","15.712351","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33587","15.714237","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33588","15.714651","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33589","15.714657","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33590","15.716005","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33591","15.718787","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33592","15.718796","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33593","15.719738","172.30.1.205","172.30.1.104","TCP","74","45132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918946 TSecr=0 WS=128" +"33594","15.720063","172.30.1.104","172.30.1.205","TCP","66","135 > 45132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33595","15.720073","172.30.1.205","172.30.1.104","TCP","54","45132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33596","15.720420","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33597","15.720704","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33598","15.720713","172.30.1.205","172.30.1.104","TCP","54","45132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33599","15.722900","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33600","15.723277","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33601","15.723283","172.30.1.205","172.30.1.104","TCP","54","45132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33602","15.725117","172.30.1.205","172.30.1.104","TCP","54","45132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33603","15.725231","172.30.1.205","172.30.1.104","TCP","74","37770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918951 TSecr=0 WS=128" +"33604","15.725417","172.30.1.104","172.30.1.205","TCP","54","135 > 45132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33605","15.725442","172.30.1.104","172.30.1.205","TCP","54","135 > 45132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33606","15.725449","172.30.1.205","172.30.1.104","TCP","54","45132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33607","15.725561","172.30.1.104","172.30.1.205","TCP","66","49671 > 37770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33608","15.725570","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33609","15.725912","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33610","15.726200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33611","15.726209","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33612","15.728082","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33613","15.728452","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33614","15.728458","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33615","15.729833","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33616","15.732822","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33617","15.732832","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33618","15.733803","172.30.1.205","172.30.1.104","TCP","74","45136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918960 TSecr=0 WS=128" +"33619","15.734101","172.30.1.104","172.30.1.205","TCP","66","135 > 45136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33620","15.734111","172.30.1.205","172.30.1.104","TCP","54","45136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33621","15.734458","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33622","15.734726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33623","15.734735","172.30.1.205","172.30.1.104","TCP","54","45136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33624","15.736940","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33625","15.737352","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33626","15.737358","172.30.1.205","172.30.1.104","TCP","54","45136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33627","15.739168","172.30.1.205","172.30.1.104","TCP","54","45136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33628","15.739286","172.30.1.205","172.30.1.104","TCP","74","37774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918965 TSecr=0 WS=128" +"33629","15.739436","172.30.1.104","172.30.1.205","TCP","54","135 > 45136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33630","15.739448","172.30.1.104","172.30.1.205","TCP","54","135 > 45136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33631","15.739454","172.30.1.205","172.30.1.104","TCP","54","45136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33632","15.739581","172.30.1.104","172.30.1.205","TCP","66","49671 > 37774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33633","15.739590","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33634","15.739929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33635","15.740216","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33636","15.740224","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33637","15.742121","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33638","15.742481","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33639","15.742486","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33640","15.743832","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33641","15.746758","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33642","15.746769","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33643","15.747727","172.30.1.205","172.30.1.104","TCP","74","45140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918974 TSecr=0 WS=128" +"33644","15.748017","172.30.1.104","172.30.1.205","TCP","66","135 > 45140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33645","15.748027","172.30.1.205","172.30.1.104","TCP","54","45140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33646","15.748370","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33647","15.748656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33648","15.748664","172.30.1.205","172.30.1.104","TCP","54","45140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33649","15.750858","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33650","15.751266","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33651","15.751276","172.30.1.205","172.30.1.104","TCP","54","45140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33652","15.753189","172.30.1.205","172.30.1.104","TCP","54","45140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33653","15.753313","172.30.1.205","172.30.1.104","TCP","74","37778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918979 TSecr=0 WS=128" +"33654","15.753459","172.30.1.104","172.30.1.205","TCP","54","135 > 45140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33655","15.753543","172.30.1.104","172.30.1.205","TCP","54","135 > 45140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33656","15.753549","172.30.1.205","172.30.1.104","TCP","54","45140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33657","15.753622","172.30.1.104","172.30.1.205","TCP","66","49671 > 37778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33658","15.753636","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33659","15.754002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33660","15.754290","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33661","15.754299","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33662","15.756170","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33663","15.756528","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33664","15.756535","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33665","15.757943","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33666","15.760714","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33667","15.760723","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33668","15.761699","172.30.1.205","172.30.1.104","TCP","74","45144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918988 TSecr=0 WS=128" +"33669","15.761997","172.30.1.104","172.30.1.205","TCP","66","135 > 45144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33670","15.762008","172.30.1.205","172.30.1.104","TCP","54","45144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33671","15.762352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33672","15.762648","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33673","15.762657","172.30.1.205","172.30.1.104","TCP","54","45144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33674","15.764855","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33675","15.765294","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33676","15.765300","172.30.1.205","172.30.1.104","TCP","54","45144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33677","15.767113","172.30.1.205","172.30.1.104","TCP","54","45144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33678","15.767224","172.30.1.205","172.30.1.104","TCP","74","37782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918993 TSecr=0 WS=128" +"33679","15.767419","172.30.1.104","172.30.1.205","TCP","54","135 > 45144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33680","15.767431","172.30.1.104","172.30.1.205","TCP","54","135 > 45144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33681","15.767436","172.30.1.205","172.30.1.104","TCP","54","45144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33682","15.767525","172.30.1.104","172.30.1.205","TCP","66","49671 > 37782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33683","15.767533","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33684","15.767881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33685","15.768181","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33686","15.768191","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33687","15.770075","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33688","15.770441","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33689","15.770448","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33690","15.771812","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33691","15.774540","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33692","15.774551","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33693","15.775508","172.30.1.205","172.30.1.104","TCP","74","45148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919001 TSecr=0 WS=128" +"33694","15.775807","172.30.1.104","172.30.1.205","TCP","66","135 > 45148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33695","15.775818","172.30.1.205","172.30.1.104","TCP","54","45148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33696","15.776170","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33697","15.776483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33698","15.776492","172.30.1.205","172.30.1.104","TCP","54","45148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33699","15.778693","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33700","15.779120","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33701","15.779127","172.30.1.205","172.30.1.104","TCP","54","45148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33702","15.780979","172.30.1.205","172.30.1.104","TCP","54","45148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33703","15.781090","172.30.1.205","172.30.1.104","TCP","74","37786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919007 TSecr=0 WS=128" +"33704","15.781267","172.30.1.104","172.30.1.205","TCP","54","135 > 45148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33705","15.781286","172.30.1.104","172.30.1.205","TCP","54","135 > 45148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33706","15.781291","172.30.1.205","172.30.1.104","TCP","54","45148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33707","15.781363","172.30.1.104","172.30.1.205","TCP","66","49671 > 37786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33708","15.781371","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33709","15.781715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33710","15.782002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33711","15.782011","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33712","15.783903","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33713","15.784288","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33714","15.784295","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33715","15.785696","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33716","15.788535","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33717","15.788545","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33718","15.789547","172.30.1.205","172.30.1.104","TCP","74","45152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919015 TSecr=0 WS=128" +"33719","15.789859","172.30.1.104","172.30.1.205","TCP","66","135 > 45152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33720","15.789871","172.30.1.205","172.30.1.104","TCP","54","45152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33721","15.790222","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33722","15.790526","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33723","15.790535","172.30.1.205","172.30.1.104","TCP","54","45152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33724","15.792736","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33725","15.793260","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33726","15.793267","172.30.1.205","172.30.1.104","TCP","54","45152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33727","15.795100","172.30.1.205","172.30.1.104","TCP","54","45152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33728","15.795224","172.30.1.205","172.30.1.104","TCP","74","37790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919021 TSecr=0 WS=128" +"33729","15.795380","172.30.1.104","172.30.1.205","TCP","54","135 > 45152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33730","15.795407","172.30.1.104","172.30.1.205","TCP","54","135 > 45152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33731","15.795415","172.30.1.205","172.30.1.104","TCP","54","45152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33732","15.795525","172.30.1.104","172.30.1.205","TCP","66","49671 > 37790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33733","15.795533","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33734","15.795883","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33735","15.797149","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33736","15.797157","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33737","15.799050","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33738","15.799433","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33739","15.799439","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33740","15.800811","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33741","15.803590","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33742","15.803599","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33743","15.804564","172.30.1.205","172.30.1.104","TCP","74","45156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919030 TSecr=0 WS=128" +"33744","15.804869","172.30.1.104","172.30.1.205","TCP","66","135 > 45156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33745","15.804880","172.30.1.205","172.30.1.104","TCP","54","45156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33746","15.805243","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33747","15.805538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33748","15.805553","172.30.1.205","172.30.1.104","TCP","54","45156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33749","15.807851","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33750","15.808258","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33751","15.808265","172.30.1.205","172.30.1.104","TCP","54","45156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33752","15.810118","172.30.1.205","172.30.1.104","TCP","54","45156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33753","15.810245","172.30.1.205","172.30.1.104","TCP","74","37794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919036 TSecr=0 WS=128" +"33754","15.810399","172.30.1.104","172.30.1.205","TCP","54","135 > 45156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33755","15.810412","172.30.1.104","172.30.1.205","TCP","54","135 > 45156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33756","15.810419","172.30.1.205","172.30.1.104","TCP","54","45156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33757","15.810507","172.30.1.104","172.30.1.205","TCP","66","49671 > 37794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33758","15.810516","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33759","15.810866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33760","15.811159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33761","15.811168","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33762","15.813091","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33763","15.813494","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33764","15.813502","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33765","15.814874","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33766","15.817735","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33767","15.817750","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33768","15.818823","172.30.1.205","172.30.1.104","TCP","74","45160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919045 TSecr=0 WS=128" +"33769","15.819153","172.30.1.104","172.30.1.205","TCP","66","135 > 45160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33770","15.819165","172.30.1.205","172.30.1.104","TCP","54","45160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33771","15.819540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33772","15.819829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33773","15.819840","172.30.1.205","172.30.1.104","TCP","54","45160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33774","15.822122","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33775","15.822533","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33776","15.822540","172.30.1.205","172.30.1.104","TCP","54","45160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33777","15.823407","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33778","15.823456","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33779","15.823494","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33780","15.823527","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33781","15.823555","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33782","15.823588","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33783","15.823614","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33784","15.823641","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33785","15.823667","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33786","15.823689","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33787","15.823714","172.30.1.104","172.30.1.205","TCP","54","49671 > 37754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33788","15.823729","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33789","15.823738","172.30.1.104","172.30.1.205","TCP","54","49671 > 37758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33790","15.823762","172.30.1.104","172.30.1.205","TCP","54","49671 > 37762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33791","15.823824","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33792","15.823917","172.30.1.104","172.30.1.205","TCP","54","49671 > 37754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33793","15.823926","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33794","15.823940","172.30.1.104","172.30.1.205","TCP","54","49671 > 37766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33795","15.823964","172.30.1.104","172.30.1.205","TCP","54","49671 > 37766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33796","15.823968","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33797","15.823984","172.30.1.104","172.30.1.205","TCP","54","49671 > 37758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33798","15.823986","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33799","15.824004","172.30.1.104","172.30.1.205","TCP","54","49671 > 37762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33800","15.824006","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33801","15.824024","172.30.1.104","172.30.1.205","TCP","54","49671 > 37770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33802","15.824046","172.30.1.104","172.30.1.205","TCP","54","49671 > 37774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33803","15.824153","172.30.1.104","172.30.1.205","TCP","54","49671 > 37778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33804","15.824171","172.30.1.104","172.30.1.205","TCP","54","49671 > 37782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33805","15.824198","172.30.1.104","172.30.1.205","TCP","54","49671 > 37770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33806","15.824203","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33807","15.824224","172.30.1.104","172.30.1.205","TCP","54","49671 > 37782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33808","15.824227","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33809","15.824249","172.30.1.104","172.30.1.205","TCP","54","49671 > 37774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33810","15.824252","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33811","15.824266","172.30.1.104","172.30.1.205","TCP","54","49671 > 37778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33812","15.824268","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33813","15.824285","172.30.1.104","172.30.1.205","TCP","54","49671 > 37786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33814","15.824308","172.30.1.104","172.30.1.205","TCP","54","49671 > 37790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33815","15.824414","172.30.1.104","172.30.1.205","TCP","54","49671 > 37794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33816","15.824435","172.30.1.104","172.30.1.205","TCP","54","49671 > 37750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33817","15.824452","172.30.1.104","172.30.1.205","TCP","54","49671 > 37786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33818","15.824457","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33819","15.824472","172.30.1.104","172.30.1.205","TCP","54","49671 > 37750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33820","15.824475","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33821","15.824495","172.30.1.104","172.30.1.205","TCP","54","49671 > 37790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33822","15.824497","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33823","15.824515","172.30.1.104","172.30.1.205","TCP","54","49671 > 37794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"33824","15.824517","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"33825","15.825397","172.30.1.205","172.30.1.104","TCP","54","45160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33826","15.825523","172.30.1.205","172.30.1.104","TCP","74","37798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919051 TSecr=0 WS=128" +"33827","15.825653","172.30.1.104","172.30.1.205","TCP","54","135 > 45160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33828","15.825667","172.30.1.104","172.30.1.205","TCP","54","135 > 45160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33829","15.825672","172.30.1.205","172.30.1.104","TCP","54","45160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33830","15.825790","172.30.1.104","172.30.1.205","TCP","66","49671 > 37798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33831","15.825798","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33832","15.826150","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33833","15.826437","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33834","15.826445","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33835","15.828345","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33836","15.828720","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33837","15.828726","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33838","15.830113","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33839","15.832806","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33840","15.832817","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33841","15.833794","172.30.1.205","172.30.1.104","TCP","74","45164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919060 TSecr=0 WS=128" +"33842","15.834085","172.30.1.104","172.30.1.205","TCP","66","135 > 45164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33843","15.834096","172.30.1.205","172.30.1.104","TCP","54","45164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33844","15.834453","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33845","15.834735","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33846","15.834746","172.30.1.205","172.30.1.104","TCP","54","45164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33847","15.836954","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33848","15.837350","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33849","15.837357","172.30.1.205","172.30.1.104","TCP","54","45164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33850","15.839157","172.30.1.205","172.30.1.104","TCP","54","45164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33851","15.839273","172.30.1.205","172.30.1.104","TCP","74","37802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919065 TSecr=0 WS=128" +"33852","15.839440","172.30.1.104","172.30.1.205","TCP","54","135 > 45164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33853","15.839453","172.30.1.104","172.30.1.205","TCP","54","135 > 45164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33854","15.839460","172.30.1.205","172.30.1.104","TCP","54","45164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33855","15.839561","172.30.1.104","172.30.1.205","TCP","66","49671 > 37802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33856","15.839570","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33857","15.839910","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33858","15.840199","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33859","15.840208","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33860","15.842145","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33861","15.842522","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33862","15.842531","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33863","15.843969","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33864","15.846774","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33865","15.846787","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33866","15.847852","172.30.1.205","172.30.1.104","TCP","74","45168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919074 TSecr=0 WS=128" +"33867","15.848176","172.30.1.104","172.30.1.205","TCP","66","135 > 45168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33868","15.848190","172.30.1.205","172.30.1.104","TCP","54","45168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33869","15.848555","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33870","15.848836","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33871","15.848846","172.30.1.205","172.30.1.104","TCP","54","45168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33872","15.851123","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33873","15.851518","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33874","15.851526","172.30.1.205","172.30.1.104","TCP","54","45168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33875","15.853394","172.30.1.205","172.30.1.104","TCP","54","45168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33876","15.853553","172.30.1.205","172.30.1.104","TCP","74","37806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919079 TSecr=0 WS=128" +"33877","15.853656","172.30.1.104","172.30.1.205","TCP","54","135 > 45168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33878","15.853670","172.30.1.104","172.30.1.205","TCP","54","135 > 45168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33879","15.853678","172.30.1.205","172.30.1.104","TCP","54","45168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33880","15.853847","172.30.1.104","172.30.1.205","TCP","66","49671 > 37806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33881","15.853855","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33882","15.854203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33883","15.854498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33884","15.854507","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33885","15.856399","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33886","15.856800","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33887","15.856807","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33888","15.858185","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33889","15.860956","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33890","15.860966","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33891","15.861999","172.30.1.205","172.30.1.104","TCP","74","45172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919088 TSecr=0 WS=128" +"33892","15.862316","172.30.1.104","172.30.1.205","TCP","66","135 > 45172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33893","15.862328","172.30.1.205","172.30.1.104","TCP","54","45172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33894","15.862680","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33895","15.862972","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33896","15.862981","172.30.1.205","172.30.1.104","TCP","54","45172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33897","15.865247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33898","15.865638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33899","15.865645","172.30.1.205","172.30.1.104","TCP","54","45172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33900","15.867472","172.30.1.205","172.30.1.104","TCP","54","45172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33901","15.867612","172.30.1.205","172.30.1.104","TCP","74","37810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919094 TSecr=0 WS=128" +"33902","15.867744","172.30.1.104","172.30.1.205","TCP","54","135 > 45172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33903","15.867757","172.30.1.104","172.30.1.205","TCP","54","135 > 45172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33904","15.867765","172.30.1.205","172.30.1.104","TCP","54","45172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33905","15.867903","172.30.1.104","172.30.1.205","TCP","66","49671 > 37810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33906","15.867911","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33907","15.868277","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33908","15.868559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33909","15.868568","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33910","15.870475","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33911","15.870852","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33912","15.870860","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33913","15.872296","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33914","15.875018","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33915","15.875032","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33916","15.876118","172.30.1.205","172.30.1.104","TCP","74","45176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919102 TSecr=0 WS=128" +"33917","15.876431","172.30.1.104","172.30.1.205","TCP","66","135 > 45176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33918","15.876444","172.30.1.205","172.30.1.104","TCP","54","45176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33919","15.876833","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33920","15.877120","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33921","15.877132","172.30.1.205","172.30.1.104","TCP","54","45176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33922","15.879379","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33923","15.879757","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33924","15.879765","172.30.1.205","172.30.1.104","TCP","54","45176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33925","15.881638","172.30.1.205","172.30.1.104","TCP","54","45176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33926","15.881754","172.30.1.205","172.30.1.104","TCP","74","37814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919108 TSecr=0 WS=128" +"33927","15.881889","172.30.1.104","172.30.1.205","TCP","54","135 > 45176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33928","15.881935","172.30.1.104","172.30.1.205","TCP","54","135 > 45176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33929","15.881942","172.30.1.205","172.30.1.104","TCP","54","45176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33930","15.882053","172.30.1.104","172.30.1.205","TCP","66","49671 > 37814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33931","15.882061","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33932","15.882408","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33933","15.882677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33934","15.882686","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33935","15.884573","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33936","15.884963","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33937","15.884973","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33938","15.886425","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33939","15.889271","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33940","15.889283","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33941","15.890338","172.30.1.205","172.30.1.104","TCP","74","45180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919116 TSecr=0 WS=128" +"33942","15.890630","172.30.1.104","172.30.1.205","TCP","66","135 > 45180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33943","15.890643","172.30.1.205","172.30.1.104","TCP","54","45180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33944","15.891012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33945","15.891309","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33946","15.891318","172.30.1.205","172.30.1.104","TCP","54","45180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33947","15.893614","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33948","15.894018","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33949","15.894024","172.30.1.205","172.30.1.104","TCP","54","45180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33950","15.895863","172.30.1.205","172.30.1.104","TCP","54","45180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33951","15.895981","172.30.1.205","172.30.1.104","TCP","74","37818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919122 TSecr=0 WS=128" +"33952","15.896134","172.30.1.104","172.30.1.205","TCP","54","135 > 45180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33953","15.896178","172.30.1.104","172.30.1.205","TCP","54","135 > 45180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33954","15.896186","172.30.1.205","172.30.1.104","TCP","54","45180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33955","15.896259","172.30.1.104","172.30.1.205","TCP","66","49671 > 37818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33956","15.896268","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33957","15.896616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33958","15.896897","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33959","15.896906","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33960","15.898820","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33961","15.899182","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33962","15.899188","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33963","15.900558","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33964","15.903412","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33965","15.903421","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33966","15.904396","172.30.1.205","172.30.1.104","TCP","74","45184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919130 TSecr=0 WS=128" +"33967","15.904678","172.30.1.104","172.30.1.205","TCP","66","135 > 45184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33968","15.904689","172.30.1.205","172.30.1.104","TCP","54","45184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33969","15.905069","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33970","15.905370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33971","15.905379","172.30.1.205","172.30.1.104","TCP","54","45184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33972","15.907584","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33973","15.908004","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33974","15.908011","172.30.1.205","172.30.1.104","TCP","54","45184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33975","15.909860","172.30.1.205","172.30.1.104","TCP","54","45184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"33976","15.909976","172.30.1.205","172.30.1.104","TCP","74","37822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919136 TSecr=0 WS=128" +"33977","15.910159","172.30.1.104","172.30.1.205","TCP","54","135 > 45184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33978","15.910174","172.30.1.104","172.30.1.205","TCP","54","135 > 45184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"33979","15.910183","172.30.1.205","172.30.1.104","TCP","54","45184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"33980","15.910289","172.30.1.104","172.30.1.205","TCP","66","49671 > 37822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33981","15.910301","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33982","15.910693","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"33983","15.911036","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33984","15.911043","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33985","15.912981","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"33986","15.913380","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"33987","15.913387","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"33988","15.914765","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"33989","15.917524","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"33990","15.917533","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"33991","15.918512","172.30.1.205","172.30.1.104","TCP","74","45188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919144 TSecr=0 WS=128" +"33992","15.918854","172.30.1.104","172.30.1.205","TCP","66","135 > 45188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"33993","15.918865","172.30.1.205","172.30.1.104","TCP","54","45188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"33994","15.919219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"33995","15.919592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"33996","15.919605","172.30.1.205","172.30.1.104","TCP","54","45188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"33997","15.921927","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"33998","15.922350","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"33999","15.922357","172.30.1.205","172.30.1.104","TCP","54","45188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34000","15.924185","172.30.1.205","172.30.1.104","TCP","54","45188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34001","15.924306","172.30.1.205","172.30.1.104","TCP","74","37826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919150 TSecr=0 WS=128" +"34002","15.924471","172.30.1.104","172.30.1.205","TCP","54","135 > 45188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34003","15.924538","172.30.1.104","172.30.1.205","TCP","54","135 > 45188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34004","15.924544","172.30.1.205","172.30.1.104","TCP","54","45188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34005","15.924581","172.30.1.104","172.30.1.205","TCP","66","49671 > 37826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34006","15.924590","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34007","15.924965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34008","15.925288","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34009","15.925297","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34010","15.927189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34011","15.927601","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34012","15.927607","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34013","15.928995","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34014","15.931842","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34015","15.931856","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34016","15.932905","172.30.1.205","172.30.1.104","TCP","74","45192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919159 TSecr=0 WS=128" +"34017","15.933232","172.30.1.104","172.30.1.205","TCP","66","135 > 45192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34018","15.933245","172.30.1.205","172.30.1.104","TCP","54","45192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34019","15.933619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34020","15.934089","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34021","15.934098","172.30.1.205","172.30.1.104","TCP","54","45192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34022","15.936315","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34023","15.936771","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34024","15.936778","172.30.1.205","172.30.1.104","TCP","54","45192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34025","15.938597","172.30.1.205","172.30.1.104","TCP","54","45192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34026","15.938713","172.30.1.205","172.30.1.104","TCP","74","37830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919165 TSecr=0 WS=128" +"34027","15.938879","172.30.1.104","172.30.1.205","TCP","54","135 > 45192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34028","15.938916","172.30.1.104","172.30.1.205","TCP","54","135 > 45192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34029","15.938923","172.30.1.205","172.30.1.104","TCP","54","45192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34030","15.939019","172.30.1.104","172.30.1.205","TCP","66","49671 > 37830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34031","15.939028","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34032","15.939373","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34033","15.939699","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34034","15.939707","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34035","15.941643","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34036","15.942065","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34037","15.942071","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34038","15.943416","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34039","15.946301","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34040","15.946322","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34041","15.947464","172.30.1.205","172.30.1.104","TCP","74","45196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919173 TSecr=0 WS=128" +"34042","15.947830","172.30.1.104","172.30.1.205","TCP","66","135 > 45196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34043","15.947840","172.30.1.205","172.30.1.104","TCP","54","45196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34044","15.948193","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34045","15.948513","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34046","15.948522","172.30.1.205","172.30.1.104","TCP","54","45196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34047","15.950751","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34048","15.951180","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34049","15.951187","172.30.1.205","172.30.1.104","TCP","54","45196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34050","15.953070","172.30.1.205","172.30.1.104","TCP","54","45196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34051","15.953178","172.30.1.205","172.30.1.104","TCP","74","37834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919179 TSecr=0 WS=128" +"34052","15.953366","172.30.1.104","172.30.1.205","TCP","54","135 > 45196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34053","15.953393","172.30.1.104","172.30.1.205","TCP","54","135 > 45196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34054","15.953399","172.30.1.205","172.30.1.104","TCP","54","45196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34055","15.953501","172.30.1.104","172.30.1.205","TCP","66","49671 > 37834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34056","15.953509","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34057","15.953869","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34058","15.954202","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34059","15.954210","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34060","15.956066","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34061","15.956463","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34062","15.956470","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34063","15.957835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34064","15.960641","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34065","15.960653","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34066","15.961624","172.30.1.205","172.30.1.104","TCP","74","45200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919188 TSecr=0 WS=128" +"34067","15.962045","172.30.1.104","172.30.1.205","TCP","66","135 > 45200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34068","15.962055","172.30.1.205","172.30.1.104","TCP","54","45200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34069","15.962405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34070","15.962730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34071","15.962741","172.30.1.205","172.30.1.104","TCP","54","45200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34072","15.964950","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34073","15.965384","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34074","15.965391","172.30.1.205","172.30.1.104","TCP","54","45200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34075","15.967205","172.30.1.205","172.30.1.104","TCP","54","45200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34076","15.967328","172.30.1.205","172.30.1.104","TCP","74","37838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919193 TSecr=0 WS=128" +"34077","15.967566","172.30.1.104","172.30.1.205","TCP","54","135 > 45200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34078","15.967575","172.30.1.104","172.30.1.205","TCP","54","135 > 45200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34079","15.967580","172.30.1.205","172.30.1.104","TCP","54","45200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34080","15.967669","172.30.1.104","172.30.1.205","TCP","66","49671 > 37838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34081","15.967677","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34082","15.968027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34083","15.968351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34084","15.968360","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34085","15.970301","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34086","15.970735","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34087","15.970745","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34088","15.972378","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34089","15.975303","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34090","15.975312","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34091","15.976252","172.30.1.205","172.30.1.104","TCP","74","45204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919202 TSecr=0 WS=128" +"34092","15.976627","172.30.1.104","172.30.1.205","TCP","66","135 > 45204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34093","15.976638","172.30.1.205","172.30.1.104","TCP","54","45204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34094","15.977013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34095","15.977354","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34096","15.977362","172.30.1.205","172.30.1.104","TCP","54","45204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34097","15.979537","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34098","15.980038","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34099","15.980045","172.30.1.205","172.30.1.104","TCP","54","45204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34100","15.981870","172.30.1.205","172.30.1.104","TCP","54","45204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34101","15.981980","172.30.1.205","172.30.1.104","TCP","74","37842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919208 TSecr=0 WS=128" +"34102","15.982159","172.30.1.104","172.30.1.205","TCP","54","135 > 45204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34103","15.982218","172.30.1.104","172.30.1.205","TCP","54","135 > 45204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34104","15.982224","172.30.1.205","172.30.1.104","TCP","54","45204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34105","15.982332","172.30.1.104","172.30.1.205","TCP","66","49671 > 37842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34106","15.982340","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34107","15.982686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34108","15.983011","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34109","15.983018","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34110","15.984950","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34111","15.985379","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34112","15.985385","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34113","15.986760","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34114","15.989678","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34115","15.989687","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34116","15.990667","172.30.1.205","172.30.1.104","TCP","74","45208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919217 TSecr=0 WS=128" +"34117","15.990989","172.30.1.104","172.30.1.205","TCP","66","135 > 45208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34118","15.991000","172.30.1.205","172.30.1.104","TCP","54","45208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34119","15.991353","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34120","15.991707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34121","15.991715","172.30.1.205","172.30.1.104","TCP","54","45208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34122","15.993939","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34123","15.994380","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34124","15.994387","172.30.1.205","172.30.1.104","TCP","54","45208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34125","15.995238","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34126","15.995287","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34127","15.995314","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34128","15.995343","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34129","15.995366","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34130","15.995394","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34131","15.995420","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34132","15.995447","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34133","15.995472","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34134","15.995494","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34135","15.995515","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34136","15.995583","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34137","15.995594","172.30.1.104","172.30.1.205","TCP","54","49671 > 37802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34138","15.995623","172.30.1.104","172.30.1.205","TCP","54","49671 > 37806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34139","15.995840","172.30.1.104","172.30.1.205","TCP","54","49671 > 37810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34140","15.995867","172.30.1.104","172.30.1.205","TCP","54","49671 > 37802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34141","15.995875","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34142","15.995912","172.30.1.104","172.30.1.205","TCP","54","49671 > 37806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34143","15.995916","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34144","15.995942","172.30.1.104","172.30.1.205","TCP","54","49671 > 37810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34145","15.995945","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34146","15.995969","172.30.1.104","172.30.1.205","TCP","54","49671 > 37814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34147","15.995998","172.30.1.104","172.30.1.205","TCP","54","49671 > 37818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34148","15.996088","172.30.1.104","172.30.1.205","TCP","54","49671 > 37822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34149","15.996117","172.30.1.104","172.30.1.205","TCP","54","49671 > 37814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34150","15.996122","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34151","15.996148","172.30.1.104","172.30.1.205","TCP","54","49671 > 37818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34152","15.996151","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34153","15.996178","172.30.1.104","172.30.1.205","TCP","54","49671 > 37822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34154","15.996181","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34155","15.996210","172.30.1.104","172.30.1.205","TCP","54","49671 > 37826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34156","15.996243","172.30.1.104","172.30.1.205","TCP","54","49671 > 37830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34157","15.996270","172.30.1.104","172.30.1.205","TCP","54","49671 > 37834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34158","15.996306","172.30.1.104","172.30.1.205","TCP","54","49671 > 37826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34159","15.996311","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34160","15.996344","172.30.1.104","172.30.1.205","TCP","54","49671 > 37838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34161","15.996374","172.30.1.104","172.30.1.205","TCP","54","49671 > 37842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34162","15.996404","172.30.1.104","172.30.1.205","TCP","54","49671 > 37842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34163","15.996407","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34164","15.996460","172.30.1.104","172.30.1.205","TCP","54","49671 > 37798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34165","15.996488","172.30.1.104","172.30.1.205","TCP","54","49671 > 37838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34166","15.996492","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34167","15.996515","172.30.1.104","172.30.1.205","TCP","54","49671 > 37798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34168","15.996518","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34169","15.996544","172.30.1.104","172.30.1.205","TCP","54","49671 > 37830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34170","15.996546","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34171","15.996572","172.30.1.104","172.30.1.205","TCP","54","49671 > 37834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34172","15.996574","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34173","15.997235","172.30.1.205","172.30.1.104","TCP","54","45208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34174","15.997348","172.30.1.205","172.30.1.104","TCP","74","37846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919223 TSecr=0 WS=128" +"34175","15.997573","172.30.1.104","172.30.1.205","TCP","54","135 > 45208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34176","15.997581","172.30.1.104","172.30.1.205","TCP","54","135 > 45208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34177","15.997586","172.30.1.205","172.30.1.104","TCP","54","45208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34178","15.997683","172.30.1.104","172.30.1.205","TCP","66","49671 > 37846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34179","15.997693","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34180","15.998053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34181","15.998378","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34182","15.998385","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34183","16.000257","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34184","16.000648","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34185","16.000655","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34186","16.002040","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34187","16.005649","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34188","16.005660","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34189","16.006668","172.30.1.205","172.30.1.104","TCP","74","45212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919233 TSecr=0 WS=128" +"34190","16.007001","172.30.1.104","172.30.1.205","TCP","66","135 > 45212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34191","16.007013","172.30.1.205","172.30.1.104","TCP","54","45212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34192","16.007369","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34193","16.007741","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34194","16.007749","172.30.1.205","172.30.1.104","TCP","54","45212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34195","16.010010","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34196","16.010526","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34197","16.010535","172.30.1.205","172.30.1.104","TCP","54","45212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34198","16.012448","172.30.1.205","172.30.1.104","TCP","54","45212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34199","16.012625","172.30.1.205","172.30.1.104","TCP","74","37850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919239 TSecr=0 WS=128" +"34200","16.012729","172.30.1.104","172.30.1.205","TCP","54","135 > 45212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34201","16.012932","172.30.1.104","172.30.1.205","TCP","66","49671 > 37850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34202","16.012943","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34203","16.013311","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34204","16.015195","172.30.1.104","172.30.1.205","TCP","54","135 > 45212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34205","16.015207","172.30.1.205","172.30.1.104","TCP","54","45212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34206","16.015353","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34207","16.015364","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34208","16.017369","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34209","16.017784","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34210","16.017791","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34211","16.019171","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34212","16.022076","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34213","16.022087","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34214","16.023130","172.30.1.205","172.30.1.104","TCP","74","45216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919249 TSecr=0 WS=128" +"34215","16.023460","172.30.1.104","172.30.1.205","TCP","66","135 > 45216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34216","16.023473","172.30.1.205","172.30.1.104","TCP","54","45216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34217","16.023832","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34218","16.024145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34219","16.024154","172.30.1.205","172.30.1.104","TCP","54","45216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34220","16.026401","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34221","16.026895","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34222","16.026901","172.30.1.205","172.30.1.104","TCP","54","45216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34223","16.028724","172.30.1.205","172.30.1.104","TCP","54","45216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34224","16.028880","172.30.1.205","172.30.1.104","TCP","74","37854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919255 TSecr=0 WS=128" +"34225","16.029066","172.30.1.104","172.30.1.205","TCP","54","135 > 45216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34226","16.029077","172.30.1.104","172.30.1.205","TCP","54","135 > 45216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34227","16.029084","172.30.1.205","172.30.1.104","TCP","54","45216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34228","16.029186","172.30.1.104","172.30.1.205","TCP","66","49671 > 37854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34229","16.029195","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34230","16.029544","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34231","16.029856","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34232","16.029866","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34233","16.031743","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34234","16.032161","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34235","16.032167","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34236","16.033568","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34237","16.036458","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34238","16.036467","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34239","16.037462","172.30.1.205","172.30.1.104","TCP","74","45220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919263 TSecr=0 WS=128" +"34240","16.041143","172.30.1.104","172.30.1.205","TCP","66","135 > 45220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34241","16.041157","172.30.1.205","172.30.1.104","TCP","54","45220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34242","16.041533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34243","16.041870","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34244","16.041879","172.30.1.205","172.30.1.104","TCP","54","45220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34245","16.044100","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34246","16.044547","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34247","16.044553","172.30.1.205","172.30.1.104","TCP","54","45220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34248","16.046388","172.30.1.205","172.30.1.104","TCP","54","45220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34249","16.046519","172.30.1.205","172.30.1.104","TCP","74","37858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919272 TSecr=0 WS=128" +"34250","16.046733","172.30.1.104","172.30.1.205","TCP","54","135 > 45220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34251","16.046741","172.30.1.104","172.30.1.205","TCP","54","135 > 45220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34252","16.046748","172.30.1.205","172.30.1.104","TCP","54","45220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34253","16.046865","172.30.1.104","172.30.1.205","TCP","66","49671 > 37858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34254","16.046874","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34255","16.047219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34256","16.048160","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34257","16.048169","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34258","16.050068","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34259","16.050483","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34260","16.050489","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34261","16.051839","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34262","16.057500","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34263","16.057513","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34264","16.058580","172.30.1.205","172.30.1.104","TCP","74","45224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919285 TSecr=0 WS=128" +"34265","16.058915","172.30.1.104","172.30.1.205","TCP","66","135 > 45224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34266","16.058927","172.30.1.205","172.30.1.104","TCP","54","45224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34267","16.059289","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34268","16.059590","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34269","16.059600","172.30.1.205","172.30.1.104","TCP","54","45224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34270","16.061831","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34271","16.062288","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34272","16.062295","172.30.1.205","172.30.1.104","TCP","54","45224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34273","16.064131","172.30.1.205","172.30.1.104","TCP","54","45224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34274","16.064246","172.30.1.205","172.30.1.104","TCP","74","37862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919290 TSecr=0 WS=128" +"34275","16.064467","172.30.1.104","172.30.1.205","TCP","54","135 > 45224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34276","16.064477","172.30.1.104","172.30.1.205","TCP","54","135 > 45224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34277","16.064484","172.30.1.205","172.30.1.104","TCP","54","45224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34278","16.064602","172.30.1.104","172.30.1.205","TCP","66","49671 > 37862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34279","16.064610","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34280","16.064991","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34281","16.065330","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34282","16.065351","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34283","16.067482","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34284","16.067923","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34285","16.067931","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34286","16.069361","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34287","16.072273","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34288","16.072284","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34289","16.073279","172.30.1.205","172.30.1.104","TCP","74","45228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919299 TSecr=0 WS=128" +"34290","16.073671","172.30.1.104","172.30.1.205","TCP","66","135 > 45228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34291","16.073682","172.30.1.205","172.30.1.104","TCP","54","45228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34292","16.074038","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34293","16.074358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34294","16.074368","172.30.1.205","172.30.1.104","TCP","54","45228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34295","16.076571","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34296","16.077022","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34297","16.077030","172.30.1.205","172.30.1.104","TCP","54","45228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34298","16.078889","172.30.1.205","172.30.1.104","TCP","54","45228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34299","16.079006","172.30.1.205","172.30.1.104","TCP","74","37866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919305 TSecr=0 WS=128" +"34300","16.079202","172.30.1.104","172.30.1.205","TCP","54","135 > 45228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34301","16.079255","172.30.1.104","172.30.1.205","TCP","54","135 > 45228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34302","16.079260","172.30.1.205","172.30.1.104","TCP","54","45228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34303","16.079380","172.30.1.104","172.30.1.205","TCP","66","49671 > 37866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34304","16.079391","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34305","16.079755","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34306","16.080064","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34307","16.080073","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34308","16.081985","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34309","16.082395","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34310","16.082402","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34311","16.083797","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34312","16.086749","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34313","16.086758","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34314","16.087729","172.30.1.205","172.30.1.104","TCP","74","45232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919314 TSecr=0 WS=128" +"34315","16.088050","172.30.1.104","172.30.1.205","TCP","66","135 > 45232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34316","16.088062","172.30.1.205","172.30.1.104","TCP","54","45232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34317","16.088423","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34318","16.088740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34319","16.088749","172.30.1.205","172.30.1.104","TCP","54","45232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34320","16.090986","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34321","16.091420","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34322","16.091427","172.30.1.205","172.30.1.104","TCP","54","45232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34323","16.093286","172.30.1.205","172.30.1.104","TCP","54","45232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34324","16.093416","172.30.1.205","172.30.1.104","TCP","74","37870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919319 TSecr=0 WS=128" +"34325","16.093663","172.30.1.104","172.30.1.205","TCP","54","135 > 45232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34326","16.093673","172.30.1.104","172.30.1.205","TCP","54","135 > 45232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34327","16.093680","172.30.1.205","172.30.1.104","TCP","54","45232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34328","16.093768","172.30.1.104","172.30.1.205","TCP","66","49671 > 37870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34329","16.093777","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34330","16.094126","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34331","16.094455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34332","16.094464","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34333","16.096376","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34334","16.096784","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34335","16.096791","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34336","16.098184","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34337","16.101107","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34338","16.101118","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34339","16.102140","172.30.1.205","172.30.1.104","TCP","74","45236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919328 TSecr=0 WS=128" +"34340","16.102524","172.30.1.104","172.30.1.205","TCP","66","135 > 45236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34341","16.102536","172.30.1.205","172.30.1.104","TCP","54","45236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34342","16.102898","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34343","16.103259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34344","16.103268","172.30.1.205","172.30.1.104","TCP","54","45236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34345","16.105526","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34346","16.105975","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34347","16.105982","172.30.1.205","172.30.1.104","TCP","54","45236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34348","16.107809","172.30.1.205","172.30.1.104","TCP","54","45236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34349","16.107925","172.30.1.205","172.30.1.104","TCP","74","37874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919334 TSecr=0 WS=128" +"34350","16.108124","172.30.1.104","172.30.1.205","TCP","54","135 > 45236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34351","16.108134","172.30.1.104","172.30.1.205","TCP","54","135 > 45236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34352","16.108141","172.30.1.205","172.30.1.104","TCP","54","45236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34353","16.108242","172.30.1.104","172.30.1.205","TCP","66","49671 > 37874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34354","16.108251","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34355","16.108594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34356","16.109000","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34357","16.109007","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34358","16.110891","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34359","16.111282","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34360","16.111288","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34361","16.112655","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34362","16.115483","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34363","16.115493","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34364","16.116463","172.30.1.205","172.30.1.104","TCP","74","45240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919342 TSecr=0 WS=128" +"34365","16.116802","172.30.1.104","172.30.1.205","TCP","66","135 > 45240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34366","16.116814","172.30.1.205","172.30.1.104","TCP","54","45240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34367","16.117175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34368","16.117532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34369","16.117541","172.30.1.205","172.30.1.104","TCP","54","45240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34370","16.119762","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34371","16.120172","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34372","16.120179","172.30.1.205","172.30.1.104","TCP","54","45240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34373","16.122041","172.30.1.205","172.30.1.104","TCP","54","45240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34374","16.122190","172.30.1.205","172.30.1.104","TCP","74","37878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919348 TSecr=0 WS=128" +"34375","16.122368","172.30.1.104","172.30.1.205","TCP","54","135 > 45240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34376","16.122382","172.30.1.104","172.30.1.205","TCP","54","135 > 45240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34377","16.122390","172.30.1.205","172.30.1.104","TCP","54","45240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34378","16.122500","172.30.1.104","172.30.1.205","TCP","66","49671 > 37878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34379","16.122509","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34380","16.122864","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34381","16.123186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34382","16.123196","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34383","16.125145","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34384","16.125540","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34385","16.125547","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34386","16.126916","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34387","16.129712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34388","16.129722","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34389","16.130715","172.30.1.205","172.30.1.104","TCP","74","45244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919357 TSecr=0 WS=128" +"34390","16.131063","172.30.1.104","172.30.1.205","TCP","66","135 > 45244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34391","16.131075","172.30.1.205","172.30.1.104","TCP","54","45244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34392","16.131426","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34393","16.131743","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34394","16.131752","172.30.1.205","172.30.1.104","TCP","54","45244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34395","16.133996","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34396","16.134513","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34397","16.134521","172.30.1.205","172.30.1.104","TCP","54","45244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34398","16.136371","172.30.1.205","172.30.1.104","TCP","54","45244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34399","16.136488","172.30.1.205","172.30.1.104","TCP","74","37882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919362 TSecr=0 WS=128" +"34400","16.136710","172.30.1.104","172.30.1.205","TCP","54","135 > 45244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34401","16.136720","172.30.1.104","172.30.1.205","TCP","54","135 > 45244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34402","16.136727","172.30.1.205","172.30.1.104","TCP","54","45244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34403","16.136841","172.30.1.104","172.30.1.205","TCP","66","49671 > 37882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34404","16.136851","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34405","16.137205","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34406","16.137576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34407","16.137587","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34408","16.139475","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34409","16.139903","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34410","16.139910","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34411","16.141298","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34412","16.144188","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34413","16.144199","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34414","16.145188","172.30.1.205","172.30.1.104","TCP","74","45248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919371 TSecr=0 WS=128" +"34415","16.145510","172.30.1.104","172.30.1.205","TCP","66","135 > 45248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34416","16.145521","172.30.1.205","172.30.1.104","TCP","54","45248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34417","16.145881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34418","16.146231","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34419","16.146240","172.30.1.205","172.30.1.104","TCP","54","45248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34420","16.148446","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34421","16.148909","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34422","16.148915","172.30.1.205","172.30.1.104","TCP","54","45248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34423","16.150732","172.30.1.205","172.30.1.104","TCP","54","45248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34424","16.150844","172.30.1.205","172.30.1.104","TCP","74","37886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919377 TSecr=0 WS=128" +"34425","16.151063","172.30.1.104","172.30.1.205","TCP","54","135 > 45248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34426","16.151091","172.30.1.104","172.30.1.205","TCP","54","135 > 45248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34427","16.151097","172.30.1.205","172.30.1.104","TCP","54","45248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34428","16.151182","172.30.1.104","172.30.1.205","TCP","66","49671 > 37886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34429","16.151190","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34430","16.151541","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34431","16.151894","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34432","16.151901","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34433","16.153816","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34434","16.154252","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34435","16.154258","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34436","16.155605","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34437","16.158384","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34438","16.158393","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34439","16.159342","172.30.1.205","172.30.1.104","TCP","74","45252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919385 TSecr=0 WS=128" +"34440","16.159681","172.30.1.104","172.30.1.205","TCP","66","135 > 45252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34441","16.159691","172.30.1.205","172.30.1.104","TCP","54","45252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34442","16.160047","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34443","16.160382","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34444","16.160392","172.30.1.205","172.30.1.104","TCP","54","45252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34445","16.162620","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34446","16.163056","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34447","16.163063","172.30.1.205","172.30.1.104","TCP","54","45252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34448","16.164895","172.30.1.205","172.30.1.104","TCP","54","45252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34449","16.165016","172.30.1.205","172.30.1.104","TCP","74","37890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919391 TSecr=0 WS=128" +"34450","16.165206","172.30.1.104","172.30.1.205","TCP","54","135 > 45252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34451","16.165234","172.30.1.104","172.30.1.205","TCP","54","135 > 45252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34452","16.165240","172.30.1.205","172.30.1.104","TCP","54","45252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34453","16.165361","172.30.1.104","172.30.1.205","TCP","66","49671 > 37890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34454","16.165370","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34455","16.165716","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34456","16.166042","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34457","16.166051","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34458","16.167935","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34459","16.168383","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34460","16.168390","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34461","16.169767","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34462","16.172624","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34463","16.172634","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34464","16.173626","172.30.1.205","172.30.1.104","TCP","74","45256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919400 TSecr=0 WS=128" +"34465","16.173943","172.30.1.104","172.30.1.205","TCP","66","135 > 45256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34466","16.173961","172.30.1.205","172.30.1.104","TCP","54","45256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34467","16.174322","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34468","16.174664","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34469","16.174673","172.30.1.205","172.30.1.104","TCP","54","45256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34470","16.176882","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34471","16.177303","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34472","16.177310","172.30.1.205","172.30.1.104","TCP","54","45256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34473","16.178164","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34474","16.178215","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34475","16.178248","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34476","16.178276","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34477","16.178304","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34478","16.178332","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34479","16.178359","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34480","16.178382","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34481","16.178409","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34482","16.178435","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34483","16.178456","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34484","16.178534","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34485","16.178592","172.30.1.104","172.30.1.205","TCP","54","49671 > 37850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34486","16.178622","172.30.1.104","172.30.1.205","TCP","54","49671 > 37854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34487","16.178649","172.30.1.104","172.30.1.205","TCP","54","49671 > 37850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34488","16.178656","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34489","16.178677","172.30.1.104","172.30.1.205","TCP","54","49671 > 37862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34490","16.178706","172.30.1.104","172.30.1.205","TCP","54","49671 > 37858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34491","16.178851","172.30.1.104","172.30.1.205","TCP","54","49671 > 37866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34492","16.178879","172.30.1.104","172.30.1.205","TCP","54","49671 > 37862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34493","16.178884","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34494","16.178913","172.30.1.104","172.30.1.205","TCP","54","49671 > 37866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34495","16.178918","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34496","16.178941","172.30.1.104","172.30.1.205","TCP","54","49671 > 37854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34497","16.178944","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34498","16.178971","172.30.1.104","172.30.1.205","TCP","54","49671 > 37858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34499","16.178975","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34500","16.179000","172.30.1.104","172.30.1.205","TCP","54","49671 > 37870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34501","16.179029","172.30.1.104","172.30.1.205","TCP","54","49671 > 37874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34502","16.179122","172.30.1.104","172.30.1.205","TCP","54","49671 > 37870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34503","16.179127","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34504","16.179129","172.30.1.104","172.30.1.205","TCP","54","49671 > 37878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34505","16.179136","172.30.1.104","172.30.1.205","TCP","54","49671 > 37874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34506","16.179139","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34507","16.179162","172.30.1.104","172.30.1.205","TCP","54","49671 > 37882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34508","16.179196","172.30.1.104","172.30.1.205","TCP","54","49671 > 37878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34509","16.179199","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34510","16.179224","172.30.1.104","172.30.1.205","TCP","54","49671 > 37886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34511","16.179253","172.30.1.104","172.30.1.205","TCP","54","49671 > 37882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34512","16.179257","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34513","16.179292","172.30.1.104","172.30.1.205","TCP","54","49671 > 37890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34514","16.179322","172.30.1.104","172.30.1.205","TCP","54","49671 > 37886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34515","16.179326","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34516","16.179352","172.30.1.104","172.30.1.205","TCP","54","49671 > 37890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34517","16.179356","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34518","16.179381","172.30.1.104","172.30.1.205","TCP","54","49671 > 37846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34519","16.179411","172.30.1.104","172.30.1.205","TCP","54","49671 > 37846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34520","16.179415","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34521","16.180190","172.30.1.205","172.30.1.104","TCP","54","45256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34522","16.180303","172.30.1.205","172.30.1.104","TCP","74","37894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919406 TSecr=0 WS=128" +"34523","16.180476","172.30.1.104","172.30.1.205","TCP","54","135 > 45256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34524","16.180506","172.30.1.104","172.30.1.205","TCP","54","135 > 45256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34525","16.180512","172.30.1.205","172.30.1.104","TCP","54","45256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34526","16.180609","172.30.1.104","172.30.1.205","TCP","66","49671 > 37894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34527","16.180618","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34528","16.181016","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34529","16.181331","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34530","16.181340","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34531","16.183224","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34532","16.183641","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34533","16.183648","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34534","16.185061","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34535","16.187839","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34536","16.187849","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34537","16.188816","172.30.1.205","172.30.1.104","TCP","74","45260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919415 TSecr=0 WS=128" +"34538","16.189157","172.30.1.104","172.30.1.205","TCP","66","135 > 45260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34539","16.189168","172.30.1.205","172.30.1.104","TCP","54","45260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34540","16.189527","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34541","16.189837","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34542","16.189846","172.30.1.205","172.30.1.104","TCP","54","45260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34543","16.192026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34544","16.192495","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34545","16.192502","172.30.1.205","172.30.1.104","TCP","54","45260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34546","16.194336","172.30.1.205","172.30.1.104","TCP","54","45260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34547","16.194446","172.30.1.205","172.30.1.104","TCP","74","37898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919420 TSecr=0 WS=128" +"34548","16.194628","172.30.1.104","172.30.1.205","TCP","54","135 > 45260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34549","16.194663","172.30.1.104","172.30.1.205","TCP","54","135 > 45260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34550","16.194669","172.30.1.205","172.30.1.104","TCP","54","45260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34551","16.194768","172.30.1.104","172.30.1.205","TCP","66","49671 > 37898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34552","16.194776","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34553","16.195120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34554","16.195435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34555","16.195444","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34556","16.197337","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34557","16.197762","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34558","16.197768","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34559","16.199122","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34560","16.202078","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34561","16.202087","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34562","16.203037","172.30.1.205","172.30.1.104","TCP","74","45264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919429 TSecr=0 WS=128" +"34563","16.203364","172.30.1.104","172.30.1.205","TCP","66","135 > 45264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34564","16.203375","172.30.1.205","172.30.1.104","TCP","54","45264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34565","16.203725","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34566","16.204051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34567","16.204059","172.30.1.205","172.30.1.104","TCP","54","45264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34568","16.206276","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34569","16.206719","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34570","16.206726","172.30.1.205","172.30.1.104","TCP","54","45264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34571","16.208522","172.30.1.205","172.30.1.104","TCP","54","45264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34572","16.208636","172.30.1.205","172.30.1.104","TCP","74","37902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919435 TSecr=0 WS=128" +"34573","16.208817","172.30.1.104","172.30.1.205","TCP","54","135 > 45264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34574","16.208839","172.30.1.104","172.30.1.205","TCP","54","135 > 45264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34575","16.208845","172.30.1.205","172.30.1.104","TCP","54","45264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34576","16.208954","172.30.1.104","172.30.1.205","TCP","66","49671 > 37902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34577","16.208962","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34578","16.209321","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34579","16.209653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34580","16.209662","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34581","16.211524","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34582","16.211943","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34583","16.211949","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34584","16.213336","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34585","16.216517","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34586","16.216525","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34587","16.217492","172.30.1.205","172.30.1.104","TCP","74","45268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919443 TSecr=0 WS=128" +"34588","16.217823","172.30.1.104","172.30.1.205","TCP","66","135 > 45268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34589","16.217834","172.30.1.205","172.30.1.104","TCP","54","45268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34590","16.218191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34591","16.218525","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34592","16.218534","172.30.1.205","172.30.1.104","TCP","54","45268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34593","16.220736","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34594","16.221179","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34595","16.221186","172.30.1.205","172.30.1.104","TCP","54","45268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34596","16.223014","172.30.1.205","172.30.1.104","TCP","54","45268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34597","16.223132","172.30.1.205","172.30.1.104","TCP","74","37906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919449 TSecr=0 WS=128" +"34598","16.223375","172.30.1.104","172.30.1.205","TCP","54","135 > 45268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34599","16.223401","172.30.1.104","172.30.1.205","TCP","54","135 > 45268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34600","16.223407","172.30.1.205","172.30.1.104","TCP","54","45268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34601","16.223450","172.30.1.104","172.30.1.205","TCP","66","49671 > 37906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34602","16.223459","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34603","16.223805","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34604","16.224154","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34605","16.224163","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34606","16.226086","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34607","16.226534","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34608","16.226541","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34609","16.227894","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34610","16.231439","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34611","16.231449","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34612","16.232415","172.30.1.205","172.30.1.104","TCP","74","45272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919458 TSecr=0 WS=128" +"34613","16.232784","172.30.1.104","172.30.1.205","TCP","66","135 > 45272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34614","16.232794","172.30.1.205","172.30.1.104","TCP","54","45272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34615","16.233144","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34616","16.233472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34617","16.233481","172.30.1.205","172.30.1.104","TCP","54","45272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34618","16.235683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34619","16.236144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34620","16.236150","172.30.1.205","172.30.1.104","TCP","54","45272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34621","16.237983","172.30.1.205","172.30.1.104","TCP","54","45272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34622","16.238097","172.30.1.205","172.30.1.104","TCP","74","37910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919464 TSecr=0 WS=128" +"34623","16.238310","172.30.1.104","172.30.1.205","TCP","54","135 > 45272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34624","16.238383","172.30.1.104","172.30.1.205","TCP","66","49671 > 37910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34625","16.238398","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34626","16.238425","172.30.1.104","172.30.1.205","TCP","54","135 > 45272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34627","16.238430","172.30.1.205","172.30.1.104","TCP","54","45272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34628","16.238791","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34629","16.239101","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34630","16.239110","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34631","16.241008","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34632","16.241408","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34633","16.241415","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34634","16.242778","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34635","16.245671","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34636","16.245681","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34637","16.246634","172.30.1.205","172.30.1.104","TCP","74","45276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919473 TSecr=0 WS=128" +"34638","16.246947","172.30.1.104","172.30.1.205","TCP","66","135 > 45276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34639","16.246958","172.30.1.205","172.30.1.104","TCP","54","45276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34640","16.247308","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34641","16.247625","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34642","16.247634","172.30.1.205","172.30.1.104","TCP","54","45276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34643","16.249871","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34644","16.251812","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34645","16.251818","172.30.1.205","172.30.1.104","TCP","54","45276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34646","16.253666","172.30.1.205","172.30.1.104","TCP","54","45276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34647","16.253779","172.30.1.205","172.30.1.104","TCP","74","37914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919480 TSecr=0 WS=128" +"34648","16.253943","172.30.1.104","172.30.1.205","TCP","54","135 > 45276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34649","16.254008","172.30.1.104","172.30.1.205","TCP","54","135 > 45276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34650","16.254014","172.30.1.205","172.30.1.104","TCP","54","45276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34651","16.254108","172.30.1.104","172.30.1.205","TCP","66","49671 > 37914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34652","16.254116","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34653","16.254473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34654","16.254774","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34655","16.254784","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34656","16.256677","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34657","16.257718","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34658","16.257725","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34659","16.259109","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34660","16.262154","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34661","16.262164","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34662","16.263169","172.30.1.205","172.30.1.104","TCP","74","45280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919489 TSecr=0 WS=128" +"34663","16.263521","172.30.1.104","172.30.1.205","TCP","66","135 > 45280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34664","16.263544","172.30.1.205","172.30.1.104","TCP","54","45280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34665","16.263914","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34666","16.264245","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34667","16.264253","172.30.1.205","172.30.1.104","TCP","54","45280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34668","16.266520","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34669","16.266996","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34670","16.267003","172.30.1.205","172.30.1.104","TCP","54","45280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34671","16.268840","172.30.1.205","172.30.1.104","TCP","54","45280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34672","16.268950","172.30.1.205","172.30.1.104","TCP","74","37918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919495 TSecr=0 WS=128" +"34673","16.269134","172.30.1.104","172.30.1.205","TCP","54","135 > 45280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34674","16.269162","172.30.1.104","172.30.1.205","TCP","54","135 > 45280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34675","16.269168","172.30.1.205","172.30.1.104","TCP","54","45280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34676","16.269260","172.30.1.104","172.30.1.205","TCP","66","49671 > 37918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34677","16.269268","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34678","16.269617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34679","16.269915","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34680","16.269922","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34681","16.271814","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34682","16.272216","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34683","16.272222","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34684","16.273655","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34685","16.276572","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34686","16.276582","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34687","16.277580","172.30.1.205","172.30.1.104","TCP","74","45284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919504 TSecr=0 WS=128" +"34688","16.277919","172.30.1.104","172.30.1.205","TCP","66","135 > 45284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34689","16.277929","172.30.1.205","172.30.1.104","TCP","54","45284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34690","16.278281","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34691","16.278607","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34692","16.278616","172.30.1.205","172.30.1.104","TCP","54","45284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34693","16.280826","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34694","16.281248","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34695","16.281254","172.30.1.205","172.30.1.104","TCP","54","45284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34696","16.283063","172.30.1.205","172.30.1.104","TCP","54","45284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34697","16.283174","172.30.1.205","172.30.1.104","TCP","74","37922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919509 TSecr=0 WS=128" +"34698","16.283352","172.30.1.104","172.30.1.205","TCP","54","135 > 45284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34699","16.283376","172.30.1.104","172.30.1.205","TCP","54","135 > 45284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34700","16.283382","172.30.1.205","172.30.1.104","TCP","54","45284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34701","16.283472","172.30.1.104","172.30.1.205","TCP","66","49671 > 37922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34702","16.283480","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34703","16.283825","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34704","16.284665","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34705","16.284673","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34706","16.286565","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34707","16.286965","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34708","16.286972","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34709","16.288337","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34710","16.291266","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34711","16.291277","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34712","16.292242","172.30.1.205","172.30.1.104","TCP","74","45288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919518 TSecr=0 WS=128" +"34713","16.292587","172.30.1.104","172.30.1.205","TCP","66","135 > 45288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34714","16.292598","172.30.1.205","172.30.1.104","TCP","54","45288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34715","16.292978","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34716","16.293343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34717","16.293352","172.30.1.205","172.30.1.104","TCP","54","45288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34718","16.295546","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34719","16.295989","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34720","16.295995","172.30.1.205","172.30.1.104","TCP","54","45288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34721","16.297830","172.30.1.205","172.30.1.104","TCP","54","45288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34722","16.297941","172.30.1.205","172.30.1.104","TCP","74","37926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919524 TSecr=0 WS=128" +"34723","16.298125","172.30.1.104","172.30.1.205","TCP","54","135 > 45288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34724","16.298151","172.30.1.104","172.30.1.205","TCP","54","135 > 45288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34725","16.298157","172.30.1.205","172.30.1.104","TCP","54","45288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34726","16.298252","172.30.1.104","172.30.1.205","TCP","66","49671 > 37926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34727","16.298260","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34728","16.298608","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34729","16.298944","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34730","16.298953","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34731","16.300834","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34732","16.301264","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34733","16.301270","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34734","16.302614","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34735","16.305462","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34736","16.305472","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34737","16.306420","172.30.1.205","172.30.1.104","TCP","74","45292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919532 TSecr=0 WS=128" +"34738","16.306774","172.30.1.104","172.30.1.205","TCP","66","135 > 45292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34739","16.306784","172.30.1.205","172.30.1.104","TCP","54","45292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34740","16.307134","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34741","16.307519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34742","16.307527","172.30.1.205","172.30.1.104","TCP","54","45292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34743","16.309749","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34744","16.310147","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34745","16.310154","172.30.1.205","172.30.1.104","TCP","54","45292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34746","16.311987","172.30.1.205","172.30.1.104","TCP","54","45292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34747","16.312100","172.30.1.205","172.30.1.104","TCP","74","37930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919538 TSecr=0 WS=128" +"34748","16.312256","172.30.1.104","172.30.1.205","TCP","54","135 > 45292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34749","16.312524","172.30.1.104","172.30.1.205","TCP","66","49671 > 37930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34750","16.312533","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34751","16.312909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34752","16.314019","172.30.1.104","172.30.1.205","TCP","54","135 > 45292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34753","16.314032","172.30.1.205","172.30.1.104","TCP","54","45292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34754","16.314147","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34755","16.314156","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34756","16.316021","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34757","16.316415","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34758","16.316420","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34759","16.317805","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34760","16.320583","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34761","16.320593","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34762","16.321565","172.30.1.205","172.30.1.104","TCP","74","45296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919547 TSecr=0 WS=128" +"34763","16.321890","172.30.1.104","172.30.1.205","TCP","66","135 > 45296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34764","16.321901","172.30.1.205","172.30.1.104","TCP","54","45296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34765","16.322258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34766","16.322585","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34767","16.322593","172.30.1.205","172.30.1.104","TCP","54","45296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34768","16.324807","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34769","16.325224","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34770","16.325231","172.30.1.205","172.30.1.104","TCP","54","45296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34771","16.327041","172.30.1.205","172.30.1.104","TCP","54","45296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34772","16.327154","172.30.1.205","172.30.1.104","TCP","74","37934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919553 TSecr=0 WS=128" +"34773","16.327333","172.30.1.104","172.30.1.205","TCP","54","135 > 45296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34774","16.327401","172.30.1.104","172.30.1.205","TCP","54","135 > 45296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34775","16.327407","172.30.1.205","172.30.1.104","TCP","54","45296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34776","16.327499","172.30.1.104","172.30.1.205","TCP","66","49671 > 37934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34777","16.327507","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34778","16.327857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34779","16.328155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34780","16.328162","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34781","16.330078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34782","16.330432","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34783","16.330439","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34784","16.331795","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34785","16.334596","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34786","16.334608","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34787","16.335571","172.30.1.205","172.30.1.104","TCP","74","45300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919561 TSecr=0 WS=128" +"34788","16.335898","172.30.1.104","172.30.1.205","TCP","66","135 > 45300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34789","16.335909","172.30.1.205","172.30.1.104","TCP","54","45300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34790","16.336261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34791","16.336559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34792","16.336568","172.30.1.205","172.30.1.104","TCP","54","45300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34793","16.338789","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34794","16.339230","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34795","16.339237","172.30.1.205","172.30.1.104","TCP","54","45300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34796","16.341082","172.30.1.205","172.30.1.104","TCP","54","45300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34797","16.341195","172.30.1.205","172.30.1.104","TCP","74","37938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919567 TSecr=0 WS=128" +"34798","16.341379","172.30.1.104","172.30.1.205","TCP","54","135 > 45300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34799","16.341394","172.30.1.104","172.30.1.205","TCP","54","135 > 45300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34800","16.341400","172.30.1.205","172.30.1.104","TCP","54","45300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34801","16.341488","172.30.1.104","172.30.1.205","TCP","66","49671 > 37938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34802","16.341497","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34803","16.341842","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34804","16.342179","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34805","16.342188","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34806","16.344104","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34807","16.344484","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34808","16.344490","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34809","16.345889","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34810","16.348701","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34811","16.348710","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34812","16.349679","172.30.1.205","172.30.1.104","TCP","74","45304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919576 TSecr=0 WS=128" +"34813","16.349976","172.30.1.104","172.30.1.205","TCP","66","135 > 45304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34814","16.349987","172.30.1.205","172.30.1.104","TCP","54","45304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34815","16.350358","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34816","16.350641","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34817","16.350650","172.30.1.205","172.30.1.104","TCP","54","45304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34818","16.352874","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34819","16.353269","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34820","16.353276","172.30.1.205","172.30.1.104","TCP","54","45304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34821","16.354127","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34822","16.354177","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34823","16.354209","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34824","16.354238","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34825","16.354266","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34826","16.354291","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34827","16.354318","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34828","16.354346","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34829","16.354369","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34830","16.354396","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34831","16.354423","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34832","16.354501","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34833","16.354734","172.30.1.104","172.30.1.205","TCP","54","49671 > 37898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34834","16.354756","172.30.1.104","172.30.1.205","TCP","54","49671 > 37902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34835","16.354783","172.30.1.104","172.30.1.205","TCP","54","49671 > 37906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34836","16.354807","172.30.1.104","172.30.1.205","TCP","54","49671 > 37898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34837","16.354814","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34838","16.354833","172.30.1.104","172.30.1.205","TCP","54","49671 > 37902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34839","16.354837","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34840","16.354864","172.30.1.104","172.30.1.205","TCP","54","49671 > 37906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34841","16.354868","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34842","16.354996","172.30.1.104","172.30.1.205","TCP","54","49671 > 37910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34843","16.355015","172.30.1.104","172.30.1.205","TCP","54","49671 > 37914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34844","16.355047","172.30.1.104","172.30.1.205","TCP","54","49671 > 37918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34845","16.355074","172.30.1.104","172.30.1.205","TCP","54","49671 > 37922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34846","16.355101","172.30.1.104","172.30.1.205","TCP","54","49671 > 37926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34847","16.355125","172.30.1.104","172.30.1.205","TCP","54","49671 > 37930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34848","16.355152","172.30.1.104","172.30.1.205","TCP","54","49671 > 37934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34849","16.355199","172.30.1.104","172.30.1.205","TCP","54","49671 > 37894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34850","16.355230","172.30.1.104","172.30.1.205","TCP","54","49671 > 37894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34851","16.355235","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34852","16.355258","172.30.1.104","172.30.1.205","TCP","54","49671 > 37938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34853","16.355285","172.30.1.104","172.30.1.205","TCP","54","49671 > 37938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34854","16.355289","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34855","16.355312","172.30.1.104","172.30.1.205","TCP","54","49671 > 37934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34856","16.355315","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34857","16.355340","172.30.1.104","172.30.1.205","TCP","54","49671 > 37930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34858","16.355344","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34859","16.355370","172.30.1.104","172.30.1.205","TCP","54","49671 > 37926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34860","16.355373","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34861","16.355397","172.30.1.104","172.30.1.205","TCP","54","49671 > 37922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34862","16.355400","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34863","16.355423","172.30.1.104","172.30.1.205","TCP","54","49671 > 37910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34864","16.355426","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34865","16.355449","172.30.1.104","172.30.1.205","TCP","54","49671 > 37914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34866","16.355453","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34867","16.355478","172.30.1.104","172.30.1.205","TCP","54","49671 > 37918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"34868","16.355481","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"34869","16.356109","172.30.1.205","172.30.1.104","TCP","54","45304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34870","16.356220","172.30.1.205","172.30.1.104","TCP","74","37942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919582 TSecr=0 WS=128" +"34871","16.356395","172.30.1.104","172.30.1.205","TCP","54","135 > 45304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34872","16.356427","172.30.1.104","172.30.1.205","TCP","54","135 > 45304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34873","16.356432","172.30.1.205","172.30.1.104","TCP","54","45304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34874","16.356572","172.30.1.104","172.30.1.205","TCP","66","49671 > 37942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34875","16.356580","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34876","16.356963","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34877","16.357282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34878","16.357289","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34879","16.359164","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34880","16.359555","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34881","16.359562","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34882","16.360955","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34883","16.363807","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34884","16.363818","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34885","16.364794","172.30.1.205","172.30.1.104","TCP","74","45308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919591 TSecr=0 WS=128" +"34886","16.365170","172.30.1.104","172.30.1.205","TCP","66","135 > 45308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34887","16.365183","172.30.1.205","172.30.1.104","TCP","54","45308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34888","16.365556","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34889","16.365897","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34890","16.365907","172.30.1.205","172.30.1.104","TCP","54","45308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34891","16.368093","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34892","16.368552","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34893","16.368559","172.30.1.205","172.30.1.104","TCP","54","45308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34894","16.370395","172.30.1.205","172.30.1.104","TCP","54","45308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34895","16.370513","172.30.1.205","172.30.1.104","TCP","74","37946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919596 TSecr=0 WS=128" +"34896","16.370697","172.30.1.104","172.30.1.205","TCP","54","135 > 45308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34897","16.370741","172.30.1.104","172.30.1.205","TCP","54","135 > 45308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34898","16.370747","172.30.1.205","172.30.1.104","TCP","54","45308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34899","16.370845","172.30.1.104","172.30.1.205","TCP","66","49671 > 37946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34900","16.370853","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34901","16.371202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34902","16.371577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34903","16.371586","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34904","16.373502","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34905","16.373912","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34906","16.373919","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34907","16.375280","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34908","16.378146","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34909","16.378156","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34910","16.379132","172.30.1.205","172.30.1.104","TCP","74","45312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919605 TSecr=0 WS=128" +"34911","16.379498","172.30.1.104","172.30.1.205","TCP","66","135 > 45312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34912","16.379509","172.30.1.205","172.30.1.104","TCP","54","45312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34913","16.379863","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34914","16.380221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34915","16.380230","172.30.1.205","172.30.1.104","TCP","54","45312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34916","16.382470","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34917","16.382940","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34918","16.382947","172.30.1.205","172.30.1.104","TCP","54","45312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34919","16.384762","172.30.1.205","172.30.1.104","TCP","54","45312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34920","16.384898","172.30.1.205","172.30.1.104","TCP","74","37950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919611 TSecr=0 WS=128" +"34921","16.385070","172.30.1.104","172.30.1.205","TCP","54","135 > 45312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34922","16.385108","172.30.1.104","172.30.1.205","TCP","54","135 > 45312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34923","16.385114","172.30.1.205","172.30.1.104","TCP","54","45312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34924","16.385233","172.30.1.104","172.30.1.205","TCP","66","49671 > 37950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34925","16.385241","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34926","16.385588","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34927","16.385912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34928","16.385920","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34929","16.387806","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34930","16.388213","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34931","16.388220","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34932","16.389607","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34933","16.392533","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34934","16.392543","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34935","16.393511","172.30.1.205","172.30.1.104","TCP","74","45316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919619 TSecr=0 WS=128" +"34936","16.393892","172.30.1.104","172.30.1.205","TCP","66","135 > 45316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34937","16.393902","172.30.1.205","172.30.1.104","TCP","54","45316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34938","16.394257","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34939","16.394584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34940","16.394593","172.30.1.205","172.30.1.104","TCP","54","45316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34941","16.396797","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34942","16.397260","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34943","16.397267","172.30.1.205","172.30.1.104","TCP","54","45316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34944","16.399088","172.30.1.205","172.30.1.104","TCP","54","45316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34945","16.399199","172.30.1.205","172.30.1.104","TCP","74","37954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919625 TSecr=0 WS=128" +"34946","16.399430","172.30.1.104","172.30.1.205","TCP","54","135 > 45316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34947","16.399460","172.30.1.104","172.30.1.205","TCP","54","135 > 45316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34948","16.399465","172.30.1.205","172.30.1.104","TCP","54","45316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34949","16.399566","172.30.1.104","172.30.1.205","TCP","66","49671 > 37954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34950","16.399574","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34951","16.399930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34952","16.400264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34953","16.400273","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34954","16.402184","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34955","16.402688","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34956","16.402695","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34957","16.404059","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34958","16.406944","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34959","16.406954","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34960","16.407911","172.30.1.205","172.30.1.104","TCP","74","45320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919634 TSecr=0 WS=128" +"34961","16.408293","172.30.1.104","172.30.1.205","TCP","66","135 > 45320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34962","16.408304","172.30.1.205","172.30.1.104","TCP","54","45320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34963","16.408654","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34964","16.409019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34965","16.409028","172.30.1.205","172.30.1.104","TCP","54","45320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34966","16.411235","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34967","16.411672","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34968","16.411678","172.30.1.205","172.30.1.104","TCP","54","45320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34969","16.413531","172.30.1.205","172.30.1.104","TCP","54","45320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34970","16.413646","172.30.1.205","172.30.1.104","TCP","74","37958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919640 TSecr=0 WS=128" +"34971","16.413831","172.30.1.104","172.30.1.205","TCP","54","135 > 45320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34972","16.413881","172.30.1.104","172.30.1.205","TCP","54","135 > 45320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34973","16.413886","172.30.1.205","172.30.1.104","TCP","54","45320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34974","16.413991","172.30.1.104","172.30.1.205","TCP","66","49671 > 37958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34975","16.414000","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34976","16.414345","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"34977","16.414686","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34978","16.414694","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34979","16.416586","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"34980","16.417034","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"34981","16.417041","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"34982","16.418412","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"34983","16.421419","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"34984","16.421429","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"34985","16.422383","172.30.1.205","172.30.1.104","TCP","74","45324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919648 TSecr=0 WS=128" +"34986","16.422735","172.30.1.104","172.30.1.205","TCP","66","135 > 45324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"34987","16.422745","172.30.1.205","172.30.1.104","TCP","54","45324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"34988","16.423096","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"34989","16.423432","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"34990","16.423441","172.30.1.205","172.30.1.104","TCP","54","45324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"34991","16.425663","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"34992","16.426132","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"34993","16.426139","172.30.1.205","172.30.1.104","TCP","54","45324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34994","16.427989","172.30.1.205","172.30.1.104","TCP","54","45324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"34995","16.428100","172.30.1.205","172.30.1.104","TCP","74","37962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919654 TSecr=0 WS=128" +"34996","16.428315","172.30.1.104","172.30.1.205","TCP","54","135 > 45324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34997","16.428390","172.30.1.104","172.30.1.205","TCP","54","135 > 45324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"34998","16.428396","172.30.1.205","172.30.1.104","TCP","54","45324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"34999","16.428500","172.30.1.104","172.30.1.205","TCP","66","49671 > 37962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35000","16.428509","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35001","16.428886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35002","16.430318","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35003","16.430325","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35004","16.432203","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35005","16.432629","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35006","16.432635","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35007","16.434021","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35008","16.437023","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35009","16.437033","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35010","16.437999","172.30.1.205","172.30.1.104","TCP","74","45328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919664 TSecr=0 WS=128" +"35011","16.438350","172.30.1.104","172.30.1.205","TCP","66","135 > 45328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35012","16.438362","172.30.1.205","172.30.1.104","TCP","54","45328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35013","16.438717","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35014","16.439058","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35015","16.439067","172.30.1.205","172.30.1.104","TCP","54","45328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35016","16.441305","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35017","16.441761","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35018","16.441768","172.30.1.205","172.30.1.104","TCP","54","45328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35019","16.443622","172.30.1.205","172.30.1.104","TCP","54","45328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35020","16.443738","172.30.1.205","172.30.1.104","TCP","74","37966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919670 TSecr=0 WS=128" +"35021","16.443951","172.30.1.104","172.30.1.205","TCP","54","135 > 45328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35022","16.443977","172.30.1.104","172.30.1.205","TCP","54","135 > 45328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35023","16.443983","172.30.1.205","172.30.1.104","TCP","54","45328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35024","16.444075","172.30.1.104","172.30.1.205","TCP","66","49671 > 37966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35025","16.444083","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35026","16.444448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35027","16.445449","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35028","16.445458","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35029","16.447351","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35030","16.447789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35031","16.447796","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35032","16.449197","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35033","16.452172","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35034","16.452182","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35035","16.453161","172.30.1.205","172.30.1.104","TCP","74","45332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919679 TSecr=0 WS=128" +"35036","16.453519","172.30.1.104","172.30.1.205","TCP","66","135 > 45332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35037","16.453530","172.30.1.205","172.30.1.104","TCP","54","45332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35038","16.453886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35039","16.454214","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35040","16.454223","172.30.1.205","172.30.1.104","TCP","54","45332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35041","16.456410","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35042","16.456881","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35043","16.456888","172.30.1.205","172.30.1.104","TCP","54","45332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35044","16.458702","172.30.1.205","172.30.1.104","TCP","54","45332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35045","16.458822","172.30.1.205","172.30.1.104","TCP","74","37970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919685 TSecr=0 WS=128" +"35046","16.459031","172.30.1.104","172.30.1.205","TCP","54","135 > 45332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35047","16.459073","172.30.1.104","172.30.1.205","TCP","54","135 > 45332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35048","16.459079","172.30.1.205","172.30.1.104","TCP","54","45332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35049","16.459168","172.30.1.104","172.30.1.205","TCP","66","49671 > 37970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35050","16.459177","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35051","16.459523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35052","16.459842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35053","16.459849","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35054","16.461756","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35055","16.462228","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35056","16.462234","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35057","16.463612","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35058","16.466654","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35059","16.466664","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35060","16.467689","172.30.1.205","172.30.1.104","TCP","74","45336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919694 TSecr=0 WS=128" +"35061","16.468114","172.30.1.104","172.30.1.205","TCP","66","135 > 45336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35062","16.468126","172.30.1.205","172.30.1.104","TCP","54","45336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35063","16.468478","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35064","16.468831","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35065","16.468845","172.30.1.205","172.30.1.104","TCP","54","45336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35066","16.471157","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35067","16.471665","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35068","16.471673","172.30.1.205","172.30.1.104","TCP","54","45336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35069","16.473536","172.30.1.205","172.30.1.104","TCP","54","45336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35070","16.473665","172.30.1.205","172.30.1.104","TCP","74","37974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919700 TSecr=0 WS=128" +"35071","16.473879","172.30.1.104","172.30.1.205","TCP","54","135 > 45336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35072","16.473903","172.30.1.104","172.30.1.205","TCP","54","135 > 45336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35073","16.473910","172.30.1.205","172.30.1.104","TCP","54","45336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35074","16.474009","172.30.1.104","172.30.1.205","TCP","66","49671 > 37974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35075","16.474017","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35076","16.474361","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35077","16.474696","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35078","16.474706","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35079","16.476579","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35080","16.476992","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35081","16.476998","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35082","16.478351","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35083","16.483407","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35084","16.483417","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35085","16.484384","172.30.1.205","172.30.1.104","TCP","74","45340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919710 TSecr=0 WS=128" +"35086","16.484754","172.30.1.104","172.30.1.205","TCP","66","135 > 45340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35087","16.484767","172.30.1.205","172.30.1.104","TCP","54","45340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35088","16.485130","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35089","16.485467","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35090","16.485476","172.30.1.205","172.30.1.104","TCP","54","45340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35091","16.487661","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35092","16.488122","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35093","16.488128","172.30.1.205","172.30.1.104","TCP","54","45340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35094","16.489963","172.30.1.205","172.30.1.104","TCP","54","45340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35095","16.490097","172.30.1.205","172.30.1.104","TCP","74","37978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919716 TSecr=0 WS=128" +"35096","16.490312","172.30.1.104","172.30.1.205","TCP","54","135 > 45340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35097","16.490332","172.30.1.104","172.30.1.205","TCP","54","135 > 45340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35098","16.490345","172.30.1.205","172.30.1.104","TCP","54","45340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35099","16.490451","172.30.1.104","172.30.1.205","TCP","66","49671 > 37978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35100","16.490462","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35101","16.490892","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35102","16.491228","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35103","16.491238","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35104","16.493169","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35105","16.493583","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35106","16.493590","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35107","16.494955","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35108","16.498999","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35109","16.499010","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35110","16.500055","172.30.1.205","172.30.1.104","TCP","74","45344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919726 TSecr=0 WS=128" +"35111","16.500434","172.30.1.104","172.30.1.205","TCP","66","135 > 45344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35112","16.500449","172.30.1.205","172.30.1.104","TCP","54","45344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35113","16.500845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35114","16.501176","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35115","16.501185","172.30.1.205","172.30.1.104","TCP","54","45344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35116","16.503409","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35117","16.503855","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35118","16.503862","172.30.1.205","172.30.1.104","TCP","54","45344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35119","16.505699","172.30.1.205","172.30.1.104","TCP","54","45344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35120","16.505831","172.30.1.205","172.30.1.104","TCP","74","37982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919732 TSecr=0 WS=128" +"35121","16.506020","172.30.1.104","172.30.1.205","TCP","54","135 > 45344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35122","16.506051","172.30.1.104","172.30.1.205","TCP","54","135 > 45344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35123","16.506059","172.30.1.205","172.30.1.104","TCP","54","45344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35124","16.506168","172.30.1.104","172.30.1.205","TCP","66","49671 > 37982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35125","16.506177","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35126","16.506528","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35127","16.506862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35128","16.506871","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35129","16.508764","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35130","16.509259","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35131","16.509265","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35132","16.510635","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35133","16.513714","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35134","16.513725","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35135","16.514733","172.30.1.205","172.30.1.104","TCP","74","45348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919741 TSecr=0 WS=128" +"35136","16.515098","172.30.1.104","172.30.1.205","TCP","66","135 > 45348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35137","16.515109","172.30.1.205","172.30.1.104","TCP","54","45348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35138","16.515458","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35139","16.515807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35140","16.515816","172.30.1.205","172.30.1.104","TCP","54","45348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35141","16.518064","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35142","16.518521","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35143","16.518529","172.30.1.205","172.30.1.104","TCP","54","45348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35144","16.520363","172.30.1.205","172.30.1.104","TCP","54","45348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35145","16.520490","172.30.1.205","172.30.1.104","TCP","74","37986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919746 TSecr=0 WS=128" +"35146","16.520689","172.30.1.104","172.30.1.205","TCP","54","135 > 45348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35147","16.520789","172.30.1.104","172.30.1.205","TCP","54","135 > 45348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35148","16.520796","172.30.1.205","172.30.1.104","TCP","54","45348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35149","16.520890","172.30.1.104","172.30.1.205","TCP","66","49671 > 37986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35150","16.520898","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35151","16.521246","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35152","16.521584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35153","16.521592","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35154","16.523470","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35155","16.523884","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35156","16.523890","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35157","16.525270","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35158","16.528258","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35159","16.528267","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35160","16.529249","172.30.1.205","172.30.1.104","TCP","74","45352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919755 TSecr=0 WS=128" +"35161","16.529582","172.30.1.104","172.30.1.205","TCP","66","135 > 45352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35162","16.529593","172.30.1.205","172.30.1.104","TCP","54","45352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35163","16.529939","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35164","16.530287","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35165","16.530296","172.30.1.205","172.30.1.104","TCP","54","45352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35166","16.532470","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35167","16.532952","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35168","16.532958","172.30.1.205","172.30.1.104","TCP","54","45352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35169","16.533813","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35170","16.533864","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35171","16.533891","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35172","16.533921","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35173","16.533948","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35174","16.533976","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35175","16.533998","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35176","16.534025","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35177","16.534052","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35178","16.534077","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35179","16.534098","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35180","16.534171","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35181","16.534206","172.30.1.104","172.30.1.205","TCP","54","49671 > 37946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35182","16.534536","172.30.1.104","172.30.1.205","TCP","54","49671 > 37950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35183","16.534565","172.30.1.104","172.30.1.205","TCP","54","49671 > 37946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35184","16.534571","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35185","16.534603","172.30.1.104","172.30.1.205","TCP","54","49671 > 37950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35186","16.534606","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35187","16.534633","172.30.1.104","172.30.1.205","TCP","54","49671 > 37954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35188","16.534664","172.30.1.104","172.30.1.205","TCP","54","49671 > 37958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35189","16.534695","172.30.1.104","172.30.1.205","TCP","54","49671 > 37954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35190","16.534699","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35191","16.534723","172.30.1.104","172.30.1.205","TCP","54","49671 > 37962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35192","16.534754","172.30.1.104","172.30.1.205","TCP","54","49671 > 37958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35193","16.534758","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35194","16.534783","172.30.1.104","172.30.1.205","TCP","54","49671 > 37966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35195","16.534816","172.30.1.104","172.30.1.205","TCP","54","49671 > 37970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35196","16.534849","172.30.1.104","172.30.1.205","TCP","54","49671 > 37970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35197","16.534852","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35198","16.534879","172.30.1.104","172.30.1.205","TCP","54","49671 > 37974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35199","16.534930","172.30.1.104","172.30.1.205","TCP","54","49671 > 37974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35200","16.534934","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35201","16.534936","172.30.1.104","172.30.1.205","TCP","54","49671 > 37978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35202","16.534967","172.30.1.104","172.30.1.205","TCP","54","49671 > 37978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35203","16.534971","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35204","16.534998","172.30.1.104","172.30.1.205","TCP","54","49671 > 37982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35205","16.535031","172.30.1.104","172.30.1.205","TCP","54","49671 > 37986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35206","16.535068","172.30.1.104","172.30.1.205","TCP","54","49671 > 37982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35207","16.535073","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35208","16.535100","172.30.1.104","172.30.1.205","TCP","54","49671 > 37986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35209","16.535104","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35210","16.535127","172.30.1.104","172.30.1.205","TCP","54","49671 > 37942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35211","16.535159","172.30.1.104","172.30.1.205","TCP","54","49671 > 37942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35212","16.535163","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35213","16.535189","172.30.1.104","172.30.1.205","TCP","54","49671 > 37962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35214","16.535192","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35215","16.535215","172.30.1.104","172.30.1.205","TCP","54","49671 > 37966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35216","16.535218","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35217","16.535780","172.30.1.205","172.30.1.104","TCP","54","45352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35218","16.535899","172.30.1.205","172.30.1.104","TCP","74","37990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919762 TSecr=0 WS=128" +"35219","16.536065","172.30.1.104","172.30.1.205","TCP","54","135 > 45352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35220","16.536103","172.30.1.104","172.30.1.205","TCP","54","135 > 45352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35221","16.536108","172.30.1.205","172.30.1.104","TCP","54","45352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35222","16.536203","172.30.1.104","172.30.1.205","TCP","66","49671 > 37990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35223","16.536211","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35224","16.536559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35225","16.536901","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35226","16.536910","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35227","16.538785","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35228","16.539234","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35229","16.539240","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35230","16.540583","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35231","16.543671","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35232","16.543685","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35233","16.544629","172.30.1.205","172.30.1.104","TCP","74","45356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919771 TSecr=0 WS=128" +"35234","16.544985","172.30.1.104","172.30.1.205","TCP","66","135 > 45356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35235","16.544996","172.30.1.205","172.30.1.104","TCP","54","45356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35236","16.545359","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35237","16.545690","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35238","16.545699","172.30.1.205","172.30.1.104","TCP","54","45356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35239","16.547857","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35240","16.548319","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35241","16.548326","172.30.1.205","172.30.1.104","TCP","54","45356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35242","16.550137","172.30.1.205","172.30.1.104","TCP","54","45356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35243","16.550247","172.30.1.205","172.30.1.104","TCP","74","37994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919776 TSecr=0 WS=128" +"35244","16.550450","172.30.1.104","172.30.1.205","TCP","54","135 > 45356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35245","16.550478","172.30.1.104","172.30.1.205","TCP","54","135 > 45356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35246","16.550484","172.30.1.205","172.30.1.104","TCP","54","45356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35247","16.550577","172.30.1.104","172.30.1.205","TCP","66","49671 > 37994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35248","16.550585","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35249","16.550923","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35250","16.551267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35251","16.551276","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35252","16.553169","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35253","16.553623","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35254","16.553629","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35255","16.554967","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35256","16.557994","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35257","16.558010","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35258","16.558985","172.30.1.205","172.30.1.104","TCP","74","45360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919785 TSecr=0 WS=128" +"35259","16.559372","172.30.1.104","172.30.1.205","TCP","66","135 > 45360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35260","16.559383","172.30.1.205","172.30.1.104","TCP","54","45360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35261","16.559728","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35262","16.560100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35263","16.560108","172.30.1.205","172.30.1.104","TCP","54","45360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35264","16.562333","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35265","16.562837","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35266","16.562843","172.30.1.205","172.30.1.104","TCP","54","45360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35267","16.564671","172.30.1.205","172.30.1.104","TCP","54","45360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35268","16.564801","172.30.1.205","172.30.1.104","TCP","74","37998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919791 TSecr=0 WS=128" +"35269","16.564975","172.30.1.104","172.30.1.205","TCP","54","135 > 45360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35270","16.565003","172.30.1.104","172.30.1.205","TCP","54","135 > 45360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35271","16.565008","172.30.1.205","172.30.1.104","TCP","54","45360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35272","16.565105","172.30.1.104","172.30.1.205","TCP","66","49671 > 37998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35273","16.565113","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35274","16.565461","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35275","16.565818","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35276","16.565827","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35277","16.567691","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35278","16.568107","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35279","16.568113","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35280","16.569504","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35281","16.572494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35282","16.572503","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35283","16.573471","172.30.1.205","172.30.1.104","TCP","74","45364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919799 TSecr=0 WS=128" +"35284","16.573843","172.30.1.104","172.30.1.205","TCP","66","135 > 45364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35285","16.573854","172.30.1.205","172.30.1.104","TCP","54","45364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35286","16.574207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35287","16.574540","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35288","16.574549","172.30.1.205","172.30.1.104","TCP","54","45364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35289","16.576731","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35290","16.577272","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35291","16.577279","172.30.1.205","172.30.1.104","TCP","54","45364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35292","16.579087","172.30.1.205","172.30.1.104","TCP","54","45364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35293","16.579197","172.30.1.205","172.30.1.104","TCP","74","38002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919805 TSecr=0 WS=128" +"35294","16.579440","172.30.1.104","172.30.1.205","TCP","54","135 > 45364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35295","16.579472","172.30.1.104","172.30.1.205","TCP","54","135 > 45364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35296","16.579477","172.30.1.205","172.30.1.104","TCP","54","45364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35297","16.579582","172.30.1.104","172.30.1.205","TCP","66","49671 > 38002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35298","16.579590","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35299","16.579960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35300","16.580341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35301","16.580353","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35302","16.582244","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35303","16.582688","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35304","16.582694","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35305","16.584043","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35306","16.586968","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35307","16.586981","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35308","16.588008","172.30.1.205","172.30.1.104","TCP","74","45368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919814 TSecr=0 WS=128" +"35309","16.588408","172.30.1.104","172.30.1.205","TCP","66","135 > 45368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35310","16.588422","172.30.1.205","172.30.1.104","TCP","54","45368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35311","16.588818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35312","16.589204","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35313","16.589214","172.30.1.205","172.30.1.104","TCP","54","45368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35314","16.591399","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35315","16.593444","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35316","16.593450","172.30.1.205","172.30.1.104","TCP","54","45368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35317","16.595348","172.30.1.205","172.30.1.104","TCP","54","45368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35318","16.595460","172.30.1.205","172.30.1.104","TCP","74","38006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919821 TSecr=0 WS=128" +"35319","16.595699","172.30.1.104","172.30.1.205","TCP","54","135 > 45368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35320","16.595727","172.30.1.104","172.30.1.205","TCP","54","135 > 45368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35321","16.595733","172.30.1.205","172.30.1.104","TCP","54","45368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35322","16.595781","172.30.1.104","172.30.1.205","TCP","66","49671 > 38006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35323","16.595789","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35324","16.596141","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35325","16.596480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35326","16.596489","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35327","16.598390","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35328","16.598819","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35329","16.598826","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35330","16.600187","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35331","16.603194","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35332","16.603208","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35333","16.604223","172.30.1.205","172.30.1.104","TCP","74","45372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919830 TSecr=0 WS=128" +"35334","16.604620","172.30.1.104","172.30.1.205","TCP","66","135 > 45372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35335","16.604633","172.30.1.205","172.30.1.104","TCP","54","45372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35336","16.605032","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35337","16.605396","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35338","16.605405","172.30.1.205","172.30.1.104","TCP","54","45372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35339","16.607616","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35340","16.608070","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35341","16.608076","172.30.1.205","172.30.1.104","TCP","54","45372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35342","16.609947","172.30.1.205","172.30.1.104","TCP","54","45372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35343","16.610061","172.30.1.205","172.30.1.104","TCP","74","38010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919836 TSecr=0 WS=128" +"35344","16.610280","172.30.1.104","172.30.1.205","TCP","54","135 > 45372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35345","16.610311","172.30.1.104","172.30.1.205","TCP","54","135 > 45372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35346","16.610317","172.30.1.205","172.30.1.104","TCP","54","45372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35347","16.610429","172.30.1.104","172.30.1.205","TCP","66","49671 > 38010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35348","16.610437","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35349","16.610796","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35350","16.611153","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35351","16.611163","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35352","16.613093","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35353","16.613502","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35354","16.613509","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35355","16.614893","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35356","16.617820","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35357","16.617830","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35358","16.618784","172.30.1.205","172.30.1.104","TCP","74","45376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919845 TSecr=0 WS=128" +"35359","16.619129","172.30.1.104","172.30.1.205","TCP","66","135 > 45376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35360","16.619139","172.30.1.205","172.30.1.104","TCP","54","45376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35361","16.619488","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35362","16.619841","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35363","16.619858","172.30.1.205","172.30.1.104","TCP","54","45376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35364","16.622089","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35365","16.622521","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35366","16.622528","172.30.1.205","172.30.1.104","TCP","54","45376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35367","16.624352","172.30.1.205","172.30.1.104","TCP","54","45376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35368","16.624474","172.30.1.205","172.30.1.104","TCP","74","38014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919850 TSecr=0 WS=128" +"35369","16.624665","172.30.1.104","172.30.1.205","TCP","54","135 > 45376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35370","16.624688","172.30.1.104","172.30.1.205","TCP","54","135 > 45376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35371","16.624693","172.30.1.205","172.30.1.104","TCP","54","45376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35372","16.624812","172.30.1.104","172.30.1.205","TCP","66","49671 > 38014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35373","16.624821","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35374","16.625187","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35375","16.625551","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35376","16.625560","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35377","16.627464","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35378","16.627911","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35379","16.627918","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35380","16.629333","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35381","16.632225","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35382","16.632235","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35383","16.633221","172.30.1.205","172.30.1.104","TCP","74","45380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919859 TSecr=0 WS=128" +"35384","16.633562","172.30.1.104","172.30.1.205","TCP","66","135 > 45380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35385","16.633573","172.30.1.205","172.30.1.104","TCP","54","45380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35386","16.633929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35387","16.634292","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35388","16.634301","172.30.1.205","172.30.1.104","TCP","54","45380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35389","16.636544","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35390","16.637146","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35391","16.637153","172.30.1.205","172.30.1.104","TCP","54","45380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35392","16.638968","172.30.1.205","172.30.1.104","TCP","54","45380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35393","16.639085","172.30.1.205","172.30.1.104","TCP","74","38018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919865 TSecr=0 WS=128" +"35394","16.639275","172.30.1.104","172.30.1.205","TCP","54","135 > 45380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35395","16.639300","172.30.1.104","172.30.1.205","TCP","54","135 > 45380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35396","16.639307","172.30.1.205","172.30.1.104","TCP","54","45380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35397","16.639393","172.30.1.104","172.30.1.205","TCP","66","49671 > 38018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35398","16.639402","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35399","16.639749","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35400","16.640100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35401","16.640107","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35402","16.642010","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35403","16.642448","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35404","16.642455","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35405","16.643818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35406","16.646817","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35407","16.646827","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35408","16.647781","172.30.1.205","172.30.1.104","TCP","74","45384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919874 TSecr=0 WS=128" +"35409","16.648214","172.30.1.104","172.30.1.205","TCP","66","135 > 45384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35410","16.648225","172.30.1.205","172.30.1.104","TCP","54","45384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35411","16.648576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35412","16.648956","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35413","16.648966","172.30.1.205","172.30.1.104","TCP","54","45384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35414","16.651161","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35415","16.651665","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35416","16.651672","172.30.1.205","172.30.1.104","TCP","54","45384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35417","16.653535","172.30.1.205","172.30.1.104","TCP","54","45384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35418","16.653658","172.30.1.205","172.30.1.104","TCP","74","38022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919880 TSecr=0 WS=128" +"35419","16.653855","172.30.1.104","172.30.1.205","TCP","54","135 > 45384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35420","16.653883","172.30.1.104","172.30.1.205","TCP","54","135 > 45384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35421","16.653888","172.30.1.205","172.30.1.104","TCP","54","45384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35422","16.653977","172.30.1.104","172.30.1.205","TCP","66","49671 > 38022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35423","16.653986","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35424","16.654333","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35425","16.654675","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35426","16.654684","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35427","16.656600","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35428","16.657116","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35429","16.657123","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35430","16.658478","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35431","16.661534","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35432","16.661544","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35433","16.662493","172.30.1.205","172.30.1.104","TCP","74","45388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919888 TSecr=0 WS=128" +"35434","16.662915","172.30.1.104","172.30.1.205","TCP","66","135 > 45388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35435","16.662926","172.30.1.205","172.30.1.104","TCP","54","45388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35436","16.663276","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35437","16.663683","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35438","16.663692","172.30.1.205","172.30.1.104","TCP","54","45388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35439","16.665911","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35440","16.666401","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35441","16.666407","172.30.1.205","172.30.1.104","TCP","54","45388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35442","16.668232","172.30.1.205","172.30.1.104","TCP","54","45388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35443","16.668344","172.30.1.205","172.30.1.104","TCP","74","38026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919894 TSecr=0 WS=128" +"35444","16.668534","172.30.1.104","172.30.1.205","TCP","54","135 > 45388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35445","16.668571","172.30.1.104","172.30.1.205","TCP","54","135 > 45388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35446","16.668576","172.30.1.205","172.30.1.104","TCP","54","45388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35447","16.668677","172.30.1.104","172.30.1.205","TCP","66","49671 > 38026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35448","16.668685","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35449","16.669063","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35450","16.669400","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35451","16.669409","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35452","16.671287","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35453","16.671725","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35454","16.671731","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35455","16.673114","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35456","16.676120","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35457","16.676129","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35458","16.677087","172.30.1.205","172.30.1.104","TCP","74","45392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919903 TSecr=0 WS=128" +"35459","16.677532","172.30.1.104","172.30.1.205","TCP","66","135 > 45392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35460","16.677543","172.30.1.205","172.30.1.104","TCP","54","45392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35461","16.677899","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35462","16.678237","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35463","16.678246","172.30.1.205","172.30.1.104","TCP","54","45392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35464","16.680435","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35465","16.680945","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35466","16.680955","172.30.1.205","172.30.1.104","TCP","54","45392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35467","16.682861","172.30.1.205","172.30.1.104","TCP","54","45392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35468","16.682989","172.30.1.205","172.30.1.104","TCP","74","38030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919909 TSecr=0 WS=128" +"35469","16.683185","172.30.1.104","172.30.1.205","TCP","54","135 > 45392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35470","16.683211","172.30.1.104","172.30.1.205","TCP","54","135 > 45392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35471","16.683217","172.30.1.205","172.30.1.104","TCP","54","45392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35472","16.683343","172.30.1.104","172.30.1.205","TCP","66","49671 > 38030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35473","16.683351","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35474","16.683704","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35475","16.684080","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35476","16.684096","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35477","16.686017","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35478","16.686451","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35479","16.686457","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35480","16.687805","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35481","16.690845","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35482","16.690856","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35483","16.691810","172.30.1.205","172.30.1.104","TCP","74","45396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919918 TSecr=0 WS=128" +"35484","16.692215","172.30.1.104","172.30.1.205","TCP","66","135 > 45396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35485","16.692226","172.30.1.205","172.30.1.104","TCP","54","45396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35486","16.692572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35487","16.692933","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35488","16.692943","172.30.1.205","172.30.1.104","TCP","54","45396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35489","16.695137","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35490","16.695629","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35491","16.695636","172.30.1.205","172.30.1.104","TCP","54","45396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35492","16.697465","172.30.1.205","172.30.1.104","TCP","54","45396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35493","16.697575","172.30.1.205","172.30.1.104","TCP","74","38034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919923 TSecr=0 WS=128" +"35494","16.697786","172.30.1.104","172.30.1.205","TCP","54","135 > 45396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35495","16.697824","172.30.1.104","172.30.1.205","TCP","54","135 > 45396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35496","16.697830","172.30.1.205","172.30.1.104","TCP","54","45396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35497","16.697924","172.30.1.104","172.30.1.205","TCP","66","49671 > 38034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35498","16.697932","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35499","16.698277","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35500","16.698652","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35501","16.698659","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35502","16.700514","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35503","16.700991","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35504","16.700998","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35505","16.702347","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35506","16.705384","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35507","16.705394","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35508","16.706341","172.30.1.205","172.30.1.104","TCP","74","45400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919932 TSecr=0 WS=128" +"35509","16.706722","172.30.1.104","172.30.1.205","TCP","66","135 > 45400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35510","16.706732","172.30.1.205","172.30.1.104","TCP","54","45400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35511","16.707087","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35512","16.707477","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35513","16.707486","172.30.1.205","172.30.1.104","TCP","54","45400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35514","16.709707","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35515","16.710180","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35516","16.710186","172.30.1.205","172.30.1.104","TCP","54","45400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35517","16.711037","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35518","16.711086","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35519","16.711123","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35520","16.711152","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35521","16.711179","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35522","16.711208","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35523","16.711234","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35524","16.711261","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35525","16.711282","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35526","16.711309","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35527","16.711335","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35528","16.711407","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35529","16.711766","172.30.1.104","172.30.1.205","TCP","54","49671 > 37994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35530","16.711787","172.30.1.104","172.30.1.205","TCP","54","49671 > 37998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35531","16.711821","172.30.1.104","172.30.1.205","TCP","54","49671 > 37994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35532","16.711828","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35533","16.711860","172.30.1.104","172.30.1.205","TCP","54","49671 > 38002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35534","16.711887","172.30.1.104","172.30.1.205","TCP","54","49671 > 38006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35535","16.711928","172.30.1.104","172.30.1.205","TCP","54","49671 > 38006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35536","16.711933","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35537","16.711958","172.30.1.104","172.30.1.205","TCP","54","49671 > 38010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35538","16.711986","172.30.1.104","172.30.1.205","TCP","54","49671 > 38010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35539","16.711989","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35540","16.712016","172.30.1.104","172.30.1.205","TCP","54","49671 > 38014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35541","16.712044","172.30.1.104","172.30.1.205","TCP","54","49671 > 38014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35542","16.712047","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35543","16.712073","172.30.1.104","172.30.1.205","TCP","54","49671 > 38018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35544","16.712102","172.30.1.104","172.30.1.205","TCP","54","49671 > 38018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35545","16.712106","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35546","16.712131","172.30.1.104","172.30.1.205","TCP","54","49671 > 37998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35547","16.712134","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35548","16.712158","172.30.1.104","172.30.1.205","TCP","54","49671 > 38022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35549","16.712195","172.30.1.104","172.30.1.205","TCP","54","49671 > 38026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35550","16.712235","172.30.1.104","172.30.1.205","TCP","54","49671 > 38026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35551","16.712240","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35552","16.712261","172.30.1.104","172.30.1.205","TCP","54","49671 > 38030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35553","16.712289","172.30.1.104","172.30.1.205","TCP","54","49671 > 38030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35554","16.712294","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35555","16.712318","172.30.1.104","172.30.1.205","TCP","54","49671 > 38034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35556","16.712349","172.30.1.104","172.30.1.205","TCP","54","49671 > 38002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35557","16.712352","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35558","16.712378","172.30.1.104","172.30.1.205","TCP","54","49671 > 37990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35559","16.712406","172.30.1.104","172.30.1.205","TCP","54","49671 > 37990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35560","16.712409","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35561","16.712437","172.30.1.104","172.30.1.205","TCP","54","49671 > 38022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35562","16.712440","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35563","16.712466","172.30.1.104","172.30.1.205","TCP","54","49671 > 38034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35564","16.712468","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35565","16.713050","172.30.1.205","172.30.1.104","TCP","54","45400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35566","16.713165","172.30.1.205","172.30.1.104","TCP","74","38038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919939 TSecr=0 WS=128" +"35567","16.713352","172.30.1.104","172.30.1.205","TCP","54","135 > 45400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35568","16.713432","172.30.1.104","172.30.1.205","TCP","54","135 > 45400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35569","16.713437","172.30.1.205","172.30.1.104","TCP","54","45400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35570","16.713550","172.30.1.104","172.30.1.205","TCP","66","49671 > 38038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35571","16.713560","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35572","16.713940","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35573","16.714293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35574","16.714301","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35575","16.716176","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35576","16.716640","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35577","16.716646","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35578","16.718024","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35579","16.721034","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35580","16.721045","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35581","16.722004","172.30.1.205","172.30.1.104","TCP","74","45404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919948 TSecr=0 WS=128" +"35582","16.722412","172.30.1.104","172.30.1.205","TCP","66","135 > 45404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35583","16.722423","172.30.1.205","172.30.1.104","TCP","54","45404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35584","16.722781","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35585","16.723127","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35586","16.723135","172.30.1.205","172.30.1.104","TCP","54","45404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35587","16.725334","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35588","16.725791","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35589","16.725797","172.30.1.205","172.30.1.104","TCP","54","45404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35590","16.727603","172.30.1.205","172.30.1.104","TCP","54","45404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35591","16.727712","172.30.1.205","172.30.1.104","TCP","74","38042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919954 TSecr=0 WS=128" +"35592","16.727897","172.30.1.104","172.30.1.205","TCP","54","135 > 45404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35593","16.727924","172.30.1.104","172.30.1.205","TCP","54","135 > 45404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35594","16.727929","172.30.1.205","172.30.1.104","TCP","54","45404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35595","16.728022","172.30.1.104","172.30.1.205","TCP","66","49671 > 38042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35596","16.728030","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35597","16.728376","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35598","16.728709","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35599","16.728718","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35600","16.730628","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35601","16.731079","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35602","16.731085","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35603","16.732428","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35604","16.735330","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35605","16.735340","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35606","16.736290","172.30.1.205","172.30.1.104","TCP","74","45408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919962 TSecr=0 WS=128" +"35607","16.736635","172.30.1.104","172.30.1.205","TCP","66","135 > 45408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35608","16.736646","172.30.1.205","172.30.1.104","TCP","54","45408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35609","16.737022","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35610","16.737442","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35611","16.737456","172.30.1.205","172.30.1.104","TCP","54","45408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35612","16.739758","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35613","16.740249","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35614","16.740257","172.30.1.205","172.30.1.104","TCP","54","45408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35615","16.742120","172.30.1.205","172.30.1.104","TCP","54","45408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35616","16.742244","172.30.1.205","172.30.1.104","TCP","74","38046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919968 TSecr=0 WS=128" +"35617","16.742451","172.30.1.104","172.30.1.205","TCP","54","135 > 45408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35618","16.742509","172.30.1.104","172.30.1.205","TCP","54","135 > 45408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35619","16.742516","172.30.1.205","172.30.1.104","TCP","54","45408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35620","16.742595","172.30.1.104","172.30.1.205","TCP","66","49671 > 38046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35621","16.742604","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35622","16.742973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35623","16.743327","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35624","16.743336","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35625","16.745252","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35626","16.745684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35627","16.745691","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35628","16.747054","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35629","16.750000","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35630","16.750010","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35631","16.750971","172.30.1.205","172.30.1.104","TCP","74","45412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919977 TSecr=0 WS=128" +"35632","16.751310","172.30.1.104","172.30.1.205","TCP","66","135 > 45412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35633","16.751321","172.30.1.205","172.30.1.104","TCP","54","45412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35634","16.751675","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35635","16.752005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35636","16.752014","172.30.1.205","172.30.1.104","TCP","54","45412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35637","16.754247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35638","16.754693","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35639","16.754700","172.30.1.205","172.30.1.104","TCP","54","45412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35640","16.756517","172.30.1.205","172.30.1.104","TCP","54","45412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35641","16.756629","172.30.1.205","172.30.1.104","TCP","74","38050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919983 TSecr=0 WS=128" +"35642","16.756931","172.30.1.104","172.30.1.205","TCP","54","135 > 45412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35643","16.756940","172.30.1.104","172.30.1.205","TCP","54","135 > 45412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35644","16.756946","172.30.1.205","172.30.1.104","TCP","54","45412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35645","16.756952","172.30.1.104","172.30.1.205","TCP","66","49671 > 38050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35646","16.756960","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35647","16.757331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35648","16.757678","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35649","16.757687","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35650","16.759574","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35651","16.760014","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35652","16.760021","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35653","16.761414","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35654","16.764489","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35655","16.764500","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35656","16.765488","172.30.1.205","172.30.1.104","TCP","74","45416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919991 TSecr=0 WS=128" +"35657","16.765819","172.30.1.104","172.30.1.205","TCP","66","135 > 45416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35658","16.765830","172.30.1.205","172.30.1.104","TCP","54","45416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35659","16.766194","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35660","16.766519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35661","16.766528","172.30.1.205","172.30.1.104","TCP","54","45416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35662","16.768765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35663","16.769210","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35664","16.769217","172.30.1.205","172.30.1.104","TCP","54","45416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35665","16.771034","172.30.1.205","172.30.1.104","TCP","54","45416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35666","16.771146","172.30.1.205","172.30.1.104","TCP","74","38054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919997 TSecr=0 WS=128" +"35667","16.771355","172.30.1.104","172.30.1.205","TCP","54","135 > 45416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35668","16.771489","172.30.1.104","172.30.1.205","TCP","54","135 > 45416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35669","16.771495","172.30.1.205","172.30.1.104","TCP","54","45416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35670","16.771500","172.30.1.104","172.30.1.205","TCP","66","49671 > 38054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35671","16.771508","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35672","16.771872","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35673","16.772210","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35674","16.772217","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35675","16.774124","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35676","16.774537","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35677","16.774543","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35678","16.775906","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35679","16.779233","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35680","16.779242","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35681","16.780212","172.30.1.205","172.30.1.104","TCP","74","45420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920006 TSecr=0 WS=128" +"35682","16.780535","172.30.1.104","172.30.1.205","TCP","66","135 > 45420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35683","16.780546","172.30.1.205","172.30.1.104","TCP","54","45420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35684","16.780951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35685","16.781291","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35686","16.781299","172.30.1.205","172.30.1.104","TCP","54","45420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35687","16.783543","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35688","16.784052","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35689","16.784059","172.30.1.205","172.30.1.104","TCP","54","45420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35690","16.785921","172.30.1.205","172.30.1.104","TCP","54","45420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35691","16.786049","172.30.1.205","172.30.1.104","TCP","74","38058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920012 TSecr=0 WS=128" +"35692","16.786259","172.30.1.104","172.30.1.205","TCP","54","135 > 45420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35693","16.786269","172.30.1.104","172.30.1.205","TCP","54","135 > 45420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35694","16.786283","172.30.1.205","172.30.1.104","TCP","54","45420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35695","16.786380","172.30.1.104","172.30.1.205","TCP","66","49671 > 38058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35696","16.786389","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35697","16.786742","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35698","16.787115","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35699","16.787123","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35700","16.789068","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35701","16.789511","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35702","16.789517","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35703","16.790883","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35704","16.794282","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35705","16.794293","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35706","16.795276","172.30.1.205","172.30.1.104","TCP","74","45424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920021 TSecr=0 WS=128" +"35707","16.795599","172.30.1.104","172.30.1.205","TCP","66","135 > 45424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35708","16.795612","172.30.1.205","172.30.1.104","TCP","54","45424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35709","16.795974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35710","16.796296","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35711","16.796305","172.30.1.205","172.30.1.104","TCP","54","45424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35712","16.798533","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35713","16.798954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35714","16.798960","172.30.1.205","172.30.1.104","TCP","54","45424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35715","16.800793","172.30.1.205","172.30.1.104","TCP","54","45424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35716","16.800912","172.30.1.205","172.30.1.104","TCP","74","38062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920027 TSecr=0 WS=128" +"35717","16.801101","172.30.1.104","172.30.1.205","TCP","54","135 > 45424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35718","16.801110","172.30.1.104","172.30.1.205","TCP","54","135 > 45424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35719","16.801115","172.30.1.205","172.30.1.104","TCP","54","45424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35720","16.801225","172.30.1.104","172.30.1.205","TCP","66","49671 > 38062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35721","16.801235","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35722","16.801583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35723","16.801918","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35724","16.801927","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35725","16.803801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35726","16.804196","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35727","16.804203","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35728","16.805592","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35729","16.808431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35730","16.808452","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35731","16.809426","172.30.1.205","172.30.1.104","TCP","74","45428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920035 TSecr=0 WS=128" +"35732","16.809720","172.30.1.104","172.30.1.205","TCP","66","135 > 45428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35733","16.809731","172.30.1.205","172.30.1.104","TCP","54","45428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35734","16.810078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35735","16.810354","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35736","16.810363","172.30.1.205","172.30.1.104","TCP","54","45428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35737","16.812549","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35738","16.812921","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35739","16.812931","172.30.1.205","172.30.1.104","TCP","54","45428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35740","16.814834","172.30.1.205","172.30.1.104","TCP","54","45428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35741","16.814960","172.30.1.205","172.30.1.104","TCP","74","38066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920041 TSecr=0 WS=128" +"35742","16.815101","172.30.1.104","172.30.1.205","TCP","54","135 > 45428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35743","16.815128","172.30.1.104","172.30.1.205","TCP","54","135 > 45428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35744","16.815135","172.30.1.205","172.30.1.104","TCP","54","45428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35745","16.815239","172.30.1.104","172.30.1.205","TCP","66","49671 > 38066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35746","16.815247","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35747","16.815594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35748","16.815887","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35749","16.815895","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35750","16.817818","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35751","16.818212","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35752","16.818218","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35753","16.819576","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35754","16.822529","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35755","16.822541","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35756","16.823522","172.30.1.205","172.30.1.104","TCP","74","45432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920049 TSecr=0 WS=128" +"35757","16.823857","172.30.1.104","172.30.1.205","TCP","66","135 > 45432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35758","16.823868","172.30.1.205","172.30.1.104","TCP","54","45432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35759","16.824219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35760","16.824530","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35761","16.824542","172.30.1.205","172.30.1.104","TCP","54","45432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35762","16.826777","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35763","16.827193","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35764","16.827200","172.30.1.205","172.30.1.104","TCP","54","45432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35765","16.829039","172.30.1.205","172.30.1.104","TCP","54","45432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35766","16.829151","172.30.1.205","172.30.1.104","TCP","74","38070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920055 TSecr=0 WS=128" +"35767","16.829293","172.30.1.104","172.30.1.205","TCP","54","135 > 45432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35768","16.829320","172.30.1.104","172.30.1.205","TCP","54","135 > 45432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35769","16.829326","172.30.1.205","172.30.1.104","TCP","54","45432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35770","16.829403","172.30.1.104","172.30.1.205","TCP","66","49671 > 38070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35771","16.829412","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35772","16.829754","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35773","16.830024","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35774","16.830033","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35775","16.831914","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35776","16.832293","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35777","16.832303","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35778","16.833797","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35779","16.836695","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35780","16.836706","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35781","16.837714","172.30.1.205","172.30.1.104","TCP","74","45436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920064 TSecr=0 WS=128" +"35782","16.838018","172.30.1.104","172.30.1.205","TCP","66","135 > 45436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35783","16.838029","172.30.1.205","172.30.1.104","TCP","54","45436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35784","16.838383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35785","16.838657","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35786","16.838667","172.30.1.205","172.30.1.104","TCP","54","45436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35787","16.840879","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35788","16.841287","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35789","16.841293","172.30.1.205","172.30.1.104","TCP","54","45436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35790","16.843112","172.30.1.205","172.30.1.104","TCP","54","45436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35791","16.843222","172.30.1.205","172.30.1.104","TCP","74","38074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920069 TSecr=0 WS=128" +"35792","16.843394","172.30.1.104","172.30.1.205","TCP","54","135 > 45436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35793","16.843403","172.30.1.104","172.30.1.205","TCP","54","135 > 45436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35794","16.843409","172.30.1.205","172.30.1.104","TCP","54","45436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35795","16.843480","172.30.1.104","172.30.1.205","TCP","66","49671 > 38074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35796","16.843488","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35797","16.843856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35798","16.844126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35799","16.844134","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35800","16.846026","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35801","16.846398","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35802","16.846405","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35803","16.847784","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35804","16.850693","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35805","16.850703","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35806","16.851663","172.30.1.205","172.30.1.104","TCP","74","45440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920078 TSecr=0 WS=128" +"35807","16.851961","172.30.1.104","172.30.1.205","TCP","66","135 > 45440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35808","16.851973","172.30.1.205","172.30.1.104","TCP","54","45440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35809","16.852326","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35810","16.852611","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35811","16.852620","172.30.1.205","172.30.1.104","TCP","54","45440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35812","16.854849","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35813","16.855232","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35814","16.855239","172.30.1.205","172.30.1.104","TCP","54","45440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35815","16.857074","172.30.1.205","172.30.1.104","TCP","54","45440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35816","16.857191","172.30.1.205","172.30.1.104","TCP","74","38078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920083 TSecr=0 WS=128" +"35817","16.857354","172.30.1.104","172.30.1.205","TCP","54","135 > 45440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35818","16.857451","172.30.1.104","172.30.1.205","TCP","54","135 > 45440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35819","16.857457","172.30.1.205","172.30.1.104","TCP","54","45440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35820","16.857526","172.30.1.104","172.30.1.205","TCP","66","49671 > 38078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35821","16.857535","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35822","16.857885","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35823","16.858806","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35824","16.858815","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35825","16.860708","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35826","16.861112","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35827","16.861119","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35828","16.862481","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35829","16.865406","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35830","16.865415","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35831","16.866365","172.30.1.205","172.30.1.104","TCP","74","45444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920092 TSecr=0 WS=128" +"35832","16.866653","172.30.1.104","172.30.1.205","TCP","66","135 > 45444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35833","16.866665","172.30.1.205","172.30.1.104","TCP","54","45444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35834","16.867017","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35835","16.867305","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35836","16.867314","172.30.1.205","172.30.1.104","TCP","54","45444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35837","16.869529","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35838","16.869900","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35839","16.869907","172.30.1.205","172.30.1.104","TCP","54","45444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35840","16.871709","172.30.1.205","172.30.1.104","TCP","54","45444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35841","16.871827","172.30.1.205","172.30.1.104","TCP","74","38082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920098 TSecr=0 WS=128" +"35842","16.871985","172.30.1.104","172.30.1.205","TCP","54","135 > 45444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35843","16.872019","172.30.1.104","172.30.1.205","TCP","54","135 > 45444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35844","16.872025","172.30.1.205","172.30.1.104","TCP","54","45444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35845","16.872096","172.30.1.104","172.30.1.205","TCP","66","49671 > 38082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35846","16.872105","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35847","16.872448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35848","16.872711","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35849","16.872720","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35850","16.874630","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35851","16.875003","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35852","16.875009","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35853","16.876360","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35854","16.879298","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35855","16.879308","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35856","16.880260","172.30.1.205","172.30.1.104","TCP","74","45448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920106 TSecr=0 WS=128" +"35857","16.880566","172.30.1.104","172.30.1.205","TCP","66","135 > 45448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35858","16.880577","172.30.1.205","172.30.1.104","TCP","54","45448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35859","16.880974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35860","16.881322","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35861","16.881331","172.30.1.205","172.30.1.104","TCP","54","45448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35862","16.883500","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35863","16.883902","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35864","16.883909","172.30.1.205","172.30.1.104","TCP","54","45448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35865","16.884756","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35866","16.884825","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35867","16.884874","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35868","16.884911","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35869","16.884934","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35870","16.884963","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35871","16.884991","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35872","16.885015","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35873","16.885037","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35874","16.885047","172.30.1.104","172.30.1.205","TCP","54","49671 > 38042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35875","16.885092","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35876","16.885126","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35877","16.885165","172.30.1.104","172.30.1.205","TCP","54","49671 > 38042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35878","16.885172","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35879","16.885189","172.30.1.104","172.30.1.205","TCP","54","49671 > 38046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35880","16.885215","172.30.1.104","172.30.1.205","TCP","54","49671 > 38046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35881","16.885220","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35882","16.885241","172.30.1.104","172.30.1.205","TCP","54","49671 > 38050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35883","16.885248","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35884","16.885277","172.30.1.104","172.30.1.205","TCP","54","49671 > 38050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35885","16.885281","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35886","16.885424","172.30.1.104","172.30.1.205","TCP","54","49671 > 38054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35887","16.885446","172.30.1.104","172.30.1.205","TCP","54","49671 > 38058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35888","16.885472","172.30.1.104","172.30.1.205","TCP","54","49671 > 38054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35889","16.885477","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35890","16.885498","172.30.1.104","172.30.1.205","TCP","54","49671 > 38058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35891","16.885502","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35892","16.885523","172.30.1.104","172.30.1.205","TCP","54","49671 > 38062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35893","16.885562","172.30.1.104","172.30.1.205","TCP","54","49671 > 38066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35894","16.885648","172.30.1.104","172.30.1.205","TCP","54","49671 > 38070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35895","16.885672","172.30.1.104","172.30.1.205","TCP","54","49671 > 38074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35896","16.885697","172.30.1.104","172.30.1.205","TCP","54","49671 > 38062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35897","16.885701","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35898","16.885722","172.30.1.104","172.30.1.205","TCP","54","49671 > 38074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35899","16.885724","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35900","16.885756","172.30.1.104","172.30.1.205","TCP","54","49671 > 38066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35901","16.885760","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35902","16.885784","172.30.1.104","172.30.1.205","TCP","54","49671 > 38070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35903","16.885786","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35904","16.885810","172.30.1.104","172.30.1.205","TCP","54","49671 > 38078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35905","16.885835","172.30.1.104","172.30.1.205","TCP","54","49671 > 38082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35906","16.885861","172.30.1.104","172.30.1.205","TCP","54","49671 > 38078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35907","16.885864","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35908","16.885886","172.30.1.104","172.30.1.205","TCP","54","49671 > 38038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35909","16.885913","172.30.1.104","172.30.1.205","TCP","54","49671 > 38082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35910","16.885916","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35911","16.885938","172.30.1.104","172.30.1.205","TCP","54","49671 > 38038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"35912","16.885944","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"35913","16.886810","172.30.1.205","172.30.1.104","TCP","54","45448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35914","16.886921","172.30.1.205","172.30.1.104","TCP","74","38086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920113 TSecr=0 WS=128" +"35915","16.887099","172.30.1.104","172.30.1.205","TCP","54","135 > 45448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35916","16.887108","172.30.1.104","172.30.1.205","TCP","54","135 > 45448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35917","16.887112","172.30.1.205","172.30.1.104","TCP","54","45448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35918","16.887193","172.30.1.104","172.30.1.205","TCP","66","49671 > 38086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35919","16.887201","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35920","16.887552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35921","16.887829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35922","16.887838","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35923","16.889744","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35924","16.890670","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35925","16.890676","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35926","16.892032","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35927","16.894942","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35928","16.894951","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35929","16.895892","172.30.1.205","172.30.1.104","TCP","74","45452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920122 TSecr=0 WS=128" +"35930","16.896236","172.30.1.104","172.30.1.205","TCP","66","135 > 45452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35931","16.896254","172.30.1.205","172.30.1.104","TCP","54","45452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35932","16.896661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35933","16.896940","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35934","16.896950","172.30.1.205","172.30.1.104","TCP","54","45452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35935","16.899174","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35936","16.899604","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35937","16.899611","172.30.1.205","172.30.1.104","TCP","54","45452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35938","16.901485","172.30.1.205","172.30.1.104","TCP","54","45452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35939","16.901600","172.30.1.205","172.30.1.104","TCP","74","38090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920128 TSecr=0 WS=128" +"35940","16.901741","172.30.1.104","172.30.1.205","TCP","54","135 > 45452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35941","16.901780","172.30.1.104","172.30.1.205","TCP","54","135 > 45452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35942","16.901786","172.30.1.205","172.30.1.104","TCP","54","45452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35943","16.901891","172.30.1.104","172.30.1.205","TCP","66","49671 > 38090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35944","16.901899","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35945","16.902247","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35946","16.902657","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35947","16.902666","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35948","16.904526","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35949","16.905275","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35950","16.905282","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35951","16.906653","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35952","16.909659","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35953","16.909669","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35954","16.910640","172.30.1.205","172.30.1.104","TCP","74","45456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920137 TSecr=0 WS=128" +"35955","16.910941","172.30.1.104","172.30.1.205","TCP","66","135 > 45456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35956","16.910952","172.30.1.205","172.30.1.104","TCP","54","45456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35957","16.911305","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35958","16.911593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35959","16.911614","172.30.1.205","172.30.1.104","TCP","54","45456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35960","16.913892","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35961","16.914315","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35962","16.914322","172.30.1.205","172.30.1.104","TCP","54","45456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35963","16.916163","172.30.1.205","172.30.1.104","TCP","54","45456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35964","16.916278","172.30.1.205","172.30.1.104","TCP","74","38094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920142 TSecr=0 WS=128" +"35965","16.916437","172.30.1.104","172.30.1.205","TCP","54","135 > 45456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35966","16.916447","172.30.1.104","172.30.1.205","TCP","54","135 > 45456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35967","16.916452","172.30.1.205","172.30.1.104","TCP","54","45456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35968","16.916553","172.30.1.104","172.30.1.205","TCP","66","49671 > 38094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35969","16.916562","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35970","16.916948","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35971","16.917263","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35972","16.917272","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35973","16.919179","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35974","16.919553","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"35975","16.919559","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"35976","16.920955","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"35977","16.923958","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"35978","16.923968","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"35979","16.924940","172.30.1.205","172.30.1.104","TCP","74","45460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920151 TSecr=0 WS=128" +"35980","16.925268","172.30.1.104","172.30.1.205","TCP","66","135 > 45460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35981","16.925279","172.30.1.205","172.30.1.104","TCP","54","45460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35982","16.925636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"35983","16.925938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35984","16.925948","172.30.1.205","172.30.1.104","TCP","54","45460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35985","16.928170","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"35986","16.928642","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"35987","16.928649","172.30.1.205","172.30.1.104","TCP","54","45460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35988","16.930504","172.30.1.205","172.30.1.104","TCP","54","45460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"35989","16.930619","172.30.1.205","172.30.1.104","TCP","74","38098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920157 TSecr=0 WS=128" +"35990","16.930801","172.30.1.104","172.30.1.205","TCP","54","135 > 45460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35991","16.930828","172.30.1.104","172.30.1.205","TCP","54","135 > 45460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"35992","16.930835","172.30.1.205","172.30.1.104","TCP","54","45460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"35993","16.930903","172.30.1.104","172.30.1.205","TCP","66","49671 > 38098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"35994","16.930912","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"35995","16.931280","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"35996","16.931568","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"35997","16.931577","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"35998","16.933492","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"35999","16.934236","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36000","16.934244","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36001","16.935628","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36002","16.938630","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36003","16.938640","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36004","16.939633","172.30.1.205","172.30.1.104","TCP","74","45464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920166 TSecr=0 WS=128" +"36005","16.939965","172.30.1.104","172.30.1.205","TCP","66","135 > 45464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36006","16.939978","172.30.1.205","172.30.1.104","TCP","54","45464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36007","16.940334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36008","16.940636","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36009","16.940645","172.30.1.205","172.30.1.104","TCP","54","45464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36010","16.942876","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36011","16.943350","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36012","16.943357","172.30.1.205","172.30.1.104","TCP","54","45464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36013","16.945210","172.30.1.205","172.30.1.104","TCP","54","45464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36014","16.945325","172.30.1.205","172.30.1.104","TCP","74","38102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920171 TSecr=0 WS=128" +"36015","16.945499","172.30.1.104","172.30.1.205","TCP","54","135 > 45464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36016","16.945512","172.30.1.104","172.30.1.205","TCP","54","135 > 45464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36017","16.945520","172.30.1.205","172.30.1.104","TCP","54","45464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36018","16.945590","172.30.1.104","172.30.1.205","TCP","66","49671 > 38102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36019","16.945601","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36020","16.945990","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36021","16.946321","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36022","16.946332","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36023","16.948255","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36024","16.948636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36025","16.948643","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36026","16.950044","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36027","16.952975","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36028","16.952984","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36029","16.953935","172.30.1.205","172.30.1.104","TCP","74","45468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920180 TSecr=0 WS=128" +"36030","16.954241","172.30.1.104","172.30.1.205","TCP","66","135 > 45468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36031","16.954251","172.30.1.205","172.30.1.104","TCP","54","45468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36032","16.954604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36033","16.954948","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36034","16.954957","172.30.1.205","172.30.1.104","TCP","54","45468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36035","16.957171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36036","16.957566","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36037","16.957573","172.30.1.205","172.30.1.104","TCP","54","45468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36038","16.959392","172.30.1.205","172.30.1.104","TCP","54","45468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36039","16.959504","172.30.1.205","172.30.1.104","TCP","74","38106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920185 TSecr=0 WS=128" +"36040","16.959643","172.30.1.104","172.30.1.205","TCP","54","135 > 45468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36041","16.959654","172.30.1.104","172.30.1.205","TCP","54","135 > 45468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36042","16.959660","172.30.1.205","172.30.1.104","TCP","54","45468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36043","16.959770","172.30.1.104","172.30.1.205","TCP","66","49671 > 38106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36044","16.959779","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36045","16.960143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36046","16.960975","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36047","16.960983","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36048","16.962861","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36049","16.963310","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36050","16.963317","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36051","16.964669","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36052","16.967638","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36053","16.967658","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36054","16.968635","172.30.1.205","172.30.1.104","TCP","74","45472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920195 TSecr=0 WS=128" +"36055","16.968926","172.30.1.104","172.30.1.205","TCP","66","135 > 45472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36056","16.968937","172.30.1.205","172.30.1.104","TCP","54","45472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36057","16.969300","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36058","16.969584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36059","16.969594","172.30.1.205","172.30.1.104","TCP","54","45472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36060","16.971823","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36061","16.972234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36062","16.972241","172.30.1.205","172.30.1.104","TCP","54","45472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36063","16.974125","172.30.1.205","172.30.1.104","TCP","54","45472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36064","16.974238","172.30.1.205","172.30.1.104","TCP","74","38110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920200 TSecr=0 WS=128" +"36065","16.974390","172.30.1.104","172.30.1.205","TCP","54","135 > 45472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36066","16.974426","172.30.1.104","172.30.1.205","TCP","54","135 > 45472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36067","16.974432","172.30.1.205","172.30.1.104","TCP","54","45472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36068","16.974512","172.30.1.104","172.30.1.205","TCP","66","49671 > 38110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36069","16.974520","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36070","16.974863","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36071","16.975166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36072","16.975175","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36073","16.977086","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36074","16.977598","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36075","16.977604","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36076","16.978981","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36077","16.982035","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36078","16.982049","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36079","16.983099","172.30.1.205","172.30.1.104","TCP","74","45476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920209 TSecr=0 WS=128" +"36080","16.983525","172.30.1.104","172.30.1.205","TCP","66","135 > 45476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36081","16.983538","172.30.1.205","172.30.1.104","TCP","54","45476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36082","16.983902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36083","16.984202","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36084","16.984213","172.30.1.205","172.30.1.104","TCP","54","45476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36085","16.986513","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36086","16.986918","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36087","16.986926","172.30.1.205","172.30.1.104","TCP","54","45476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36088","16.988760","172.30.1.205","172.30.1.104","TCP","54","45476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36089","16.988904","172.30.1.205","172.30.1.104","TCP","74","38114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920215 TSecr=0 WS=128" +"36090","16.989021","172.30.1.104","172.30.1.205","TCP","54","135 > 45476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36091","16.989032","172.30.1.104","172.30.1.205","TCP","54","135 > 45476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36092","16.989039","172.30.1.205","172.30.1.104","TCP","54","45476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36093","16.989211","172.30.1.104","172.30.1.205","TCP","66","49671 > 38114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36094","16.989227","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36095","16.989644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36096","16.989960","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36097","16.989969","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36098","16.991888","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36099","16.992246","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36100","16.992253","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36101","16.993685","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36102","16.996770","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36103","16.996790","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36104","16.997786","172.30.1.205","172.30.1.104","TCP","74","45480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920224 TSecr=0 WS=128" +"36105","16.998123","172.30.1.104","172.30.1.205","TCP","66","135 > 45480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36106","16.998135","172.30.1.205","172.30.1.104","TCP","54","45480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36107","16.998497","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36108","16.999069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36109","16.999085","172.30.1.205","172.30.1.104","TCP","54","45480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36110","17.001329","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36111","17.001744","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36112","17.001751","172.30.1.205","172.30.1.104","TCP","54","45480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36113","17.003568","172.30.1.205","172.30.1.104","TCP","54","45480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36114","17.003691","172.30.1.205","172.30.1.104","TCP","74","38118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920230 TSecr=0 WS=128" +"36115","17.003852","172.30.1.104","172.30.1.205","TCP","54","135 > 45480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36116","17.003864","172.30.1.104","172.30.1.205","TCP","54","135 > 45480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36117","17.003871","172.30.1.205","172.30.1.104","TCP","54","45480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36118","17.004031","172.30.1.104","172.30.1.205","TCP","66","49671 > 38118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36119","17.004039","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36120","17.004385","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36121","17.004676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36122","17.004688","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36123","17.006598","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36124","17.007002","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36125","17.007008","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36126","17.008430","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36127","17.011419","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36128","17.011430","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36129","17.012477","172.30.1.205","172.30.1.104","TCP","74","45484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920238 TSecr=0 WS=128" +"36130","17.012823","172.30.1.104","172.30.1.205","TCP","66","135 > 45484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36131","17.012837","172.30.1.205","172.30.1.104","TCP","54","45484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36132","17.013215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36133","17.013536","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36134","17.013545","172.30.1.205","172.30.1.104","TCP","54","45484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36135","17.015789","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36136","17.016234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36137","17.016240","172.30.1.205","172.30.1.104","TCP","54","45484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36138","17.018097","172.30.1.205","172.30.1.104","TCP","54","45484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36139","17.018233","172.30.1.205","172.30.1.104","TCP","74","38122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920244 TSecr=0 WS=128" +"36140","17.018356","172.30.1.104","172.30.1.205","TCP","54","135 > 45484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36141","17.018382","172.30.1.104","172.30.1.205","TCP","54","135 > 45484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36142","17.018390","172.30.1.205","172.30.1.104","TCP","54","45484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36143","17.018527","172.30.1.104","172.30.1.205","TCP","66","49671 > 38122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36144","17.018536","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36145","17.018883","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36146","17.019179","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36147","17.019189","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36148","17.021138","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36149","17.021532","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36150","17.021538","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36151","17.022920","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36152","17.025827","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36153","17.025838","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36154","17.026875","172.30.1.205","172.30.1.104","TCP","74","45488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920253 TSecr=0 WS=128" +"36155","17.027195","172.30.1.104","172.30.1.205","TCP","66","135 > 45488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36156","17.027208","172.30.1.205","172.30.1.104","TCP","54","45488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36157","17.027574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36158","17.027878","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36159","17.027887","172.30.1.205","172.30.1.104","TCP","54","45488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36160","17.030154","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36161","17.030569","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36162","17.030576","172.30.1.205","172.30.1.104","TCP","54","45488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36163","17.032421","172.30.1.205","172.30.1.104","TCP","54","45488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36164","17.032548","172.30.1.205","172.30.1.104","TCP","74","38126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920258 TSecr=0 WS=128" +"36165","17.032736","172.30.1.104","172.30.1.205","TCP","54","135 > 45488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36166","17.032753","172.30.1.104","172.30.1.205","TCP","54","135 > 45488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36167","17.032761","172.30.1.205","172.30.1.104","TCP","54","45488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36168","17.032865","172.30.1.104","172.30.1.205","TCP","66","49671 > 38126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36169","17.032873","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36170","17.033238","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36171","17.033561","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36172","17.033570","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36173","17.035483","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36174","17.035884","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36175","17.035890","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36176","17.037289","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36177","17.040204","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36178","17.040217","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36179","17.041278","172.30.1.205","172.30.1.104","TCP","74","45492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920267 TSecr=0 WS=128" +"36180","17.041575","172.30.1.104","172.30.1.205","TCP","66","135 > 45492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36181","17.041587","172.30.1.205","172.30.1.104","TCP","54","45492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36182","17.041948","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36183","17.042278","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36184","17.042287","172.30.1.205","172.30.1.104","TCP","54","45492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36185","17.044526","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36186","17.045014","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36187","17.045021","172.30.1.205","172.30.1.104","TCP","54","45492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36188","17.046853","172.30.1.205","172.30.1.104","TCP","54","45492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36189","17.046970","172.30.1.205","172.30.1.104","TCP","74","38130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920273 TSecr=0 WS=128" +"36190","17.047201","172.30.1.104","172.30.1.205","TCP","54","135 > 45492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36191","17.047225","172.30.1.104","172.30.1.205","TCP","54","135 > 45492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36192","17.047232","172.30.1.205","172.30.1.104","TCP","54","45492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36193","17.047273","172.30.1.104","172.30.1.205","TCP","66","49671 > 38130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36194","17.047282","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36195","17.047650","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36196","17.047958","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36197","17.047968","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36198","17.049885","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36199","17.050285","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36200","17.050291","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36201","17.051691","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36202","17.054649","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36203","17.054659","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36204","17.055602","172.30.1.205","172.30.1.104","TCP","74","45496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920282 TSecr=0 WS=128" +"36205","17.055967","172.30.1.104","172.30.1.205","TCP","66","135 > 45496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36206","17.055978","172.30.1.205","172.30.1.104","TCP","54","45496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36207","17.056347","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36208","17.056688","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36209","17.056697","172.30.1.205","172.30.1.104","TCP","54","45496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36210","17.058902","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36211","17.059365","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36212","17.059372","172.30.1.205","172.30.1.104","TCP","54","45496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36213","17.060252","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36214","17.060301","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36215","17.060328","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36216","17.060358","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36217","17.060381","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36218","17.060409","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36219","17.060432","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36220","17.060460","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36221","17.060486","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36222","17.060508","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36223","17.060535","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36224","17.060574","172.30.1.104","172.30.1.205","TCP","54","49671 > 38090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36225","17.060596","172.30.1.104","172.30.1.205","TCP","54","49671 > 38094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36226","17.060640","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36227","17.060746","172.30.1.104","172.30.1.205","TCP","54","49671 > 38090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36228","17.060754","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36229","17.060787","172.30.1.104","172.30.1.205","TCP","54","49671 > 38098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36230","17.060805","172.30.1.104","172.30.1.205","TCP","54","49671 > 38094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36231","17.060810","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36232","17.060829","172.30.1.104","172.30.1.205","TCP","54","49671 > 38098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36233","17.060833","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36234","17.060855","172.30.1.104","172.30.1.205","TCP","54","49671 > 38102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36235","17.060882","172.30.1.104","172.30.1.205","TCP","54","49671 > 38102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36236","17.060886","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36237","17.060910","172.30.1.104","172.30.1.205","TCP","54","49671 > 38106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36238","17.061071","172.30.1.104","172.30.1.205","TCP","54","49671 > 38110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36239","17.061094","172.30.1.104","172.30.1.205","TCP","54","49671 > 38106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36240","17.061099","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36241","17.061120","172.30.1.104","172.30.1.205","TCP","54","49671 > 38110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36242","17.061123","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36243","17.061148","172.30.1.104","172.30.1.205","TCP","54","49671 > 38114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36244","17.061172","172.30.1.104","172.30.1.205","TCP","54","49671 > 38118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36245","17.061197","172.30.1.104","172.30.1.205","TCP","54","49671 > 38122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36246","17.061221","172.30.1.104","172.30.1.205","TCP","54","49671 > 38114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36247","17.061225","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36248","17.061246","172.30.1.104","172.30.1.205","TCP","54","49671 > 38126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36249","17.061271","172.30.1.104","172.30.1.205","TCP","54","49671 > 38126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36250","17.061274","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36251","17.061374","172.30.1.104","172.30.1.205","TCP","54","49671 > 38130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36252","17.061399","172.30.1.104","172.30.1.205","TCP","54","49671 > 38130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36253","17.061403","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36254","17.061426","172.30.1.104","172.30.1.205","TCP","54","49671 > 38118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36255","17.061428","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36256","17.061452","172.30.1.104","172.30.1.205","TCP","54","49671 > 38122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36257","17.061454","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36258","17.061479","172.30.1.104","172.30.1.205","TCP","54","49671 > 38086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36259","17.061600","172.30.1.104","172.30.1.205","TCP","54","49671 > 38086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36260","17.061604","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36261","17.062269","172.30.1.205","172.30.1.104","TCP","54","45496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36262","17.062387","172.30.1.205","172.30.1.104","TCP","74","38134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920288 TSecr=0 WS=128" +"36263","17.062537","172.30.1.104","172.30.1.205","TCP","54","135 > 45496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36264","17.062567","172.30.1.104","172.30.1.205","TCP","54","135 > 45496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36265","17.062572","172.30.1.205","172.30.1.104","TCP","54","45496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36266","17.062706","172.30.1.104","172.30.1.205","TCP","66","49671 > 38134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36267","17.062714","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36268","17.063068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36269","17.063380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36270","17.063386","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36271","17.065305","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36272","17.065692","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36273","17.065698","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36274","17.067060","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36275","17.070080","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36276","17.070090","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36277","17.071097","172.30.1.205","172.30.1.104","TCP","74","45500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920297 TSecr=0 WS=128" +"36278","17.071465","172.30.1.104","172.30.1.205","TCP","66","135 > 45500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36279","17.071483","172.30.1.205","172.30.1.104","TCP","54","45500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36280","17.071847","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36281","17.072162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36282","17.072171","172.30.1.205","172.30.1.104","TCP","54","45500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36283","17.074393","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36284","17.074913","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36285","17.074919","172.30.1.205","172.30.1.104","TCP","54","45500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36286","17.076747","172.30.1.205","172.30.1.104","TCP","54","45500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36287","17.076881","172.30.1.205","172.30.1.104","TCP","74","38138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920303 TSecr=0 WS=128" +"36288","17.077063","172.30.1.104","172.30.1.205","TCP","54","135 > 45500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36289","17.077118","172.30.1.104","172.30.1.205","TCP","54","135 > 45500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36290","17.077124","172.30.1.205","172.30.1.104","TCP","54","45500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36291","17.077232","172.30.1.104","172.30.1.205","TCP","66","49671 > 38138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36292","17.077247","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36293","17.077590","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36294","17.077868","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36295","17.077877","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36296","17.079761","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36297","17.080218","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36298","17.080224","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36299","17.081615","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36300","17.084575","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36301","17.084587","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36302","17.085608","172.30.1.205","172.30.1.104","TCP","74","45504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920312 TSecr=0 WS=128" +"36303","17.085939","172.30.1.104","172.30.1.205","TCP","66","135 > 45504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36304","17.085950","172.30.1.205","172.30.1.104","TCP","54","45504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36305","17.086309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36306","17.086728","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36307","17.086737","172.30.1.205","172.30.1.104","TCP","54","45504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36308","17.088976","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36309","17.089372","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36310","17.089379","172.30.1.205","172.30.1.104","TCP","54","45504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36311","17.091204","172.30.1.205","172.30.1.104","TCP","54","45504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36312","17.091317","172.30.1.205","172.30.1.104","TCP","74","38142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920317 TSecr=0 WS=128" +"36313","17.091478","172.30.1.104","172.30.1.205","TCP","54","135 > 45504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36314","17.091502","172.30.1.104","172.30.1.205","TCP","54","135 > 45504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36315","17.091509","172.30.1.205","172.30.1.104","TCP","54","45504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36316","17.091587","172.30.1.104","172.30.1.205","TCP","66","49671 > 38142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36317","17.091596","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36318","17.091956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36319","17.093248","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36320","17.093257","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36321","17.095170","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36322","17.095563","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36323","17.095570","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36324","17.096967","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36325","17.099916","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36326","17.099926","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36327","17.100923","172.30.1.205","172.30.1.104","TCP","74","45508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920327 TSecr=0 WS=128" +"36328","17.101248","172.30.1.104","172.30.1.205","TCP","66","135 > 45508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36329","17.101260","172.30.1.205","172.30.1.104","TCP","54","45508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36330","17.101621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36331","17.101898","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36332","17.101907","172.30.1.205","172.30.1.104","TCP","54","45508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36333","17.104129","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36334","17.104555","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36335","17.104563","172.30.1.205","172.30.1.104","TCP","54","45508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36336","17.106404","172.30.1.205","172.30.1.104","TCP","54","45508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36337","17.106528","172.30.1.205","172.30.1.104","TCP","74","38146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920332 TSecr=0 WS=128" +"36338","17.106714","172.30.1.104","172.30.1.205","TCP","54","135 > 45508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36339","17.106725","172.30.1.104","172.30.1.205","TCP","54","135 > 45508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36340","17.106732","172.30.1.205","172.30.1.104","TCP","54","45508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36341","17.106803","172.30.1.104","172.30.1.205","TCP","66","49671 > 38146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36342","17.106812","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36343","17.107162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36344","17.107471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36345","17.107480","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36346","17.109392","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36347","17.109776","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36348","17.109780","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36349","17.111141","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36350","17.113981","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36351","17.113991","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36352","17.114968","172.30.1.205","172.30.1.104","TCP","74","45512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920341 TSecr=0 WS=128" +"36353","17.115650","172.30.1.104","172.30.1.205","TCP","66","135 > 45512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36354","17.115661","172.30.1.205","172.30.1.104","TCP","54","45512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36355","17.116012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36356","17.116390","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36357","17.116401","172.30.1.205","172.30.1.104","TCP","54","45512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36358","17.118627","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36359","17.119077","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36360","17.119087","172.30.1.205","172.30.1.104","TCP","54","45512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36361","17.121034","172.30.1.205","172.30.1.104","TCP","54","45512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36362","17.121165","172.30.1.205","172.30.1.104","TCP","74","38150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920347 TSecr=0 WS=128" +"36363","17.121369","172.30.1.104","172.30.1.205","TCP","54","135 > 45512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36364","17.121385","172.30.1.104","172.30.1.205","TCP","54","135 > 45512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36365","17.121391","172.30.1.205","172.30.1.104","TCP","54","45512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36366","17.121461","172.30.1.104","172.30.1.205","TCP","66","49671 > 38150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36367","17.121470","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36368","17.121821","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36369","17.122131","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36370","17.122141","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36371","17.124051","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36372","17.124442","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36373","17.124449","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36374","17.125842","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36375","17.128807","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36376","17.128817","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36377","17.129785","172.30.1.205","172.30.1.104","TCP","74","45516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920356 TSecr=0 WS=128" +"36378","17.130130","172.30.1.104","172.30.1.205","TCP","66","135 > 45516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36379","17.130142","172.30.1.205","172.30.1.104","TCP","54","45516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36380","17.130498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36381","17.130798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36382","17.130807","172.30.1.205","172.30.1.104","TCP","54","45516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36383","17.133024","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36384","17.133409","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36385","17.133416","172.30.1.205","172.30.1.104","TCP","54","45516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36386","17.135238","172.30.1.205","172.30.1.104","TCP","54","45516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36387","17.135353","172.30.1.205","172.30.1.104","TCP","74","38154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920361 TSecr=0 WS=128" +"36388","17.135491","172.30.1.104","172.30.1.205","TCP","54","135 > 45516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36389","17.135524","172.30.1.104","172.30.1.205","TCP","54","135 > 45516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36390","17.135530","172.30.1.205","172.30.1.104","TCP","54","45516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36391","17.135630","172.30.1.104","172.30.1.205","TCP","66","49671 > 38154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36392","17.135639","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36393","17.135988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36394","17.136259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36395","17.136268","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36396","17.138170","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36397","17.138521","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36398","17.138528","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36399","17.139895","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36400","17.142822","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36401","17.142834","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36402","17.143807","172.30.1.205","172.30.1.104","TCP","74","45520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920370 TSecr=0 WS=128" +"36403","17.144133","172.30.1.104","172.30.1.205","TCP","66","135 > 45520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36404","17.144145","172.30.1.205","172.30.1.104","TCP","54","45520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36405","17.144493","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36406","17.144786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36407","17.144796","172.30.1.205","172.30.1.104","TCP","54","45520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36408","17.147015","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36409","17.147463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36410","17.147470","172.30.1.205","172.30.1.104","TCP","54","45520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36411","17.149327","172.30.1.205","172.30.1.104","TCP","54","45520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36412","17.149448","172.30.1.205","172.30.1.104","TCP","74","38158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920375 TSecr=0 WS=128" +"36413","17.149590","172.30.1.104","172.30.1.205","TCP","54","135 > 45520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36414","17.149609","172.30.1.104","172.30.1.205","TCP","54","135 > 45520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36415","17.149616","172.30.1.205","172.30.1.104","TCP","54","45520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36416","17.149740","172.30.1.104","172.30.1.205","TCP","66","49671 > 38158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36417","17.149749","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36418","17.150093","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36419","17.150392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36420","17.150399","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36421","17.152268","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36422","17.152704","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36423","17.152711","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36424","17.154100","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36425","17.157113","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36426","17.157124","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36427","17.158098","172.30.1.205","172.30.1.104","TCP","74","45524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920384 TSecr=0 WS=128" +"36428","17.158394","172.30.1.104","172.30.1.205","TCP","66","135 > 45524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36429","17.158405","172.30.1.205","172.30.1.104","TCP","54","45524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36430","17.158758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36431","17.159051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36432","17.159060","172.30.1.205","172.30.1.104","TCP","54","45524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36433","17.161331","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36434","17.161754","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36435","17.161760","172.30.1.205","172.30.1.104","TCP","54","45524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36436","17.163577","172.30.1.205","172.30.1.104","TCP","54","45524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36437","17.163698","172.30.1.205","172.30.1.104","TCP","74","38162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920390 TSecr=0 WS=128" +"36438","17.163843","172.30.1.104","172.30.1.205","TCP","54","135 > 45524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36439","17.163879","172.30.1.104","172.30.1.205","TCP","54","135 > 45524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36440","17.163885","172.30.1.205","172.30.1.104","TCP","54","45524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36441","17.163977","172.30.1.104","172.30.1.205","TCP","66","49671 > 38162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36442","17.163986","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36443","17.164331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36444","17.164636","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36445","17.164645","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36446","17.166572","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36447","17.166928","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36448","17.166934","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36449","17.168303","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36450","17.171272","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36451","17.171288","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36452","17.172284","172.30.1.205","172.30.1.104","TCP","74","45528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920398 TSecr=0 WS=128" +"36453","17.172624","172.30.1.104","172.30.1.205","TCP","66","135 > 45528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36454","17.172635","172.30.1.205","172.30.1.104","TCP","54","45528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36455","17.173015","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36456","17.173286","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36457","17.173295","172.30.1.205","172.30.1.104","TCP","54","45528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36458","17.175514","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36459","17.175934","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36460","17.175941","172.30.1.205","172.30.1.104","TCP","54","45528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36461","17.177837","172.30.1.205","172.30.1.104","TCP","54","45528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36462","17.177952","172.30.1.205","172.30.1.104","TCP","74","38166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920404 TSecr=0 WS=128" +"36463","17.178112","172.30.1.104","172.30.1.205","TCP","54","135 > 45528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36464","17.178141","172.30.1.104","172.30.1.205","TCP","54","135 > 45528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36465","17.178147","172.30.1.205","172.30.1.104","TCP","54","45528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36466","17.178218","172.30.1.104","172.30.1.205","TCP","66","49671 > 38166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36467","17.178226","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36468","17.178579","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36469","17.178869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36470","17.178878","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36471","17.180763","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36472","17.181167","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36473","17.181173","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36474","17.182523","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36475","17.185632","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36476","17.185644","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36477","17.186644","172.30.1.205","172.30.1.104","TCP","74","45532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920413 TSecr=0 WS=128" +"36478","17.187002","172.30.1.104","172.30.1.205","TCP","66","135 > 45532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36479","17.187014","172.30.1.205","172.30.1.104","TCP","54","45532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36480","17.187366","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36481","17.187726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36482","17.187737","172.30.1.205","172.30.1.104","TCP","54","45532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36483","17.189999","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36484","17.190423","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36485","17.190430","172.30.1.205","172.30.1.104","TCP","54","45532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36486","17.192253","172.30.1.205","172.30.1.104","TCP","54","45532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36487","17.192373","172.30.1.205","172.30.1.104","TCP","74","38170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920418 TSecr=0 WS=128" +"36488","17.192516","172.30.1.104","172.30.1.205","TCP","54","135 > 45532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36489","17.192546","172.30.1.104","172.30.1.205","TCP","54","135 > 45532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36490","17.192553","172.30.1.205","172.30.1.104","TCP","54","45532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36491","17.192642","172.30.1.104","172.30.1.205","TCP","66","49671 > 38170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36492","17.192650","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36493","17.193049","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36494","17.193338","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36495","17.193347","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36496","17.195219","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36497","17.195599","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36498","17.195605","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36499","17.196992","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36500","17.200067","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36501","17.200076","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36502","17.201060","172.30.1.205","172.30.1.104","TCP","74","45536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920427 TSecr=0 WS=128" +"36503","17.201428","172.30.1.104","172.30.1.205","TCP","66","135 > 45536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36504","17.201440","172.30.1.205","172.30.1.104","TCP","54","45536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36505","17.201798","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36506","17.202128","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36507","17.202137","172.30.1.205","172.30.1.104","TCP","54","45536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36508","17.204352","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36509","17.204791","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36510","17.204798","172.30.1.205","172.30.1.104","TCP","54","45536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36511","17.206625","172.30.1.205","172.30.1.104","TCP","54","45536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36512","17.206750","172.30.1.205","172.30.1.104","TCP","74","38174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920433 TSecr=0 WS=128" +"36513","17.206895","172.30.1.104","172.30.1.205","TCP","54","135 > 45536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36514","17.206925","172.30.1.104","172.30.1.205","TCP","54","135 > 45536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36515","17.206932","172.30.1.205","172.30.1.104","TCP","54","45536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36516","17.207063","172.30.1.104","172.30.1.205","TCP","66","49671 > 38174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36517","17.207072","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36518","17.207426","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36519","17.207700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36520","17.207709","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36521","17.209648","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36522","17.210655","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36523","17.210661","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36524","17.212031","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36525","17.214985","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36526","17.214997","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36527","17.216045","172.30.1.205","172.30.1.104","TCP","74","45540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920442 TSecr=0 WS=128" +"36528","17.216386","172.30.1.104","172.30.1.205","TCP","66","135 > 45540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36529","17.216398","172.30.1.205","172.30.1.104","TCP","54","45540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36530","17.216754","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36531","17.217046","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36532","17.217055","172.30.1.205","172.30.1.104","TCP","54","45540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36533","17.219280","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36534","17.219664","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36535","17.219671","172.30.1.205","172.30.1.104","TCP","54","45540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36536","17.221519","172.30.1.205","172.30.1.104","TCP","54","45540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36537","17.221643","172.30.1.205","172.30.1.104","TCP","74","38178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920448 TSecr=0 WS=128" +"36538","17.221797","172.30.1.104","172.30.1.205","TCP","54","135 > 45540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36539","17.221807","172.30.1.104","172.30.1.205","TCP","54","135 > 45540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36540","17.221814","172.30.1.205","172.30.1.104","TCP","54","45540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36541","17.221906","172.30.1.104","172.30.1.205","TCP","66","49671 > 38178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36542","17.221914","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36543","17.222258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36544","17.222531","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36545","17.222540","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36546","17.224420","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36547","17.224770","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36548","17.224786","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36549","17.226149","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36550","17.229142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36551","17.229152","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36552","17.230121","172.30.1.205","172.30.1.104","TCP","74","45544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920456 TSecr=0 WS=128" +"36553","17.230435","172.30.1.104","172.30.1.205","TCP","66","135 > 45544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36554","17.230446","172.30.1.205","172.30.1.104","TCP","54","45544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36555","17.230802","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36556","17.231102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36557","17.231111","172.30.1.205","172.30.1.104","TCP","54","45544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36558","17.233333","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36559","17.233749","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36560","17.233756","172.30.1.205","172.30.1.104","TCP","54","45544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36561","17.234616","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36562","17.234666","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36563","17.234704","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36564","17.234738","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36565","17.234771","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36566","17.234803","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36567","17.234832","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36568","17.234859","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36569","17.234885","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36570","17.234912","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36571","17.234939","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36572","17.234961","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36573","17.235255","172.30.1.104","172.30.1.205","TCP","54","49671 > 38134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36574","17.235271","172.30.1.104","172.30.1.205","TCP","54","49671 > 38142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36575","17.235292","172.30.1.104","172.30.1.205","TCP","54","49671 > 38134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36576","17.235299","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36577","17.235311","172.30.1.104","172.30.1.205","TCP","54","49671 > 38138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36578","17.235335","172.30.1.104","172.30.1.205","TCP","54","49671 > 38146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36579","17.235382","172.30.1.104","172.30.1.205","TCP","54","49671 > 38138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36580","17.235388","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36581","17.235400","172.30.1.104","172.30.1.205","TCP","54","49671 > 38150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36582","17.235422","172.30.1.104","172.30.1.205","TCP","54","49671 > 38142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36583","17.235426","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36584","17.235468","172.30.1.104","172.30.1.205","TCP","54","49671 > 38154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36585","17.235486","172.30.1.104","172.30.1.205","TCP","54","49671 > 38154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36586","17.235489","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36587","17.235506","172.30.1.104","172.30.1.205","TCP","54","49671 > 38158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36588","17.235538","172.30.1.104","172.30.1.205","TCP","54","49671 > 38150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36589","17.235540","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36590","17.235558","172.30.1.104","172.30.1.205","TCP","54","49671 > 38162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36591","17.235579","172.30.1.104","172.30.1.205","TCP","54","49671 > 38162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36592","17.235582","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36593","17.235599","172.30.1.104","172.30.1.205","TCP","54","49671 > 38166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36594","17.235619","172.30.1.104","172.30.1.205","TCP","54","49671 > 38158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36595","17.235622","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36596","17.235639","172.30.1.104","172.30.1.205","TCP","54","49671 > 38170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36597","17.235659","172.30.1.104","172.30.1.205","TCP","54","49671 > 38170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36598","17.235663","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36599","17.235679","172.30.1.104","172.30.1.205","TCP","54","49671 > 38174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36600","17.235702","172.30.1.104","172.30.1.205","TCP","54","49671 > 38166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36601","17.235706","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36602","17.235722","172.30.1.104","172.30.1.205","TCP","54","49671 > 38178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36603","17.235743","172.30.1.104","172.30.1.205","TCP","54","49671 > 38178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36604","17.235747","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36605","17.235763","172.30.1.104","172.30.1.205","TCP","54","49671 > 38174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36606","17.235766","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36607","17.235782","172.30.1.104","172.30.1.205","TCP","54","49671 > 38146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36608","17.235785","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36609","17.236560","172.30.1.205","172.30.1.104","TCP","54","45544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36610","17.236673","172.30.1.205","172.30.1.104","TCP","74","38182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920463 TSecr=0 WS=128" +"36611","17.236841","172.30.1.104","172.30.1.205","TCP","54","135 > 45544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36612","17.236862","172.30.1.104","172.30.1.205","TCP","54","135 > 45544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36613","17.236868","172.30.1.205","172.30.1.104","TCP","54","45544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36614","17.236999","172.30.1.104","172.30.1.205","TCP","66","49671 > 38182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36615","17.237008","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36616","17.237371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36617","17.237677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36618","17.237684","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36619","17.239556","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36620","17.239942","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36621","17.239948","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36622","17.241352","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36623","17.245540","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36624","17.245551","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36625","17.246544","172.30.1.205","172.30.1.104","TCP","74","45548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920472 TSecr=0 WS=128" +"36626","17.246862","172.30.1.104","172.30.1.205","TCP","66","135 > 45548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36627","17.246874","172.30.1.205","172.30.1.104","TCP","54","45548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36628","17.247232","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36629","17.247603","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36630","17.247612","172.30.1.205","172.30.1.104","TCP","54","45548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36631","17.249842","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36632","17.250268","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36633","17.250274","172.30.1.205","172.30.1.104","TCP","54","45548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36634","17.252095","172.30.1.205","172.30.1.104","TCP","54","45548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36635","17.252213","172.30.1.205","172.30.1.104","TCP","74","38186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920478 TSecr=0 WS=128" +"36636","17.252392","172.30.1.104","172.30.1.205","TCP","54","135 > 45548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36637","17.252418","172.30.1.104","172.30.1.205","TCP","54","135 > 45548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36638","17.252425","172.30.1.205","172.30.1.104","TCP","54","45548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36639","17.252504","172.30.1.104","172.30.1.205","TCP","66","49671 > 38186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36640","17.252512","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36641","17.252886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36642","17.253236","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36643","17.253244","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36644","17.255141","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36645","17.255516","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36646","17.255522","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36647","17.256918","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36648","17.259921","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36649","17.259930","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36650","17.260901","172.30.1.205","172.30.1.104","TCP","74","45552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920487 TSecr=0 WS=128" +"36651","17.261219","172.30.1.104","172.30.1.205","TCP","66","135 > 45552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36652","17.261230","172.30.1.205","172.30.1.104","TCP","54","45552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36653","17.261584","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36654","17.261995","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36655","17.262007","172.30.1.205","172.30.1.104","TCP","54","45552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36656","17.264249","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36657","17.264667","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36658","17.264673","172.30.1.205","172.30.1.104","TCP","54","45552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36659","17.266513","172.30.1.205","172.30.1.104","TCP","54","45552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36660","17.266627","172.30.1.205","172.30.1.104","TCP","74","38190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920493 TSecr=0 WS=128" +"36661","17.266765","172.30.1.104","172.30.1.205","TCP","54","135 > 45552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36662","17.266781","172.30.1.104","172.30.1.205","TCP","54","135 > 45552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36663","17.266786","172.30.1.205","172.30.1.104","TCP","54","45552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36664","17.266911","172.30.1.104","172.30.1.205","TCP","66","49671 > 38190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36665","17.266919","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36666","17.267265","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36667","17.267558","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36668","17.267567","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36669","17.269498","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36670","17.269872","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36671","17.269879","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36672","17.271226","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36673","17.274182","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36674","17.274192","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36675","17.275157","172.30.1.205","172.30.1.104","TCP","74","45556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920501 TSecr=0 WS=128" +"36676","17.275609","172.30.1.104","172.30.1.205","TCP","66","135 > 45556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36677","17.275619","172.30.1.205","172.30.1.104","TCP","54","45556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36678","17.275974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36679","17.276276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36680","17.276285","172.30.1.205","172.30.1.104","TCP","54","45556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36681","17.278510","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36682","17.278990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36683","17.278997","172.30.1.205","172.30.1.104","TCP","54","45556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36684","17.280831","172.30.1.205","172.30.1.104","TCP","54","45556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36685","17.280941","172.30.1.205","172.30.1.104","TCP","74","38194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920507 TSecr=0 WS=128" +"36686","17.281130","172.30.1.104","172.30.1.205","TCP","54","135 > 45556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36687","17.281151","172.30.1.104","172.30.1.205","TCP","54","135 > 45556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36688","17.281158","172.30.1.205","172.30.1.104","TCP","54","45556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36689","17.281261","172.30.1.104","172.30.1.205","TCP","66","49671 > 38194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36690","17.281270","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36691","17.281619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36692","17.282482","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36693","17.282497","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36694","17.284366","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36695","17.284771","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36696","17.284787","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36697","17.286144","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36698","17.289211","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36699","17.289221","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36700","17.290161","172.30.1.205","172.30.1.104","TCP","74","45560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920516 TSecr=0 WS=128" +"36701","17.290462","172.30.1.104","172.30.1.205","TCP","66","135 > 45560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36702","17.290473","172.30.1.205","172.30.1.104","TCP","54","45560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36703","17.290821","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36704","17.291097","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36705","17.291106","172.30.1.205","172.30.1.104","TCP","54","45560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36706","17.293334","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36707","17.293814","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36708","17.293821","172.30.1.205","172.30.1.104","TCP","54","45560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36709","17.295647","172.30.1.205","172.30.1.104","TCP","54","45560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36710","17.295761","172.30.1.205","172.30.1.104","TCP","74","38198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920522 TSecr=0 WS=128" +"36711","17.295923","172.30.1.104","172.30.1.205","TCP","54","135 > 45560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36712","17.295946","172.30.1.104","172.30.1.205","TCP","54","135 > 45560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36713","17.295951","172.30.1.205","172.30.1.104","TCP","54","45560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36714","17.296017","172.30.1.104","172.30.1.205","TCP","66","49671 > 38198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36715","17.296026","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36716","17.296370","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36717","17.296680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36718","17.296689","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36719","17.298599","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36720","17.298980","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36721","17.298987","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36722","17.300333","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36723","17.304216","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36724","17.304226","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36725","17.305201","172.30.1.205","172.30.1.104","TCP","74","45564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920531 TSecr=0 WS=128" +"36726","17.305551","172.30.1.104","172.30.1.205","TCP","66","135 > 45564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36727","17.305563","172.30.1.205","172.30.1.104","TCP","54","45564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36728","17.305923","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36729","17.306200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36730","17.306209","172.30.1.205","172.30.1.104","TCP","54","45564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36731","17.308397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36732","17.308983","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36733","17.308990","172.30.1.205","172.30.1.104","TCP","54","45564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36734","17.310825","172.30.1.205","172.30.1.104","TCP","54","45564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36735","17.310938","172.30.1.205","172.30.1.104","TCP","74","38202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920537 TSecr=0 WS=128" +"36736","17.311092","172.30.1.104","172.30.1.205","TCP","54","135 > 45564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36737","17.311121","172.30.1.104","172.30.1.205","TCP","54","135 > 45564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36738","17.311126","172.30.1.205","172.30.1.104","TCP","54","45564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36739","17.311224","172.30.1.104","172.30.1.205","TCP","66","49671 > 38202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36740","17.311233","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36741","17.311595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36742","17.311884","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36743","17.311892","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36744","17.313800","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36745","17.314219","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36746","17.314225","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36747","17.315573","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36748","17.318707","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36749","17.318717","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36750","17.319681","172.30.1.205","172.30.1.104","TCP","74","45568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920546 TSecr=0 WS=128" +"36751","17.319997","172.30.1.104","172.30.1.205","TCP","66","135 > 45568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36752","17.320007","172.30.1.205","172.30.1.104","TCP","54","45568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36753","17.320359","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36754","17.320655","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36755","17.320664","172.30.1.205","172.30.1.104","TCP","54","45568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36756","17.322912","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36757","17.323355","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36758","17.323362","172.30.1.205","172.30.1.104","TCP","54","45568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36759","17.325217","172.30.1.205","172.30.1.104","TCP","54","45568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36760","17.325329","172.30.1.205","172.30.1.104","TCP","74","38206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920551 TSecr=0 WS=128" +"36761","17.325489","172.30.1.104","172.30.1.205","TCP","54","135 > 45568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36762","17.325513","172.30.1.104","172.30.1.205","TCP","54","135 > 45568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36763","17.325519","172.30.1.205","172.30.1.104","TCP","54","45568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36764","17.325625","172.30.1.104","172.30.1.205","TCP","66","49671 > 38206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36765","17.325633","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36766","17.325976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36767","17.326300","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36768","17.326309","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36769","17.328199","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36770","17.328580","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36771","17.328586","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36772","17.329966","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36773","17.332987","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36774","17.332997","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36775","17.333943","172.30.1.205","172.30.1.104","TCP","74","45572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920560 TSecr=0 WS=128" +"36776","17.334268","172.30.1.104","172.30.1.205","TCP","66","135 > 45572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36777","17.334281","172.30.1.205","172.30.1.104","TCP","54","45572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36778","17.334648","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36779","17.334957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36780","17.334966","172.30.1.205","172.30.1.104","TCP","54","45572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36781","17.337190","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36782","17.337645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36783","17.337655","172.30.1.205","172.30.1.104","TCP","54","45572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36784","17.339571","172.30.1.205","172.30.1.104","TCP","54","45572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36785","17.339697","172.30.1.205","172.30.1.104","TCP","74","38210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920566 TSecr=0 WS=128" +"36786","17.339855","172.30.1.104","172.30.1.205","TCP","54","135 > 45572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36787","17.339882","172.30.1.104","172.30.1.205","TCP","54","135 > 45572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36788","17.339887","172.30.1.205","172.30.1.104","TCP","54","45572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36789","17.340010","172.30.1.104","172.30.1.205","TCP","66","49671 > 38210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36790","17.340026","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36791","17.340415","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36792","17.340722","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36793","17.340732","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36794","17.342658","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36795","17.343032","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36796","17.343040","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36797","17.344424","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36798","17.347494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36799","17.347506","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36800","17.348464","172.30.1.205","172.30.1.104","TCP","74","45576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920574 TSecr=0 WS=128" +"36801","17.348794","172.30.1.104","172.30.1.205","TCP","66","135 > 45576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36802","17.348806","172.30.1.205","172.30.1.104","TCP","54","45576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36803","17.349175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36804","17.349462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36805","17.349471","172.30.1.205","172.30.1.104","TCP","54","45576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36806","17.351662","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36807","17.352057","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36808","17.352064","172.30.1.205","172.30.1.104","TCP","54","45576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36809","17.353899","172.30.1.205","172.30.1.104","TCP","54","45576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36810","17.354010","172.30.1.205","172.30.1.104","TCP","74","38214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920580 TSecr=0 WS=128" +"36811","17.354183","172.30.1.104","172.30.1.205","TCP","54","135 > 45576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36812","17.354246","172.30.1.104","172.30.1.205","TCP","54","135 > 45576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36813","17.354252","172.30.1.205","172.30.1.104","TCP","54","45576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36814","17.354331","172.30.1.104","172.30.1.205","TCP","66","49671 > 38214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36815","17.354340","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36816","17.354696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36817","17.354986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36818","17.354995","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36819","17.356886","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36820","17.357280","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36821","17.357286","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36822","17.358637","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36823","17.361588","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36824","17.361599","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36825","17.362533","172.30.1.205","172.30.1.104","TCP","74","45580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920588 TSecr=0 WS=128" +"36826","17.362882","172.30.1.104","172.30.1.205","TCP","66","135 > 45580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36827","17.362893","172.30.1.205","172.30.1.104","TCP","54","45580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36828","17.363244","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36829","17.363526","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36830","17.363535","172.30.1.205","172.30.1.104","TCP","54","45580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36831","17.365818","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36832","17.366212","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36833","17.366219","172.30.1.205","172.30.1.104","TCP","54","45580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36834","17.368058","172.30.1.205","172.30.1.104","TCP","54","45580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36835","17.368171","172.30.1.205","172.30.1.104","TCP","74","38218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920594 TSecr=0 WS=128" +"36836","17.368333","172.30.1.104","172.30.1.205","TCP","54","135 > 45580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36837","17.368355","172.30.1.104","172.30.1.205","TCP","54","135 > 45580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36838","17.368360","172.30.1.205","172.30.1.104","TCP","54","45580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36839","17.368458","172.30.1.104","172.30.1.205","TCP","66","49671 > 38218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36840","17.368466","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36841","17.368856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36842","17.369150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36843","17.369159","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36844","17.371039","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36845","17.371451","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36846","17.371460","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36847","17.372905","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36848","17.375916","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36849","17.375927","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36850","17.376930","172.30.1.205","172.30.1.104","TCP","74","45584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920603 TSecr=0 WS=128" +"36851","17.377298","172.30.1.104","172.30.1.205","TCP","66","135 > 45584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36852","17.377311","172.30.1.205","172.30.1.104","TCP","54","45584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36853","17.377677","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36854","17.377986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36855","17.377995","172.30.1.205","172.30.1.104","TCP","54","45584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36856","17.380211","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36857","17.380637","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36858","17.380644","172.30.1.205","172.30.1.104","TCP","54","45584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36859","17.382496","172.30.1.205","172.30.1.104","TCP","54","45584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36860","17.382616","172.30.1.205","172.30.1.104","TCP","74","38222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920609 TSecr=0 WS=128" +"36861","17.382768","172.30.1.104","172.30.1.205","TCP","54","135 > 45584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36862","17.382800","172.30.1.104","172.30.1.205","TCP","54","135 > 45584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36863","17.382807","172.30.1.205","172.30.1.104","TCP","54","45584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36864","17.382907","172.30.1.104","172.30.1.205","TCP","66","49671 > 38222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36865","17.382916","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36866","17.383267","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36867","17.383574","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36868","17.383583","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36869","17.385535","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36870","17.385916","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36871","17.385923","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36872","17.387291","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36873","17.390374","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36874","17.390384","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36875","17.391349","172.30.1.205","172.30.1.104","TCP","74","45588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920617 TSecr=0 WS=128" +"36876","17.391650","172.30.1.104","172.30.1.205","TCP","66","135 > 45588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36877","17.391660","172.30.1.205","172.30.1.104","TCP","54","45588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36878","17.392008","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36879","17.392282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36880","17.392290","172.30.1.205","172.30.1.104","TCP","54","45588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36881","17.394525","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36882","17.394967","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36883","17.394974","172.30.1.205","172.30.1.104","TCP","54","45588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36884","17.396819","172.30.1.205","172.30.1.104","TCP","54","45588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36885","17.396940","172.30.1.205","172.30.1.104","TCP","74","38226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920623 TSecr=0 WS=128" +"36886","17.397088","172.30.1.104","172.30.1.205","TCP","54","135 > 45588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36887","17.397100","172.30.1.104","172.30.1.205","TCP","54","135 > 45588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36888","17.397106","172.30.1.205","172.30.1.104","TCP","54","45588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36889","17.397260","172.30.1.104","172.30.1.205","TCP","66","49671 > 38226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36890","17.397269","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36891","17.397616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36892","17.399094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36893","17.399101","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36894","17.401033","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36895","17.401407","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36896","17.401413","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36897","17.402771","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36898","17.405846","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36899","17.405856","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36900","17.406825","172.30.1.205","172.30.1.104","TCP","74","45592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920633 TSecr=0 WS=128" +"36901","17.407131","172.30.1.104","172.30.1.205","TCP","66","135 > 45592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36902","17.407141","172.30.1.205","172.30.1.104","TCP","54","45592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36903","17.407489","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36904","17.407822","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36905","17.407831","172.30.1.205","172.30.1.104","TCP","54","45592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36906","17.410095","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36907","17.410491","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36908","17.410497","172.30.1.205","172.30.1.104","TCP","54","45592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36909","17.411346","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36910","17.411395","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36911","17.411432","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36912","17.411465","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36913","17.411498","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36914","17.411530","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36915","17.411558","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36916","17.411584","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36917","17.411616","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36918","17.411646","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36919","17.411674","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36920","17.411748","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36921","17.411870","172.30.1.104","172.30.1.205","TCP","54","49671 > 38186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36922","17.411880","172.30.1.104","172.30.1.205","TCP","54","49671 > 38190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36923","17.411884","172.30.1.104","172.30.1.205","TCP","54","49671 > 38194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36924","17.411887","172.30.1.104","172.30.1.205","TCP","54","49671 > 38198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36925","17.411890","172.30.1.104","172.30.1.205","TCP","54","49671 > 38202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36926","17.412190","172.30.1.104","172.30.1.205","TCP","54","49671 > 38186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36927","17.412198","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36928","17.412205","172.30.1.104","172.30.1.205","TCP","54","49671 > 38206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36929","17.412211","172.30.1.104","172.30.1.205","TCP","54","49671 > 38206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36930","17.412217","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36931","17.412219","172.30.1.104","172.30.1.205","TCP","54","49671 > 38202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36932","17.412221","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36933","17.412222","172.30.1.104","172.30.1.205","TCP","54","49671 > 38198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36934","17.412224","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36935","17.412225","172.30.1.104","172.30.1.205","TCP","54","49671 > 38190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36936","17.412227","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36937","17.412228","172.30.1.104","172.30.1.205","TCP","54","49671 > 38194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36938","17.412230","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36939","17.412231","172.30.1.104","172.30.1.205","TCP","54","49671 > 38210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36940","17.412235","172.30.1.104","172.30.1.205","TCP","54","49671 > 38214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36941","17.412237","172.30.1.104","172.30.1.205","TCP","54","49671 > 38218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36942","17.412240","172.30.1.104","172.30.1.205","TCP","54","49671 > 38210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36943","17.412242","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36944","17.412243","172.30.1.104","172.30.1.205","TCP","54","49671 > 38222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36945","17.412531","172.30.1.104","172.30.1.205","TCP","54","49671 > 38226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36946","17.412537","172.30.1.104","172.30.1.205","TCP","54","49671 > 38226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36947","17.412542","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36948","17.412548","172.30.1.104","172.30.1.205","TCP","54","49671 > 38222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36949","17.412550","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36950","17.412552","172.30.1.104","172.30.1.205","TCP","54","49671 > 38214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36951","17.412554","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36952","17.412559","172.30.1.104","172.30.1.205","TCP","54","49671 > 38218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36953","17.412561","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36954","17.412562","172.30.1.104","172.30.1.205","TCP","54","49671 > 38182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36955","17.412566","172.30.1.104","172.30.1.205","TCP","54","49671 > 38182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"36956","17.412568","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"36957","17.413341","172.30.1.205","172.30.1.104","TCP","54","45592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36958","17.413453","172.30.1.205","172.30.1.104","TCP","74","38230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920639 TSecr=0 WS=128" +"36959","17.413595","172.30.1.104","172.30.1.205","TCP","54","135 > 45592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36960","17.413603","172.30.1.104","172.30.1.205","TCP","54","135 > 45592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36961","17.413608","172.30.1.205","172.30.1.104","TCP","54","45592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36962","17.413714","172.30.1.104","172.30.1.205","TCP","66","49671 > 38230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36963","17.413722","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36964","17.414077","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36965","17.414368","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36966","17.414377","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36967","17.416240","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36968","17.416668","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36969","17.416674","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36970","17.418055","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36971","17.421126","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36972","17.421136","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36973","17.422078","172.30.1.205","172.30.1.104","TCP","74","45596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920648 TSecr=0 WS=128" +"36974","17.422412","172.30.1.104","172.30.1.205","TCP","66","135 > 45596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36975","17.422423","172.30.1.205","172.30.1.104","TCP","54","45596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36976","17.422774","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"36977","17.423081","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36978","17.423090","172.30.1.205","172.30.1.104","TCP","54","45596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36979","17.425297","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"36980","17.425745","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"36981","17.425752","172.30.1.205","172.30.1.104","TCP","54","45596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36982","17.427567","172.30.1.205","172.30.1.104","TCP","54","45596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"36983","17.427682","172.30.1.205","172.30.1.104","TCP","74","38234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920654 TSecr=0 WS=128" +"36984","17.427854","172.30.1.104","172.30.1.205","TCP","54","135 > 45596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36985","17.427875","172.30.1.104","172.30.1.205","TCP","54","135 > 45596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"36986","17.427881","172.30.1.205","172.30.1.104","TCP","54","45596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"36987","17.427973","172.30.1.104","172.30.1.205","TCP","66","49671 > 38234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"36988","17.427982","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"36989","17.428330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"36990","17.428642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"36991","17.428651","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"36992","17.430556","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"36993","17.430933","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"36994","17.430939","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"36995","17.432290","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"36996","17.435403","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"36997","17.435413","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"36998","17.436363","172.30.1.205","172.30.1.104","TCP","74","45600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920662 TSecr=0 WS=128" +"36999","17.436727","172.30.1.104","172.30.1.205","TCP","66","135 > 45600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37000","17.436739","172.30.1.205","172.30.1.104","TCP","54","45600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37001","17.437121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37002","17.437449","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37003","17.437459","172.30.1.205","172.30.1.104","TCP","54","45600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37004","17.439659","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37005","17.440073","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37006","17.440080","172.30.1.205","172.30.1.104","TCP","54","45600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37007","17.441924","172.30.1.205","172.30.1.104","TCP","54","45600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37008","17.442035","172.30.1.205","172.30.1.104","TCP","74","38238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920668 TSecr=0 WS=128" +"37009","17.442213","172.30.1.104","172.30.1.205","TCP","54","135 > 45600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37010","17.442228","172.30.1.104","172.30.1.205","TCP","54","135 > 45600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37011","17.442234","172.30.1.205","172.30.1.104","TCP","54","45600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37012","17.442321","172.30.1.104","172.30.1.205","TCP","66","49671 > 38238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37013","17.442329","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37014","17.442677","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37015","17.442954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37016","17.442963","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37017","17.444879","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37018","17.445277","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37019","17.445283","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37020","17.446644","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37021","17.449771","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37022","17.449782","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37023","17.450732","172.30.1.205","172.30.1.104","TCP","74","45604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920677 TSecr=0 WS=128" +"37024","17.451064","172.30.1.104","172.30.1.205","TCP","66","135 > 45604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37025","17.451074","172.30.1.205","172.30.1.104","TCP","54","45604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37026","17.451430","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37027","17.451705","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37028","17.451714","172.30.1.205","172.30.1.104","TCP","54","45604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37029","17.453931","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37030","17.454414","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37031","17.454420","172.30.1.205","172.30.1.104","TCP","54","45604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37032","17.456241","172.30.1.205","172.30.1.104","TCP","54","45604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37033","17.456352","172.30.1.205","172.30.1.104","TCP","74","38242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920682 TSecr=0 WS=128" +"37034","17.456528","172.30.1.104","172.30.1.205","TCP","54","135 > 45604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37035","17.456542","172.30.1.104","172.30.1.205","TCP","54","135 > 45604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37036","17.456547","172.30.1.205","172.30.1.104","TCP","54","45604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37037","17.456652","172.30.1.104","172.30.1.205","TCP","66","49671 > 38242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37038","17.456663","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37039","17.457326","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37040","17.457620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37041","17.457630","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37042","17.459523","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37043","17.459910","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37044","17.459917","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37045","17.461312","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37046","17.464410","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37047","17.464422","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37048","17.465409","172.30.1.205","172.30.1.104","TCP","74","45608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920691 TSecr=0 WS=128" +"37049","17.465743","172.30.1.104","172.30.1.205","TCP","66","135 > 45608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37050","17.465755","172.30.1.205","172.30.1.104","TCP","54","45608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37051","17.466106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37052","17.466396","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37053","17.466405","172.30.1.205","172.30.1.104","TCP","54","45608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37054","17.468602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37055","17.469048","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37056","17.469055","172.30.1.205","172.30.1.104","TCP","54","45608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37057","17.470863","172.30.1.205","172.30.1.104","TCP","54","45608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37058","17.470976","172.30.1.205","172.30.1.104","TCP","74","38246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920697 TSecr=0 WS=128" +"37059","17.471169","172.30.1.104","172.30.1.205","TCP","54","135 > 45608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37060","17.471190","172.30.1.104","172.30.1.205","TCP","54","135 > 45608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37061","17.471195","172.30.1.205","172.30.1.104","TCP","54","45608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37062","17.471274","172.30.1.104","172.30.1.205","TCP","66","49671 > 38246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37063","17.471282","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37064","17.471653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37065","17.471951","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37066","17.471960","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37067","17.473873","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37068","17.474233","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37069","17.474240","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37070","17.475598","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37071","17.478639","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37072","17.478649","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37073","17.479592","172.30.1.205","172.30.1.104","TCP","74","45612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920706 TSecr=0 WS=128" +"37074","17.479921","172.30.1.104","172.30.1.205","TCP","66","135 > 45612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37075","17.479931","172.30.1.205","172.30.1.104","TCP","54","45612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37076","17.480279","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37077","17.480618","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37078","17.480627","172.30.1.205","172.30.1.104","TCP","54","45612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37079","17.482846","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37080","17.483274","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37081","17.483281","172.30.1.205","172.30.1.104","TCP","54","45612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37082","17.485118","172.30.1.205","172.30.1.104","TCP","54","45612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37083","17.485229","172.30.1.205","172.30.1.104","TCP","74","38250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920711 TSecr=0 WS=128" +"37084","17.485426","172.30.1.104","172.30.1.205","TCP","54","135 > 45612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37085","17.485459","172.30.1.104","172.30.1.205","TCP","54","135 > 45612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37086","17.485465","172.30.1.205","172.30.1.104","TCP","54","45612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37087","17.485549","172.30.1.104","172.30.1.205","TCP","66","49671 > 38250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37088","17.485557","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37089","17.485906","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37090","17.486237","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37091","17.486245","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37092","17.488131","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37093","17.488519","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37094","17.488526","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37095","17.489901","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37096","17.492891","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37097","17.492901","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37098","17.493845","172.30.1.205","172.30.1.104","TCP","74","45616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920720 TSecr=0 WS=128" +"37099","17.494174","172.30.1.104","172.30.1.205","TCP","66","135 > 45616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37100","17.494185","172.30.1.205","172.30.1.104","TCP","54","45616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37101","17.494535","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37102","17.494844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37103","17.494855","172.30.1.205","172.30.1.104","TCP","54","45616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37104","17.497096","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37105","17.497512","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37106","17.497519","172.30.1.205","172.30.1.104","TCP","54","45616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37107","17.499337","172.30.1.205","172.30.1.104","TCP","54","45616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37108","17.499464","172.30.1.205","172.30.1.104","TCP","74","38254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920725 TSecr=0 WS=128" +"37109","17.499627","172.30.1.104","172.30.1.205","TCP","54","135 > 45616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37110","17.499656","172.30.1.104","172.30.1.205","TCP","54","135 > 45616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37111","17.499662","172.30.1.205","172.30.1.104","TCP","54","45616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37112","17.499774","172.30.1.104","172.30.1.205","TCP","66","49671 > 38254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37113","17.499782","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37114","17.500128","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37115","17.500432","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37116","17.500447","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37117","17.502454","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37118","17.502863","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37119","17.502870","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37120","17.504242","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37121","17.507261","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37122","17.507272","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37123","17.508252","172.30.1.205","172.30.1.104","TCP","74","45620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920734 TSecr=0 WS=128" +"37124","17.508571","172.30.1.104","172.30.1.205","TCP","66","135 > 45620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37125","17.508587","172.30.1.205","172.30.1.104","TCP","54","45620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37126","17.508992","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37127","17.509334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37128","17.509343","172.30.1.205","172.30.1.104","TCP","54","45620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37129","17.511566","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37130","17.512101","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37131","17.512107","172.30.1.205","172.30.1.104","TCP","54","45620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37132","17.513940","172.30.1.205","172.30.1.104","TCP","54","45620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37133","17.514055","172.30.1.205","172.30.1.104","TCP","74","38258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920740 TSecr=0 WS=128" +"37134","17.514228","172.30.1.104","172.30.1.205","TCP","54","135 > 45620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37135","17.514256","172.30.1.104","172.30.1.205","TCP","54","135 > 45620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37136","17.514262","172.30.1.205","172.30.1.104","TCP","54","45620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37137","17.514367","172.30.1.104","172.30.1.205","TCP","66","49671 > 38258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37138","17.514375","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37139","17.514723","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37140","17.515086","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37141","17.515095","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37142","17.517022","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37143","17.517443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37144","17.517450","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37145","17.518809","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37146","17.521860","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37147","17.521872","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37148","17.522880","172.30.1.205","172.30.1.104","TCP","74","45624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920749 TSecr=0 WS=128" +"37149","17.523217","172.30.1.104","172.30.1.205","TCP","66","135 > 45624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37150","17.523229","172.30.1.205","172.30.1.104","TCP","54","45624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37151","17.523581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37152","17.523916","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37153","17.523925","172.30.1.205","172.30.1.104","TCP","54","45624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37154","17.526171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37155","17.526628","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37156","17.526635","172.30.1.205","172.30.1.104","TCP","54","45624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37157","17.528465","172.30.1.205","172.30.1.104","TCP","54","45624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37158","17.528592","172.30.1.205","172.30.1.104","TCP","74","38262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920755 TSecr=0 WS=128" +"37159","17.528770","172.30.1.104","172.30.1.205","TCP","54","135 > 45624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37160","17.528800","172.30.1.104","172.30.1.205","TCP","54","135 > 45624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37161","17.528808","172.30.1.205","172.30.1.104","TCP","54","45624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37162","17.528908","172.30.1.104","172.30.1.205","TCP","66","49671 > 38262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37163","17.528917","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37164","17.529270","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37165","17.529595","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37166","17.529603","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37167","17.531463","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37168","17.531868","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37169","17.531874","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37170","17.533270","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37171","17.536280","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37172","17.536290","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37173","17.537273","172.30.1.205","172.30.1.104","TCP","74","45628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920763 TSecr=0 WS=128" +"37174","17.537634","172.30.1.104","172.30.1.205","TCP","66","135 > 45628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37175","17.537645","172.30.1.205","172.30.1.104","TCP","54","45628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37176","17.537998","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37177","17.538335","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37178","17.538343","172.30.1.205","172.30.1.104","TCP","54","45628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37179","17.540525","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37180","17.540979","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37181","17.540986","172.30.1.205","172.30.1.104","TCP","54","45628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37182","17.542795","172.30.1.205","172.30.1.104","TCP","54","45628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37183","17.542908","172.30.1.205","172.30.1.104","TCP","74","38266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920769 TSecr=0 WS=128" +"37184","17.543115","172.30.1.104","172.30.1.205","TCP","54","135 > 45628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37185","17.543236","172.30.1.104","172.30.1.205","TCP","66","49671 > 38266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37186","17.543245","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37187","17.543347","172.30.1.104","172.30.1.205","TCP","54","135 > 45628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37188","17.543354","172.30.1.205","172.30.1.104","TCP","54","45628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37189","17.543638","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37190","17.543978","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37191","17.543986","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37192","17.545925","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37193","17.547352","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37194","17.547359","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37195","17.548700","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37196","17.551751","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37197","17.551762","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37198","17.552718","172.30.1.205","172.30.1.104","TCP","74","45632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920779 TSecr=0 WS=128" +"37199","17.553114","172.30.1.104","172.30.1.205","TCP","66","135 > 45632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37200","17.553125","172.30.1.205","172.30.1.104","TCP","54","45632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37201","17.553486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37202","17.553872","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37203","17.553891","172.30.1.205","172.30.1.104","TCP","54","45632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37204","17.556272","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37205","17.556713","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37206","17.556719","172.30.1.205","172.30.1.104","TCP","54","45632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37207","17.558527","172.30.1.205","172.30.1.104","TCP","54","45632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37208","17.558639","172.30.1.205","172.30.1.104","TCP","74","38270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920785 TSecr=0 WS=128" +"37209","17.558861","172.30.1.104","172.30.1.205","TCP","54","135 > 45632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37210","17.558902","172.30.1.104","172.30.1.205","TCP","54","135 > 45632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37211","17.558908","172.30.1.205","172.30.1.104","TCP","54","45632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37212","17.559010","172.30.1.104","172.30.1.205","TCP","66","49671 > 38270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37213","17.559018","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37214","17.559370","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37215","17.559687","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37216","17.559696","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37217","17.561600","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37218","17.562030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37219","17.562037","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37220","17.563403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37221","17.566478","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37222","17.566487","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37223","17.567432","172.30.1.205","172.30.1.104","TCP","74","45636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920793 TSecr=0 WS=128" +"37224","17.567789","172.30.1.104","172.30.1.205","TCP","66","135 > 45636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37225","17.567800","172.30.1.205","172.30.1.104","TCP","54","45636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37226","17.568151","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37227","17.568514","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37228","17.568524","172.30.1.205","172.30.1.104","TCP","54","45636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37229","17.570730","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37230","17.571174","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37231","17.571181","172.30.1.205","172.30.1.104","TCP","54","45636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37232","17.573016","172.30.1.205","172.30.1.104","TCP","54","45636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37233","17.573126","172.30.1.205","172.30.1.104","TCP","74","38274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920799 TSecr=0 WS=128" +"37234","17.573312","172.30.1.104","172.30.1.205","TCP","54","135 > 45636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37235","17.573341","172.30.1.104","172.30.1.205","TCP","54","135 > 45636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37236","17.573346","172.30.1.205","172.30.1.104","TCP","54","45636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37237","17.573467","172.30.1.104","172.30.1.205","TCP","66","49671 > 38274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37238","17.573475","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37239","17.573822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37240","17.574167","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37241","17.574176","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37242","17.576054","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37243","17.576473","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37244","17.576479","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37245","17.577853","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37246","17.581909","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37247","17.581919","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37248","17.582865","172.30.1.205","172.30.1.104","TCP","74","45640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920809 TSecr=0 WS=128" +"37249","17.583257","172.30.1.104","172.30.1.205","TCP","66","135 > 45640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37250","17.583268","172.30.1.205","172.30.1.104","TCP","54","45640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37251","17.583632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37252","17.583961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37253","17.583970","172.30.1.205","172.30.1.104","TCP","54","45640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37254","17.586181","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37255","17.586648","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37256","17.586655","172.30.1.205","172.30.1.104","TCP","54","45640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37257","17.587503","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37258","17.587552","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37259","17.587587","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37260","17.587617","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37261","17.587640","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37262","17.587668","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37263","17.587696","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37264","17.587719","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37265","17.587746","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37266","17.587773","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37267","17.587800","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37268","17.587871","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37269","17.587980","172.30.1.104","172.30.1.205","TCP","54","49671 > 38234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37270","17.588015","172.30.1.104","172.30.1.205","TCP","54","49671 > 38238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37271","17.588050","172.30.1.104","172.30.1.205","TCP","54","49671 > 38234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37272","17.588057","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37273","17.588078","172.30.1.104","172.30.1.205","TCP","54","49671 > 38242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37274","17.588104","172.30.1.104","172.30.1.205","TCP","54","49671 > 38246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37275","17.588132","172.30.1.104","172.30.1.205","TCP","54","49671 > 38246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37276","17.588137","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37277","17.588160","172.30.1.104","172.30.1.205","TCP","54","49671 > 38250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37278","17.588189","172.30.1.104","172.30.1.205","TCP","54","49671 > 38250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37279","17.588193","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37280","17.588216","172.30.1.104","172.30.1.205","TCP","54","49671 > 38238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37281","17.588219","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37282","17.588244","172.30.1.104","172.30.1.205","TCP","54","49671 > 38242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37283","17.588249","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37284","17.588273","172.30.1.104","172.30.1.205","TCP","54","49671 > 38254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37285","17.588301","172.30.1.104","172.30.1.205","TCP","54","49671 > 38258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37286","17.588330","172.30.1.104","172.30.1.205","TCP","54","49671 > 38262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37287","17.588358","172.30.1.104","172.30.1.205","TCP","54","49671 > 38266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37288","17.588386","172.30.1.104","172.30.1.205","TCP","54","49671 > 38254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37289","17.588391","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37290","17.588414","172.30.1.104","172.30.1.205","TCP","54","49671 > 38270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37291","17.588443","172.30.1.104","172.30.1.205","TCP","54","49671 > 38274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37292","17.588478","172.30.1.104","172.30.1.205","TCP","54","49671 > 38274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37293","17.588482","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37294","17.588511","172.30.1.104","172.30.1.205","TCP","54","49671 > 38270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37295","17.588513","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37296","17.588541","172.30.1.104","172.30.1.205","TCP","54","49671 > 38266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37297","17.588544","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37298","17.588571","172.30.1.104","172.30.1.205","TCP","54","49671 > 38258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37299","17.588574","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37300","17.588601","172.30.1.104","172.30.1.205","TCP","54","49671 > 38262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37301","17.588604","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37302","17.589004","172.30.1.104","172.30.1.205","TCP","54","49671 > 38230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37303","17.589039","172.30.1.104","172.30.1.205","TCP","54","49671 > 38230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37304","17.589045","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37305","17.589553","172.30.1.205","172.30.1.104","TCP","54","45640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37306","17.589665","172.30.1.205","172.30.1.104","TCP","74","38278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920816 TSecr=0 WS=128" +"37307","17.589834","172.30.1.104","172.30.1.205","TCP","54","135 > 45640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37308","17.589862","172.30.1.104","172.30.1.205","TCP","54","135 > 45640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37309","17.589867","172.30.1.205","172.30.1.104","TCP","54","45640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37310","17.589961","172.30.1.104","172.30.1.205","TCP","66","49671 > 38278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37311","17.589969","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37312","17.590329","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37313","17.590663","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37314","17.590672","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37315","17.592551","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37316","17.594256","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37317","17.594263","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37318","17.595698","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37319","17.598840","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37320","17.598850","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37321","17.599793","172.30.1.205","172.30.1.104","TCP","74","45644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920826 TSecr=0 WS=128" +"37322","17.600134","172.30.1.104","172.30.1.205","TCP","66","135 > 45644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37323","17.600145","172.30.1.205","172.30.1.104","TCP","54","45644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37324","17.600498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37325","17.600846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37326","17.600855","172.30.1.205","172.30.1.104","TCP","54","45644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37327","17.603030","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37328","17.603463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37329","17.603470","172.30.1.205","172.30.1.104","TCP","54","45644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37330","17.605304","172.30.1.205","172.30.1.104","TCP","54","45644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37331","17.605414","172.30.1.205","172.30.1.104","TCP","74","38282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920831 TSecr=0 WS=128" +"37332","17.605609","172.30.1.104","172.30.1.205","TCP","54","135 > 45644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37333","17.605695","172.30.1.104","172.30.1.205","TCP","54","135 > 45644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37334","17.605700","172.30.1.205","172.30.1.104","TCP","54","45644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37335","17.605812","172.30.1.104","172.30.1.205","TCP","66","49671 > 38282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37336","17.605820","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37337","17.606164","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37338","17.606481","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37339","17.606490","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37340","17.608364","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37341","17.608767","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37342","17.608783","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37343","17.610135","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37344","17.613089","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37345","17.613099","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37346","17.614039","172.30.1.205","172.30.1.104","TCP","74","45648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920840 TSecr=0 WS=128" +"37347","17.614354","172.30.1.104","172.30.1.205","TCP","66","135 > 45648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37348","17.614365","172.30.1.205","172.30.1.104","TCP","54","45648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37349","17.614714","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37350","17.615051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37351","17.615060","172.30.1.205","172.30.1.104","TCP","54","45648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37352","17.617284","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37353","17.617693","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37354","17.617700","172.30.1.205","172.30.1.104","TCP","54","45648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37355","17.619506","172.30.1.205","172.30.1.104","TCP","54","45648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37356","17.619619","172.30.1.205","172.30.1.104","TCP","74","38286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920846 TSecr=0 WS=128" +"37357","17.619788","172.30.1.104","172.30.1.205","TCP","54","135 > 45648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37358","17.619834","172.30.1.104","172.30.1.205","TCP","54","135 > 45648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37359","17.619839","172.30.1.205","172.30.1.104","TCP","54","45648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37360","17.619941","172.30.1.104","172.30.1.205","TCP","66","49671 > 38286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37361","17.619949","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37362","17.620296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37363","17.620608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37364","17.620615","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37365","17.622507","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37366","17.622966","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37367","17.622972","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37368","17.624312","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37369","17.627264","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37370","17.627275","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37371","17.628225","172.30.1.205","172.30.1.104","TCP","74","45652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920854 TSecr=0 WS=128" +"37372","17.628578","172.30.1.104","172.30.1.205","TCP","66","135 > 45652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37373","17.628588","172.30.1.205","172.30.1.104","TCP","54","45652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37374","17.628976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37375","17.629325","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37376","17.629334","172.30.1.205","172.30.1.104","TCP","54","45652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37377","17.631538","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37378","17.631974","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37379","17.631981","172.30.1.205","172.30.1.104","TCP","54","45652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37380","17.633827","172.30.1.205","172.30.1.104","TCP","54","45652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37381","17.633939","172.30.1.205","172.30.1.104","TCP","74","38290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920860 TSecr=0 WS=128" +"37382","17.634166","172.30.1.104","172.30.1.205","TCP","54","135 > 45652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37383","17.634196","172.30.1.104","172.30.1.205","TCP","54","135 > 45652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37384","17.634202","172.30.1.205","172.30.1.104","TCP","54","45652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37385","17.634227","172.30.1.104","172.30.1.205","TCP","66","49671 > 38290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37386","17.634236","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37387","17.634599","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37388","17.634957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37389","17.634966","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37390","17.636866","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37391","17.637271","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37392","17.637277","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37393","17.638633","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37394","17.641712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37395","17.641728","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37396","17.642694","172.30.1.205","172.30.1.104","TCP","74","45656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920869 TSecr=0 WS=128" +"37397","17.643031","172.30.1.104","172.30.1.205","TCP","66","135 > 45656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37398","17.643043","172.30.1.205","172.30.1.104","TCP","54","45656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37399","17.643393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37400","17.643707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37401","17.643716","172.30.1.205","172.30.1.104","TCP","54","45656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37402","17.645950","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37403","17.646414","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37404","17.646421","172.30.1.205","172.30.1.104","TCP","54","45656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37405","17.648235","172.30.1.205","172.30.1.104","TCP","54","45656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37406","17.648356","172.30.1.205","172.30.1.104","TCP","74","38294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920874 TSecr=0 WS=128" +"37407","17.648549","172.30.1.104","172.30.1.205","TCP","54","135 > 45656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37408","17.648576","172.30.1.104","172.30.1.205","TCP","54","135 > 45656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37409","17.648581","172.30.1.205","172.30.1.104","TCP","54","45656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37410","17.648689","172.30.1.104","172.30.1.205","TCP","66","49671 > 38294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37411","17.648704","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37412","17.649083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37413","17.649405","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37414","17.649414","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37415","17.651299","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37416","17.651744","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37417","17.651751","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37418","17.653143","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37419","17.656258","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37420","17.656268","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37421","17.657234","172.30.1.205","172.30.1.104","TCP","74","45660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920883 TSecr=0 WS=128" +"37422","17.657585","172.30.1.104","172.30.1.205","TCP","66","135 > 45660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37423","17.657596","172.30.1.205","172.30.1.104","TCP","54","45660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37424","17.657950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37425","17.658283","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37426","17.658292","172.30.1.205","172.30.1.104","TCP","54","45660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37427","17.660474","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37428","17.660911","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37429","17.660917","172.30.1.205","172.30.1.104","TCP","54","45660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37430","17.662747","172.30.1.205","172.30.1.104","TCP","54","45660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37431","17.662860","172.30.1.205","172.30.1.104","TCP","74","38298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920889 TSecr=0 WS=128" +"37432","17.663063","172.30.1.104","172.30.1.205","TCP","54","135 > 45660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37433","17.663090","172.30.1.104","172.30.1.205","TCP","54","135 > 45660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37434","17.663095","172.30.1.205","172.30.1.104","TCP","54","45660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37435","17.663184","172.30.1.104","172.30.1.205","TCP","66","49671 > 38298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37436","17.663192","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37437","17.663540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37438","17.663857","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37439","17.663864","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37440","17.665765","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37441","17.666904","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37442","17.666910","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37443","17.668270","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37444","17.671317","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37445","17.671326","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37446","17.672275","172.30.1.205","172.30.1.104","TCP","74","45664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920898 TSecr=0 WS=128" +"37447","17.672639","172.30.1.104","172.30.1.205","TCP","66","135 > 45664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37448","17.672650","172.30.1.205","172.30.1.104","TCP","54","45664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37449","17.673036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37450","17.675260","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37451","17.675269","172.30.1.205","172.30.1.104","TCP","54","45664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37452","17.677502","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37453","17.678325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37454","17.678332","172.30.1.205","172.30.1.104","TCP","54","45664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37455","17.680164","172.30.1.205","172.30.1.104","TCP","54","45664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37456","17.680275","172.30.1.205","172.30.1.104","TCP","74","38302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920906 TSecr=0 WS=128" +"37457","17.680470","172.30.1.104","172.30.1.205","TCP","54","135 > 45664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37458","17.680481","172.30.1.104","172.30.1.205","TCP","54","135 > 45664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37459","17.680487","172.30.1.205","172.30.1.104","TCP","54","45664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37460","17.680585","172.30.1.104","172.30.1.205","TCP","66","49671 > 38302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37461","17.680594","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37462","17.680973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37463","17.681303","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37464","17.681312","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37465","17.683180","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37466","17.683615","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37467","17.683622","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37468","17.685017","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37469","17.688198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37470","17.688208","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37471","17.689177","172.30.1.205","172.30.1.104","TCP","74","45668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920915 TSecr=0 WS=128" +"37472","17.689492","172.30.1.104","172.30.1.205","TCP","66","135 > 45668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37473","17.689503","172.30.1.205","172.30.1.104","TCP","54","45668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37474","17.689859","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37475","17.690183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37476","17.690192","172.30.1.205","172.30.1.104","TCP","54","45668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37477","17.692384","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37478","17.692807","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37479","17.692814","172.30.1.205","172.30.1.104","TCP","54","45668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37480","17.694636","172.30.1.205","172.30.1.104","TCP","54","45668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37481","17.694749","172.30.1.205","172.30.1.104","TCP","74","38306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920921 TSecr=0 WS=128" +"37482","17.694965","172.30.1.104","172.30.1.205","TCP","54","135 > 45668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37483","17.695019","172.30.1.104","172.30.1.205","TCP","54","135 > 45668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37484","17.695024","172.30.1.205","172.30.1.104","TCP","54","45668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37485","17.695048","172.30.1.104","172.30.1.205","TCP","66","49671 > 38306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37486","17.695057","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37487","17.695405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37488","17.695730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37489","17.695739","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37490","17.697640","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37491","17.699281","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37492","17.699287","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37493","17.700648","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37494","17.703819","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37495","17.703829","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37496","17.704791","172.30.1.205","172.30.1.104","TCP","74","45672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920931 TSecr=0 WS=128" +"37497","17.705169","172.30.1.104","172.30.1.205","TCP","66","135 > 45672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37498","17.705181","172.30.1.205","172.30.1.104","TCP","54","45672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37499","17.705542","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37500","17.705864","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37501","17.705873","172.30.1.205","172.30.1.104","TCP","54","45672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37502","17.708058","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37503","17.708491","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37504","17.708498","172.30.1.205","172.30.1.104","TCP","54","45672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37505","17.710331","172.30.1.205","172.30.1.104","TCP","54","45672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37506","17.710443","172.30.1.205","172.30.1.104","TCP","74","38310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920936 TSecr=0 WS=128" +"37507","17.710633","172.30.1.104","172.30.1.205","TCP","54","135 > 45672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37508","17.710656","172.30.1.104","172.30.1.205","TCP","54","135 > 45672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37509","17.710661","172.30.1.205","172.30.1.104","TCP","54","45672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37510","17.710848","172.30.1.104","172.30.1.205","TCP","66","49671 > 38310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37511","17.710859","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37512","17.711234","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37513","17.711614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37514","17.711623","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37515","17.713526","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37516","17.713940","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37517","17.713947","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37518","17.715301","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37519","17.719736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37520","17.719749","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37521","17.720752","172.30.1.205","172.30.1.104","TCP","74","45676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920947 TSecr=0 WS=128" +"37522","17.721101","172.30.1.104","172.30.1.205","TCP","66","135 > 45676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37523","17.721112","172.30.1.205","172.30.1.104","TCP","54","45676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37524","17.721479","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37525","17.721825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37526","17.721834","172.30.1.205","172.30.1.104","TCP","54","45676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37527","17.724027","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37528","17.724504","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37529","17.724515","172.30.1.205","172.30.1.104","TCP","54","45676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37530","17.726346","172.30.1.205","172.30.1.104","TCP","54","45676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37531","17.726457","172.30.1.205","172.30.1.104","TCP","74","38314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920952 TSecr=0 WS=128" +"37532","17.726665","172.30.1.104","172.30.1.205","TCP","54","135 > 45676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37533","17.726695","172.30.1.104","172.30.1.205","TCP","54","135 > 45676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37534","17.726701","172.30.1.205","172.30.1.104","TCP","54","45676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37535","17.726803","172.30.1.104","172.30.1.205","TCP","66","49671 > 38314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37536","17.726812","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37537","17.727158","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37538","17.727546","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37539","17.727555","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37540","17.729465","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37541","17.729956","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37542","17.729966","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37543","17.731402","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37544","17.734569","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37545","17.734582","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37546","17.735567","172.30.1.205","172.30.1.104","TCP","74","45680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920961 TSecr=0 WS=128" +"37547","17.735925","172.30.1.104","172.30.1.205","TCP","66","135 > 45680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37548","17.735936","172.30.1.205","172.30.1.104","TCP","54","45680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37549","17.736292","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37550","17.736626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37551","17.736635","172.30.1.205","172.30.1.104","TCP","54","45680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37552","17.738886","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37553","17.739372","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37554","17.739379","172.30.1.205","172.30.1.104","TCP","54","45680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37555","17.741215","172.30.1.205","172.30.1.104","TCP","54","45680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37556","17.741327","172.30.1.205","172.30.1.104","TCP","74","38318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920967 TSecr=0 WS=128" +"37557","17.741522","172.30.1.104","172.30.1.205","TCP","54","135 > 45680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37558","17.741550","172.30.1.104","172.30.1.205","TCP","54","135 > 45680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37559","17.741556","172.30.1.205","172.30.1.104","TCP","54","45680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37560","17.741653","172.30.1.104","172.30.1.205","TCP","66","49671 > 38318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37561","17.741662","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37562","17.742010","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37563","17.742359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37564","17.742368","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37565","17.744243","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37566","17.744705","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37567","17.744714","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37568","17.746169","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37569","17.749330","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37570","17.749342","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37571","17.750343","172.30.1.205","172.30.1.104","TCP","74","45684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920976 TSecr=0 WS=128" +"37572","17.750692","172.30.1.104","172.30.1.205","TCP","66","135 > 45684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37573","17.750703","172.30.1.205","172.30.1.104","TCP","54","45684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37574","17.751057","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37575","17.751389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37576","17.751399","172.30.1.205","172.30.1.104","TCP","54","45684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37577","17.753642","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37578","17.754089","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37579","17.754096","172.30.1.205","172.30.1.104","TCP","54","45684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37580","17.755938","172.30.1.205","172.30.1.104","TCP","54","45684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37581","17.756053","172.30.1.205","172.30.1.104","TCP","74","38322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920982 TSecr=0 WS=128" +"37582","17.756266","172.30.1.104","172.30.1.205","TCP","54","135 > 45684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37583","17.756300","172.30.1.104","172.30.1.205","TCP","54","135 > 45684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37584","17.756306","172.30.1.205","172.30.1.104","TCP","54","45684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37585","17.756357","172.30.1.104","172.30.1.205","TCP","66","49671 > 38322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37586","17.756366","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37587","17.756716","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37588","17.757016","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37589","17.757025","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37590","17.758924","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37591","17.759315","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37592","17.759321","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37593","17.760673","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37594","17.763904","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37595","17.763914","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37596","17.764883","172.30.1.205","172.30.1.104","TCP","74","45688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920991 TSecr=0 WS=128" +"37597","17.765183","172.30.1.104","172.30.1.205","TCP","66","135 > 45688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37598","17.765193","172.30.1.205","172.30.1.104","TCP","54","45688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37599","17.765560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37600","17.765855","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37601","17.765865","172.30.1.205","172.30.1.104","TCP","54","45688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37602","17.768043","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37603","17.768491","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37604","17.768499","172.30.1.205","172.30.1.104","TCP","54","45688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37605","17.769426","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37606","17.769475","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37607","17.769512","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37608","17.769537","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37609","17.769560","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37610","17.769585","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37611","17.769613","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37612","17.769641","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37613","17.769662","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37614","17.769683","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37615","17.769708","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37616","17.769788","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37617","17.769894","172.30.1.104","172.30.1.205","TCP","54","49671 > 38282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37618","17.769908","172.30.1.104","172.30.1.205","TCP","54","49671 > 38282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37619","17.769914","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37620","17.769928","172.30.1.104","172.30.1.205","TCP","54","49671 > 38286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37621","17.769932","172.30.1.104","172.30.1.205","TCP","54","49671 > 38286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37622","17.769934","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37623","17.770218","172.30.1.104","172.30.1.205","TCP","54","49671 > 38290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37624","17.770226","172.30.1.104","172.30.1.205","TCP","54","49671 > 38294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37625","17.770228","172.30.1.104","172.30.1.205","TCP","54","49671 > 38298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37626","17.770231","172.30.1.104","172.30.1.205","TCP","54","49671 > 38290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37627","17.770236","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37628","17.770242","172.30.1.104","172.30.1.205","TCP","54","49671 > 38294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37629","17.770244","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37630","17.770245","172.30.1.104","172.30.1.205","TCP","54","49671 > 38298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37631","17.770247","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37632","17.770249","172.30.1.104","172.30.1.205","TCP","54","49671 > 38302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37633","17.770252","172.30.1.104","172.30.1.205","TCP","54","49671 > 38306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37634","17.770254","172.30.1.104","172.30.1.205","TCP","54","49671 > 38302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37635","17.770259","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37636","17.770264","172.30.1.104","172.30.1.205","TCP","54","49671 > 38310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37637","17.770267","172.30.1.104","172.30.1.205","TCP","54","49671 > 38314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37638","17.770437","172.30.1.104","172.30.1.205","TCP","54","49671 > 38314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37639","17.770442","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37640","17.770449","172.30.1.104","172.30.1.205","TCP","54","49671 > 38318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37641","17.770453","172.30.1.104","172.30.1.205","TCP","54","49671 > 38318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37642","17.770459","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37643","17.770460","172.30.1.104","172.30.1.205","TCP","54","49671 > 38306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37644","17.770462","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37645","17.770463","172.30.1.104","172.30.1.205","TCP","54","49671 > 38310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37646","17.770465","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37647","17.770632","172.30.1.104","172.30.1.205","TCP","54","49671 > 38322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37648","17.770637","172.30.1.104","172.30.1.205","TCP","54","49671 > 38278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37649","17.770640","172.30.1.104","172.30.1.205","TCP","54","49671 > 38278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37650","17.770643","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37651","17.770649","172.30.1.104","172.30.1.205","TCP","54","49671 > 38322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37652","17.770651","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37653","17.771277","172.30.1.205","172.30.1.104","TCP","54","45688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37654","17.771396","172.30.1.205","172.30.1.104","TCP","74","38326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920997 TSecr=0 WS=128" +"37655","17.771525","172.30.1.104","172.30.1.205","TCP","54","135 > 45688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37656","17.771533","172.30.1.104","172.30.1.205","TCP","54","135 > 45688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37657","17.771538","172.30.1.205","172.30.1.104","TCP","54","45688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37658","17.771664","172.30.1.104","172.30.1.205","TCP","66","49671 > 38326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37659","17.771673","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37660","17.772023","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37661","17.772311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37662","17.772317","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37663","17.774209","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37664","17.774600","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37665","17.774606","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37666","17.775965","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37667","17.781009","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37668","17.781021","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37669","17.782049","172.30.1.205","172.30.1.104","TCP","74","45692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921008 TSecr=0 WS=128" +"37670","17.782380","172.30.1.104","172.30.1.205","TCP","66","135 > 45692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37671","17.782393","172.30.1.205","172.30.1.104","TCP","54","45692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37672","17.782757","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37673","17.783098","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37674","17.783107","172.30.1.205","172.30.1.104","TCP","54","45692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37675","17.785331","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37676","17.785741","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37677","17.785747","172.30.1.205","172.30.1.104","TCP","54","45692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37678","17.787563","172.30.1.205","172.30.1.104","TCP","54","45692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37679","17.787678","172.30.1.205","172.30.1.104","TCP","74","38330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921014 TSecr=0 WS=128" +"37680","17.787874","172.30.1.104","172.30.1.205","TCP","54","135 > 45692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37681","17.787883","172.30.1.104","172.30.1.205","TCP","54","135 > 45692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37682","17.787888","172.30.1.205","172.30.1.104","TCP","54","45692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37683","17.787973","172.30.1.104","172.30.1.205","TCP","66","49671 > 38330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37684","17.787982","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37685","17.788342","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37686","17.788651","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37687","17.788660","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37688","17.790557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37689","17.791462","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37690","17.791468","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37691","17.792851","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37692","17.795929","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37693","17.795938","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37694","17.796885","172.30.1.205","172.30.1.104","TCP","74","45696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921023 TSecr=0 WS=128" +"37695","17.797205","172.30.1.104","172.30.1.205","TCP","66","135 > 45696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37696","17.797217","172.30.1.205","172.30.1.104","TCP","54","45696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37697","17.797576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37698","17.797865","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37699","17.797874","172.30.1.205","172.30.1.104","TCP","54","45696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37700","17.800071","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37701","17.800478","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37702","17.800485","172.30.1.205","172.30.1.104","TCP","54","45696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37703","17.802312","172.30.1.205","172.30.1.104","TCP","54","45696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37704","17.802423","172.30.1.205","172.30.1.104","TCP","74","38334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921028 TSecr=0 WS=128" +"37705","17.802598","172.30.1.104","172.30.1.205","TCP","54","135 > 45696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37706","17.802608","172.30.1.104","172.30.1.205","TCP","54","135 > 45696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37707","17.802614","172.30.1.205","172.30.1.104","TCP","54","45696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37708","17.802686","172.30.1.104","172.30.1.205","TCP","66","49671 > 38334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37709","17.802695","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37710","17.803041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37711","17.803327","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37712","17.803336","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37713","17.805258","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37714","17.805617","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37715","17.805624","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37716","17.806980","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37717","17.810084","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37718","17.810094","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37719","17.811057","172.30.1.205","172.30.1.104","TCP","74","45700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921037 TSecr=0 WS=128" +"37720","17.811399","172.30.1.104","172.30.1.205","TCP","66","135 > 45700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37721","17.811410","172.30.1.205","172.30.1.104","TCP","54","45700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37722","17.811765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37723","17.812072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37724","17.812081","172.30.1.205","172.30.1.104","TCP","54","45700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37725","17.814313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37726","17.814700","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37727","17.814707","172.30.1.205","172.30.1.104","TCP","54","45700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37728","17.816526","172.30.1.205","172.30.1.104","TCP","54","45700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37729","17.816638","172.30.1.205","172.30.1.104","TCP","74","38338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921043 TSecr=0 WS=128" +"37730","17.816838","172.30.1.104","172.30.1.205","TCP","54","135 > 45700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37731","17.816847","172.30.1.104","172.30.1.205","TCP","54","135 > 45700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37732","17.816853","172.30.1.205","172.30.1.104","TCP","54","45700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37733","17.816915","172.30.1.104","172.30.1.205","TCP","66","49671 > 38338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37734","17.816924","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37735","17.817296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37736","17.817600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37737","17.817609","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37738","17.819480","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37739","17.819882","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37740","17.819889","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37741","17.821277","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37742","17.824299","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37743","17.824311","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37744","17.825308","172.30.1.205","172.30.1.104","TCP","74","45704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921051 TSecr=0 WS=128" +"37745","17.825606","172.30.1.104","172.30.1.205","TCP","66","135 > 45704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37746","17.825617","172.30.1.205","172.30.1.104","TCP","54","45704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37747","17.825981","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37748","17.826268","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37749","17.826277","172.30.1.205","172.30.1.104","TCP","54","45704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37750","17.828464","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37751","17.828838","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37752","17.828845","172.30.1.205","172.30.1.104","TCP","54","45704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37753","17.830659","172.30.1.205","172.30.1.104","TCP","54","45704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37754","17.830771","172.30.1.205","172.30.1.104","TCP","74","38342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921057 TSecr=0 WS=128" +"37755","17.830910","172.30.1.104","172.30.1.205","TCP","54","135 > 45704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37756","17.830935","172.30.1.104","172.30.1.205","TCP","54","135 > 45704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37757","17.830940","172.30.1.205","172.30.1.104","TCP","54","45704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37758","17.831032","172.30.1.104","172.30.1.205","TCP","66","49671 > 38342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37759","17.831040","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37760","17.831406","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37761","17.831679","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37762","17.831688","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37763","17.833605","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37764","17.834072","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37765","17.834078","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37766","17.835441","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37767","17.838527","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37768","17.838536","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37769","17.839481","172.30.1.205","172.30.1.104","TCP","74","45708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921065 TSecr=0 WS=128" +"37770","17.839855","172.30.1.104","172.30.1.205","TCP","66","135 > 45708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37771","17.839866","172.30.1.205","172.30.1.104","TCP","54","45708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37772","17.840215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37773","17.840548","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37774","17.840561","172.30.1.205","172.30.1.104","TCP","54","45708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37775","17.842848","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37776","17.843231","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37777","17.843238","172.30.1.205","172.30.1.104","TCP","54","45708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37778","17.845111","172.30.1.205","172.30.1.104","TCP","54","45708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37779","17.845229","172.30.1.205","172.30.1.104","TCP","74","38346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921071 TSecr=0 WS=128" +"37780","17.845369","172.30.1.104","172.30.1.205","TCP","54","135 > 45708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37781","17.845381","172.30.1.104","172.30.1.205","TCP","54","135 > 45708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37782","17.845387","172.30.1.205","172.30.1.104","TCP","54","45708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37783","17.845514","172.30.1.104","172.30.1.205","TCP","66","49671 > 38346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37784","17.845522","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37785","17.845879","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37786","17.847034","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37787","17.847048","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37788","17.849026","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37789","17.849396","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37790","17.849402","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37791","17.850767","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37792","17.853834","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37793","17.853844","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37794","17.854814","172.30.1.205","172.30.1.104","TCP","74","45712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921081 TSecr=0 WS=128" +"37795","17.855128","172.30.1.104","172.30.1.205","TCP","66","135 > 45712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37796","17.855141","172.30.1.205","172.30.1.104","TCP","54","45712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37797","17.855492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37798","17.855851","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37799","17.855860","172.30.1.205","172.30.1.104","TCP","54","45712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37800","17.858081","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37801","17.858492","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37802","17.858500","172.30.1.205","172.30.1.104","TCP","54","45712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37803","17.860323","172.30.1.205","172.30.1.104","TCP","54","45712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37804","17.860443","172.30.1.205","172.30.1.104","TCP","74","38350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921086 TSecr=0 WS=128" +"37805","17.860701","172.30.1.104","172.30.1.205","TCP","54","135 > 45712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37806","17.860711","172.30.1.104","172.30.1.205","TCP","54","135 > 45712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37807","17.860716","172.30.1.205","172.30.1.104","TCP","54","45712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37808","17.860725","172.30.1.104","172.30.1.205","TCP","66","49671 > 38350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37809","17.860737","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37810","17.861106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37811","17.862069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37812","17.862076","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37813","17.863940","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37814","17.864303","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37815","17.864310","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37816","17.865691","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37817","17.868697","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37818","17.868706","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37819","17.869661","172.30.1.205","172.30.1.104","TCP","74","45716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921096 TSecr=0 WS=128" +"37820","17.869947","172.30.1.104","172.30.1.205","TCP","66","135 > 45716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37821","17.869957","172.30.1.205","172.30.1.104","TCP","54","45716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37822","17.870310","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37823","17.870615","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37824","17.870624","172.30.1.205","172.30.1.104","TCP","54","45716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37825","17.872824","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37826","17.873229","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37827","17.873235","172.30.1.205","172.30.1.104","TCP","54","45716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37828","17.875032","172.30.1.205","172.30.1.104","TCP","54","45716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37829","17.875142","172.30.1.205","172.30.1.104","TCP","74","38354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921101 TSecr=0 WS=128" +"37830","17.875280","172.30.1.104","172.30.1.205","TCP","54","135 > 45716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37831","17.875300","172.30.1.104","172.30.1.205","TCP","54","135 > 45716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37832","17.875305","172.30.1.205","172.30.1.104","TCP","54","45716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37833","17.875406","172.30.1.104","172.30.1.205","TCP","66","49671 > 38354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37834","17.875414","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37835","17.875758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37836","17.877196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37837","17.877205","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37838","17.879057","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37839","17.879452","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37840","17.879458","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37841","17.880835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37842","17.883954","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37843","17.883965","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37844","17.884943","172.30.1.205","172.30.1.104","TCP","74","45720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921111 TSecr=0 WS=128" +"37845","17.885384","172.30.1.104","172.30.1.205","TCP","66","135 > 45720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37846","17.885395","172.30.1.205","172.30.1.104","TCP","54","45720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37847","17.885746","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37848","17.886102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37849","17.886112","172.30.1.205","172.30.1.104","TCP","54","45720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37850","17.888291","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37851","17.888716","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37852","17.888725","172.30.1.205","172.30.1.104","TCP","54","45720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37853","17.890607","172.30.1.205","172.30.1.104","TCP","54","45720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37854","17.890724","172.30.1.205","172.30.1.104","TCP","74","38358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921117 TSecr=0 WS=128" +"37855","17.890866","172.30.1.104","172.30.1.205","TCP","54","135 > 45720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37856","17.890899","172.30.1.104","172.30.1.205","TCP","54","135 > 45720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37857","17.890905","172.30.1.205","172.30.1.104","TCP","54","45720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37858","17.891000","172.30.1.104","172.30.1.205","TCP","66","49671 > 38358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37859","17.891008","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37860","17.891368","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37861","17.892899","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37862","17.892908","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37863","17.894772","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37864","17.895146","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37865","17.895153","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37866","17.896496","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37867","17.899583","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37868","17.899592","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37869","17.900537","172.30.1.205","172.30.1.104","TCP","74","45724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921126 TSecr=0 WS=128" +"37870","17.900876","172.30.1.104","172.30.1.205","TCP","66","135 > 45724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37871","17.900887","172.30.1.205","172.30.1.104","TCP","54","45724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37872","17.901247","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37873","17.901538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37874","17.901546","172.30.1.205","172.30.1.104","TCP","54","45724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37875","17.903718","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37876","17.904150","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37877","17.904156","172.30.1.205","172.30.1.104","TCP","54","45724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37878","17.906006","172.30.1.205","172.30.1.104","TCP","54","45724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37879","17.906116","172.30.1.205","172.30.1.104","TCP","74","38362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921132 TSecr=0 WS=128" +"37880","17.906256","172.30.1.104","172.30.1.205","TCP","54","135 > 45724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37881","17.906302","172.30.1.104","172.30.1.205","TCP","54","135 > 45724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37882","17.906307","172.30.1.205","172.30.1.104","TCP","54","45724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37883","17.906373","172.30.1.104","172.30.1.205","TCP","66","49671 > 38362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37884","17.906382","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37885","17.906736","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37886","17.907030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37887","17.907039","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37888","17.908921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37889","17.909302","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37890","17.909308","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37891","17.910642","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37892","17.913856","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37893","17.913865","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37894","17.914829","172.30.1.205","172.30.1.104","TCP","74","45728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921141 TSecr=0 WS=128" +"37895","17.915138","172.30.1.104","172.30.1.205","TCP","66","135 > 45728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37896","17.915149","172.30.1.205","172.30.1.104","TCP","54","45728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37897","17.915503","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37898","17.915779","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37899","17.915788","172.30.1.205","172.30.1.104","TCP","54","45728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37900","17.917992","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37901","17.918391","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37902","17.918398","172.30.1.205","172.30.1.104","TCP","54","45728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37903","17.920194","172.30.1.205","172.30.1.104","TCP","54","45728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37904","17.920313","172.30.1.205","172.30.1.104","TCP","74","38366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921146 TSecr=0 WS=128" +"37905","17.920471","172.30.1.104","172.30.1.205","TCP","54","135 > 45728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37906","17.920483","172.30.1.104","172.30.1.205","TCP","54","135 > 45728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37907","17.920489","172.30.1.205","172.30.1.104","TCP","54","45728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37908","17.920583","172.30.1.104","172.30.1.205","TCP","66","49671 > 38366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37909","17.920591","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37910","17.920973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37911","17.921290","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37912","17.921299","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37913","17.923188","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37914","17.923560","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37915","17.923567","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37916","17.924939","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37917","17.927945","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37918","17.927954","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37919","17.928904","172.30.1.205","172.30.1.104","TCP","74","45732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921155 TSecr=0 WS=128" +"37920","17.929224","172.30.1.104","172.30.1.205","TCP","66","135 > 45732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37921","17.929236","172.30.1.205","172.30.1.104","TCP","54","45732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37922","17.929595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37923","17.929887","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37924","17.929896","172.30.1.205","172.30.1.104","TCP","54","45732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37925","17.932071","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37926","17.932440","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37927","17.932446","172.30.1.205","172.30.1.104","TCP","54","45732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37928","17.934274","172.30.1.205","172.30.1.104","TCP","54","45732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37929","17.934385","172.30.1.205","172.30.1.104","TCP","74","38370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921160 TSecr=0 WS=128" +"37930","17.934568","172.30.1.104","172.30.1.205","TCP","54","135 > 45732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37931","17.934577","172.30.1.104","172.30.1.205","TCP","54","135 > 45732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"37932","17.934583","172.30.1.205","172.30.1.104","TCP","54","45732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"37933","17.934657","172.30.1.104","172.30.1.205","TCP","66","49671 > 38370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37934","17.934665","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37935","17.935006","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"37936","17.935305","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37937","17.935313","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37938","17.937198","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"37939","17.937597","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"37940","17.937604","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"37941","17.938956","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"37942","17.941958","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"37943","17.941967","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37944","17.942925","172.30.1.205","172.30.1.104","TCP","74","45736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921169 TSecr=0 WS=128" +"37945","17.943199","172.30.1.104","172.30.1.205","TCP","66","135 > 45736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"37946","17.943210","172.30.1.205","172.30.1.104","TCP","54","45736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"37947","17.943565","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"37948","17.943886","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"37949","17.943895","172.30.1.205","172.30.1.104","TCP","54","45736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"37950","17.946098","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"37951","17.946465","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"37952","17.946472","172.30.1.205","172.30.1.104","TCP","54","45736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"37953","17.947315","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37954","17.947362","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37955","17.947394","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37956","17.947426","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37957","17.947459","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37958","17.947490","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37959","17.947525","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37960","17.947556","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37961","17.947587","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37962","17.947617","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37963","17.947647","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37964","17.947719","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"37965","17.947868","172.30.1.104","172.30.1.205","TCP","54","49671 > 38330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37966","17.947878","172.30.1.104","172.30.1.205","TCP","54","49671 > 38334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37967","17.947881","172.30.1.104","172.30.1.205","TCP","54","49671 > 38338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37968","17.947884","172.30.1.104","172.30.1.205","TCP","54","49671 > 38330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37969","17.947891","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37970","17.947897","172.30.1.104","172.30.1.205","TCP","54","49671 > 38342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37971","17.947901","172.30.1.104","172.30.1.205","TCP","54","49671 > 38346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37972","17.947907","172.30.1.104","172.30.1.205","TCP","54","49671 > 38346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37973","17.947909","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37974","17.947910","172.30.1.104","172.30.1.205","TCP","54","49671 > 38350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37975","17.948160","172.30.1.104","172.30.1.205","TCP","54","49671 > 38354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37976","17.948167","172.30.1.104","172.30.1.205","TCP","54","49671 > 38342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37977","17.948171","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37978","17.948177","172.30.1.104","172.30.1.205","TCP","54","49671 > 38354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37979","17.948179","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37980","17.948180","172.30.1.104","172.30.1.205","TCP","54","49671 > 38350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37981","17.948182","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37982","17.948183","172.30.1.104","172.30.1.205","TCP","54","49671 > 38334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37983","17.948185","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37984","17.948186","172.30.1.104","172.30.1.205","TCP","54","49671 > 38338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37985","17.948187","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37986","17.948188","172.30.1.104","172.30.1.205","TCP","54","49671 > 38358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37987","17.948411","172.30.1.104","172.30.1.205","TCP","54","49671 > 38362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37988","17.948417","172.30.1.104","172.30.1.205","TCP","54","49671 > 38358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37989","17.948421","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37990","17.948427","172.30.1.104","172.30.1.205","TCP","54","49671 > 38366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37991","17.948430","172.30.1.104","172.30.1.205","TCP","54","49671 > 38370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37992","17.948441","172.30.1.104","172.30.1.205","TCP","54","49671 > 38370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37993","17.948443","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37994","17.948638","172.30.1.104","172.30.1.205","TCP","54","49671 > 38326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37995","17.948643","172.30.1.104","172.30.1.205","TCP","54","49671 > 38326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37996","17.948647","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37997","17.948653","172.30.1.104","172.30.1.205","TCP","54","49671 > 38362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"37998","17.948655","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"37999","17.948656","172.30.1.104","172.30.1.205","TCP","54","49671 > 38366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38000","17.948657","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38001","17.949234","172.30.1.205","172.30.1.104","TCP","54","45736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38002","17.949344","172.30.1.205","172.30.1.104","TCP","74","38374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921175 TSecr=0 WS=128" +"38003","17.949506","172.30.1.104","172.30.1.205","TCP","54","135 > 45736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38004","17.949541","172.30.1.104","172.30.1.205","TCP","54","135 > 45736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38005","17.949546","172.30.1.205","172.30.1.104","TCP","54","45736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38006","17.949624","172.30.1.104","172.30.1.205","TCP","66","49671 > 38374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38007","17.949632","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38008","17.949993","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38009","17.950280","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38010","17.950288","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38011","17.952154","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38012","17.952522","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38013","17.952528","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38014","17.953899","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38015","17.956972","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38016","17.956981","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38017","17.957922","172.30.1.205","172.30.1.104","TCP","74","45740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921184 TSecr=0 WS=128" +"38018","17.958252","172.30.1.104","172.30.1.205","TCP","66","135 > 45740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38019","17.958262","172.30.1.205","172.30.1.104","TCP","54","45740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38020","17.958613","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38021","17.958993","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38022","17.959002","172.30.1.205","172.30.1.104","TCP","54","45740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38023","17.961187","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38024","17.961591","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38025","17.961597","172.30.1.205","172.30.1.104","TCP","54","45740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38026","17.963390","172.30.1.205","172.30.1.104","TCP","54","45740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38027","17.963499","172.30.1.205","172.30.1.104","TCP","74","38378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921189 TSecr=0 WS=128" +"38028","17.963653","172.30.1.104","172.30.1.205","TCP","54","135 > 45740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38029","17.963663","172.30.1.104","172.30.1.205","TCP","54","135 > 45740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38030","17.963668","172.30.1.205","172.30.1.104","TCP","54","45740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38031","17.963775","172.30.1.104","172.30.1.205","TCP","66","49671 > 38378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38032","17.963784","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38033","17.964128","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38034","17.964436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38035","17.964445","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38036","17.966325","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38037","17.966699","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38038","17.966705","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38039","17.968040","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38040","17.971152","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38041","17.971161","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38042","17.972103","172.30.1.205","172.30.1.104","TCP","74","45744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921198 TSecr=0 WS=128" +"38043","17.972433","172.30.1.104","172.30.1.205","TCP","66","135 > 45744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38044","17.972445","172.30.1.205","172.30.1.104","TCP","54","45744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38045","17.972821","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38046","17.973125","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38047","17.973134","172.30.1.205","172.30.1.104","TCP","54","45744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38048","17.975316","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38049","17.975740","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38050","17.975746","172.30.1.205","172.30.1.104","TCP","54","45744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38051","17.977576","172.30.1.205","172.30.1.104","TCP","54","45744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38052","17.977685","172.30.1.205","172.30.1.104","TCP","74","38382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921204 TSecr=0 WS=128" +"38053","17.977828","172.30.1.104","172.30.1.205","TCP","54","135 > 45744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38054","17.977857","172.30.1.104","172.30.1.205","TCP","54","135 > 45744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38055","17.977862","172.30.1.205","172.30.1.104","TCP","54","45744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38056","17.977977","172.30.1.104","172.30.1.205","TCP","66","49671 > 38382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38057","17.977985","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38058","17.978331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38059","17.978596","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38060","17.978604","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38061","17.980473","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38062","17.980874","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38063","17.980880","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38064","17.982233","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38065","17.985330","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38066","17.985339","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38067","17.986298","172.30.1.205","172.30.1.104","TCP","74","45748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921212 TSecr=0 WS=128" +"38068","17.986610","172.30.1.104","172.30.1.205","TCP","66","135 > 45748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38069","17.986623","172.30.1.205","172.30.1.104","TCP","54","45748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38070","17.986981","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38071","17.987274","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38072","17.987282","172.30.1.205","172.30.1.104","TCP","54","45748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38073","17.989493","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38074","17.989893","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38075","17.989899","172.30.1.205","172.30.1.104","TCP","54","45748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38076","17.991723","172.30.1.205","172.30.1.104","TCP","54","45748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38077","17.991832","172.30.1.205","172.30.1.104","TCP","74","38386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921218 TSecr=0 WS=128" +"38078","17.992008","172.30.1.104","172.30.1.205","TCP","54","135 > 45748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38079","17.992060","172.30.1.104","172.30.1.205","TCP","54","135 > 45748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38080","17.992065","172.30.1.205","172.30.1.104","TCP","54","45748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38081","17.992137","172.30.1.104","172.30.1.205","TCP","66","49671 > 38386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38082","17.992145","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38083","17.992490","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38084","17.992772","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38085","17.992790","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38086","17.994674","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38087","17.995050","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38088","17.995056","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38089","17.996400","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38090","17.999466","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38091","17.999479","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38092","18.000479","172.30.1.205","172.30.1.104","TCP","74","45752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921226 TSecr=0 WS=128" +"38093","18.000776","172.30.1.104","172.30.1.205","TCP","66","135 > 45752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38094","18.000792","172.30.1.205","172.30.1.104","TCP","54","45752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38095","18.001191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38096","18.001494","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38097","18.001504","172.30.1.205","172.30.1.104","TCP","54","45752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38098","18.003727","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38099","18.004123","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38100","18.004130","172.30.1.205","172.30.1.104","TCP","54","45752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38101","18.005983","172.30.1.205","172.30.1.104","TCP","54","45752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38102","18.006104","172.30.1.205","172.30.1.104","TCP","74","38390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921232 TSecr=0 WS=128" +"38103","18.006265","172.30.1.104","172.30.1.205","TCP","54","135 > 45752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38104","18.006297","172.30.1.104","172.30.1.205","TCP","54","135 > 45752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38105","18.006304","172.30.1.205","172.30.1.104","TCP","54","45752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38106","18.006376","172.30.1.104","172.30.1.205","TCP","66","49671 > 38390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38107","18.006384","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38108","18.006731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38109","18.007040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38110","18.007048","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38111","18.008964","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38112","18.009318","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38113","18.009324","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38114","18.010698","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38115","18.013898","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38116","18.013922","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38117","18.015131","172.30.1.205","172.30.1.104","TCP","74","45756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921241 TSecr=0 WS=128" +"38118","18.015486","172.30.1.104","172.30.1.205","TCP","66","135 > 45756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38119","18.015500","172.30.1.205","172.30.1.104","TCP","54","45756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38120","18.015866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38121","18.016168","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38122","18.016177","172.30.1.205","172.30.1.104","TCP","54","45756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38123","18.018473","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38124","18.018887","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38125","18.018894","172.30.1.205","172.30.1.104","TCP","54","45756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38126","18.020737","172.30.1.205","172.30.1.104","TCP","54","45756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38127","18.020901","172.30.1.205","172.30.1.104","TCP","74","38394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921247 TSecr=0 WS=128" +"38128","18.021016","172.30.1.104","172.30.1.205","TCP","54","135 > 45756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38129","18.021029","172.30.1.104","172.30.1.205","TCP","54","135 > 45756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38130","18.021037","172.30.1.205","172.30.1.104","TCP","54","45756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38131","18.021202","172.30.1.104","172.30.1.205","TCP","66","49671 > 38394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38132","18.021211","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38133","18.021574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38134","18.021906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38135","18.021914","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38136","18.023799","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38137","18.024172","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38138","18.024179","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38139","18.025588","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38140","18.028812","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38141","18.028823","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38142","18.029823","172.30.1.205","172.30.1.104","TCP","74","45760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921256 TSecr=0 WS=128" +"38143","18.031303","172.30.1.104","172.30.1.205","TCP","66","135 > 45760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38144","18.031315","172.30.1.205","172.30.1.104","TCP","54","45760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38145","18.031679","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38146","18.032001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38147","18.032012","172.30.1.205","172.30.1.104","TCP","54","45760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38148","18.034269","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38149","18.034701","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38150","18.034708","172.30.1.205","172.30.1.104","TCP","54","45760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38151","18.036544","172.30.1.205","172.30.1.104","TCP","54","45760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38152","18.036660","172.30.1.205","172.30.1.104","TCP","74","38398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921263 TSecr=0 WS=128" +"38153","18.036881","172.30.1.104","172.30.1.205","TCP","54","135 > 45760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38154","18.036892","172.30.1.104","172.30.1.205","TCP","54","135 > 45760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38155","18.036899","172.30.1.205","172.30.1.104","TCP","54","45760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38156","18.036997","172.30.1.104","172.30.1.205","TCP","66","49671 > 38398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38157","18.037005","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38158","18.037352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38159","18.037646","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38160","18.037654","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38161","18.039527","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38162","18.039910","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38163","18.039916","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38164","18.041305","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38165","18.044600","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38166","18.044611","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38167","18.045644","172.30.1.205","172.30.1.104","TCP","74","45764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921272 TSecr=0 WS=128" +"38168","18.045968","172.30.1.104","172.30.1.205","TCP","66","135 > 45764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38169","18.045979","172.30.1.205","172.30.1.104","TCP","54","45764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38170","18.046341","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38171","18.046650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38172","18.046661","172.30.1.205","172.30.1.104","TCP","54","45764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38173","18.048909","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38174","18.049325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38175","18.049331","172.30.1.205","172.30.1.104","TCP","54","45764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38176","18.051143","172.30.1.205","172.30.1.104","TCP","54","45764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38177","18.051259","172.30.1.205","172.30.1.104","TCP","74","38402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921277 TSecr=0 WS=128" +"38178","18.051573","172.30.1.104","172.30.1.205","TCP","66","49671 > 38402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38179","18.051586","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38180","18.051598","172.30.1.104","172.30.1.205","TCP","54","135 > 45764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38181","18.051615","172.30.1.104","172.30.1.205","TCP","54","135 > 45764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38182","18.051621","172.30.1.205","172.30.1.104","TCP","54","45764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38183","18.051973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38184","18.052276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38185","18.052285","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38186","18.054199","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38187","18.054558","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38188","18.054564","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38189","18.055921","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38190","18.059058","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38191","18.059068","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38192","18.060037","172.30.1.205","172.30.1.104","TCP","74","45768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921286 TSecr=0 WS=128" +"38193","18.060353","172.30.1.104","172.30.1.205","TCP","66","135 > 45768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38194","18.060364","172.30.1.205","172.30.1.104","TCP","54","45768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38195","18.060711","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38196","18.061005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38197","18.061014","172.30.1.205","172.30.1.104","TCP","54","45768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38198","18.063205","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38199","18.063591","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38200","18.063598","172.30.1.205","172.30.1.104","TCP","54","45768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38201","18.065431","172.30.1.205","172.30.1.104","TCP","54","45768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38202","18.065543","172.30.1.205","172.30.1.104","TCP","74","38406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921291 TSecr=0 WS=128" +"38203","18.065728","172.30.1.104","172.30.1.205","TCP","54","135 > 45768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38204","18.065753","172.30.1.104","172.30.1.205","TCP","54","135 > 45768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38205","18.065759","172.30.1.205","172.30.1.104","TCP","54","45768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38206","18.065881","172.30.1.104","172.30.1.205","TCP","66","49671 > 38406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38207","18.065888","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38208","18.066236","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38209","18.066537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38210","18.066546","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38211","18.068396","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38212","18.069184","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38213","18.069191","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38214","18.070544","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38215","18.073560","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38216","18.073569","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38217","18.074549","172.30.1.205","172.30.1.104","TCP","74","45772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921300 TSecr=0 WS=128" +"38218","18.074900","172.30.1.104","172.30.1.205","TCP","66","135 > 45772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38219","18.074912","172.30.1.205","172.30.1.104","TCP","54","45772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38220","18.075269","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38221","18.075585","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38222","18.075594","172.30.1.205","172.30.1.104","TCP","54","45772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38223","18.077827","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38224","18.078206","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38225","18.078213","172.30.1.205","172.30.1.104","TCP","54","45772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38226","18.080029","172.30.1.205","172.30.1.104","TCP","54","45772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38227","18.080161","172.30.1.205","172.30.1.104","TCP","74","38410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921306 TSecr=0 WS=128" +"38228","18.080332","172.30.1.104","172.30.1.205","TCP","54","135 > 45772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38229","18.080363","172.30.1.104","172.30.1.205","TCP","54","135 > 45772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38230","18.080369","172.30.1.205","172.30.1.104","TCP","54","45772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38231","18.080540","172.30.1.104","172.30.1.205","TCP","66","49671 > 38410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38232","18.080557","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38233","18.080928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38234","18.082194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38235","18.082203","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38236","18.084081","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38237","18.084509","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38238","18.084515","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38239","18.085898","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38240","18.088878","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38241","18.088888","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38242","18.089852","172.30.1.205","172.30.1.104","TCP","74","45776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921316 TSecr=0 WS=128" +"38243","18.090280","172.30.1.104","172.30.1.205","TCP","66","135 > 45776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38244","18.090291","172.30.1.205","172.30.1.104","TCP","54","45776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38245","18.090645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38246","18.090971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38247","18.090980","172.30.1.205","172.30.1.104","TCP","54","45776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38248","18.093202","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38249","18.093618","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38250","18.093625","172.30.1.205","172.30.1.104","TCP","54","45776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38251","18.095438","172.30.1.205","172.30.1.104","TCP","54","45776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38252","18.095563","172.30.1.205","172.30.1.104","TCP","74","38414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921321 TSecr=0 WS=128" +"38253","18.095706","172.30.1.104","172.30.1.205","TCP","54","135 > 45776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38254","18.095729","172.30.1.104","172.30.1.205","TCP","54","135 > 45776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38255","18.095735","172.30.1.205","172.30.1.104","TCP","54","45776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38256","18.095830","172.30.1.104","172.30.1.205","TCP","66","49671 > 38414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38257","18.095839","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38258","18.096186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38259","18.096487","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38260","18.096496","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38261","18.098425","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38262","18.098797","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38263","18.098804","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38264","18.100178","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38265","18.103220","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38266","18.103233","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38267","18.104257","172.30.1.205","172.30.1.104","TCP","74","45780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921330 TSecr=0 WS=128" +"38268","18.104563","172.30.1.104","172.30.1.205","TCP","66","135 > 45780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38269","18.104577","172.30.1.205","172.30.1.104","TCP","54","45780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38270","18.104976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38271","18.105274","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38272","18.105284","172.30.1.205","172.30.1.104","TCP","54","45780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38273","18.107485","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38274","18.107910","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38275","18.107917","172.30.1.205","172.30.1.104","TCP","54","45780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38276","18.109773","172.30.1.205","172.30.1.104","TCP","54","45780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38277","18.109885","172.30.1.205","172.30.1.104","TCP","74","38418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921336 TSecr=0 WS=128" +"38278","18.110112","172.30.1.104","172.30.1.205","TCP","54","135 > 45780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38279","18.110122","172.30.1.104","172.30.1.205","TCP","54","135 > 45780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38280","18.110127","172.30.1.205","172.30.1.104","TCP","54","45780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38281","18.110222","172.30.1.104","172.30.1.205","TCP","66","49671 > 38418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38282","18.110231","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38283","18.110576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38284","18.110911","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38285","18.110918","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38286","18.112813","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38287","18.113220","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38288","18.113226","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38289","18.114585","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38290","18.117645","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38291","18.117655","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38292","18.118608","172.30.1.205","172.30.1.104","TCP","74","45784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921345 TSecr=0 WS=128" +"38293","18.118957","172.30.1.104","172.30.1.205","TCP","66","135 > 45784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38294","18.118968","172.30.1.205","172.30.1.104","TCP","54","45784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38295","18.119314","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38296","18.119650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38297","18.119660","172.30.1.205","172.30.1.104","TCP","54","45784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38298","18.121877","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38299","18.122319","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38300","18.122326","172.30.1.205","172.30.1.104","TCP","54","45784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38301","18.123176","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38302","18.123227","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38303","18.123260","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38304","18.123288","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38305","18.123311","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38306","18.123339","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38307","18.123366","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38308","18.123392","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38309","18.123416","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38310","18.123442","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38311","18.123467","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38312","18.123506","172.30.1.104","172.30.1.205","TCP","54","49671 > 38378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38313","18.123560","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38314","18.123707","172.30.1.104","172.30.1.205","TCP","54","49671 > 38382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38315","18.123733","172.30.1.104","172.30.1.205","TCP","54","49671 > 38378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38316","18.123740","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38317","18.123760","172.30.1.104","172.30.1.205","TCP","54","49671 > 38386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38318","18.123791","172.30.1.104","172.30.1.205","TCP","54","49671 > 38382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38319","18.123796","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38320","18.123824","172.30.1.104","172.30.1.205","TCP","54","49671 > 38386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38321","18.123828","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38322","18.123855","172.30.1.104","172.30.1.205","TCP","54","49671 > 38390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38323","18.123886","172.30.1.104","172.30.1.205","TCP","54","49671 > 38394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38324","18.123916","172.30.1.104","172.30.1.205","TCP","54","49671 > 38390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38325","18.123920","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38326","18.123947","172.30.1.104","172.30.1.205","TCP","54","49671 > 38398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38327","18.123981","172.30.1.104","172.30.1.205","TCP","54","49671 > 38402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38328","18.124047","172.30.1.104","172.30.1.205","TCP","54","49671 > 38394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38329","18.124052","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38330","18.124054","172.30.1.104","172.30.1.205","TCP","54","49671 > 38398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38331","18.124056","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38332","18.124104","172.30.1.104","172.30.1.205","TCP","54","49671 > 38402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38333","18.124107","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38334","18.124109","172.30.1.104","172.30.1.205","TCP","54","49671 > 38406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38335","18.124123","172.30.1.104","172.30.1.205","TCP","54","49671 > 38410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38336","18.124154","172.30.1.104","172.30.1.205","TCP","54","49671 > 38406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38337","18.124157","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38338","18.124184","172.30.1.104","172.30.1.205","TCP","54","49671 > 38414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38339","18.124216","172.30.1.104","172.30.1.205","TCP","54","49671 > 38418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38340","18.124248","172.30.1.104","172.30.1.205","TCP","54","49671 > 38418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38341","18.124252","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38342","18.124278","172.30.1.104","172.30.1.205","TCP","54","49671 > 38410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38343","18.124281","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38344","18.124321","172.30.1.104","172.30.1.205","TCP","54","49671 > 38414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38345","18.124325","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38346","18.124738","172.30.1.104","172.30.1.205","TCP","54","49671 > 38374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38347","18.124768","172.30.1.104","172.30.1.205","TCP","54","49671 > 38374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38348","18.124773","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38349","18.125198","172.30.1.205","172.30.1.104","TCP","54","45784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38350","18.125315","172.30.1.205","172.30.1.104","TCP","74","38422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921351 TSecr=0 WS=128" +"38351","18.125495","172.30.1.104","172.30.1.205","TCP","54","135 > 45784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38352","18.125524","172.30.1.104","172.30.1.205","TCP","54","135 > 45784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38353","18.125529","172.30.1.205","172.30.1.104","TCP","54","45784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38354","18.125626","172.30.1.104","172.30.1.205","TCP","66","49671 > 38422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38355","18.125634","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38356","18.125989","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38357","18.126332","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38358","18.126341","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38359","18.128219","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38360","18.128657","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38361","18.128663","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38362","18.130049","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38363","18.133192","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38364","18.133203","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38365","18.134178","172.30.1.205","172.30.1.104","TCP","74","45788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921360 TSecr=0 WS=128" +"38366","18.134513","172.30.1.104","172.30.1.205","TCP","66","135 > 45788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38367","18.134524","172.30.1.205","172.30.1.104","TCP","54","45788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38368","18.134881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38369","18.135266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38370","18.135275","172.30.1.205","172.30.1.104","TCP","54","45788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38371","18.137493","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38372","18.137930","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38373","18.137937","172.30.1.205","172.30.1.104","TCP","54","45788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38374","18.139761","172.30.1.205","172.30.1.104","TCP","54","45788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38375","18.139877","172.30.1.205","172.30.1.104","TCP","74","38426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921366 TSecr=0 WS=128" +"38376","18.140040","172.30.1.104","172.30.1.205","TCP","54","135 > 45788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38377","18.140051","172.30.1.104","172.30.1.205","TCP","54","135 > 45788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38378","18.140057","172.30.1.205","172.30.1.104","TCP","54","45788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38379","18.140192","172.30.1.104","172.30.1.205","TCP","66","49671 > 38426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38380","18.140200","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38381","18.140554","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38382","18.140841","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38383","18.140850","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38384","18.142742","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38385","18.143112","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38386","18.143118","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38387","18.144474","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38388","18.147556","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38389","18.147566","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38390","18.148546","172.30.1.205","172.30.1.104","TCP","74","45792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921374 TSecr=0 WS=128" +"38391","18.148897","172.30.1.104","172.30.1.205","TCP","66","135 > 45792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38392","18.148908","172.30.1.205","172.30.1.104","TCP","54","45792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38393","18.149269","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38394","18.149583","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38395","18.149592","172.30.1.205","172.30.1.104","TCP","54","45792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38396","18.151796","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38397","18.152200","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38398","18.152207","172.30.1.205","172.30.1.104","TCP","54","45792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38399","18.154059","172.30.1.205","172.30.1.104","TCP","54","45792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38400","18.154176","172.30.1.205","172.30.1.104","TCP","74","38430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921380 TSecr=0 WS=128" +"38401","18.154419","172.30.1.104","172.30.1.205","TCP","54","135 > 45792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38402","18.154428","172.30.1.104","172.30.1.205","TCP","54","135 > 45792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38403","18.154434","172.30.1.205","172.30.1.104","TCP","54","45792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38404","18.154456","172.30.1.104","172.30.1.205","TCP","66","49671 > 38430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38405","18.154464","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38406","18.154826","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38407","18.155109","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38408","18.155118","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38409","18.157022","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38410","18.157466","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38411","18.157472","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38412","18.158828","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38413","18.161964","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38414","18.161974","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38415","18.162969","172.30.1.205","172.30.1.104","TCP","74","45796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921389 TSecr=0 WS=128" +"38416","18.163316","172.30.1.104","172.30.1.205","TCP","66","135 > 45796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38417","18.163327","172.30.1.205","172.30.1.104","TCP","54","45796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38418","18.163688","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38419","18.164159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38420","18.164168","172.30.1.205","172.30.1.104","TCP","54","45796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38421","18.166436","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38422","18.166905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38423","18.166911","172.30.1.205","172.30.1.104","TCP","54","45796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38424","18.168757","172.30.1.205","172.30.1.104","TCP","54","45796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38425","18.168910","172.30.1.205","172.30.1.104","TCP","74","38434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921395 TSecr=0 WS=128" +"38426","18.169092","172.30.1.104","172.30.1.205","TCP","54","135 > 45796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38427","18.169130","172.30.1.104","172.30.1.205","TCP","54","135 > 45796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38428","18.169137","172.30.1.205","172.30.1.104","TCP","54","45796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38429","18.169211","172.30.1.104","172.30.1.205","TCP","66","49671 > 38434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38430","18.169220","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38431","18.169586","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38432","18.169900","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38433","18.169909","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38434","18.171793","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38435","18.172170","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38436","18.172176","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38437","18.173574","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38438","18.176784","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38439","18.176794","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38440","18.177802","172.30.1.205","172.30.1.104","TCP","74","45800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921404 TSecr=0 WS=128" +"38441","18.178120","172.30.1.104","172.30.1.205","TCP","66","135 > 45800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38442","18.178132","172.30.1.205","172.30.1.104","TCP","54","45800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38443","18.178492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38444","18.178781","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38445","18.178790","172.30.1.205","172.30.1.104","TCP","54","45800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38446","18.181028","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38447","18.181461","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38448","18.181468","172.30.1.205","172.30.1.104","TCP","54","45800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38449","18.183293","172.30.1.205","172.30.1.104","TCP","54","45800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38450","18.183417","172.30.1.205","172.30.1.104","TCP","74","38438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921409 TSecr=0 WS=128" +"38451","18.183591","172.30.1.104","172.30.1.205","TCP","54","135 > 45800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38452","18.183604","172.30.1.104","172.30.1.205","TCP","54","135 > 45800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38453","18.183611","172.30.1.205","172.30.1.104","TCP","54","45800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38454","18.183759","172.30.1.104","172.30.1.205","TCP","66","49671 > 38438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38455","18.183768","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38456","18.184133","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38457","18.184433","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38458","18.184442","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38459","18.186353","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38460","18.186792","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38461","18.186798","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38462","18.188153","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38463","18.191207","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38464","18.191217","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38465","18.192218","172.30.1.205","172.30.1.104","TCP","74","45804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921418 TSecr=0 WS=128" +"38466","18.192534","172.30.1.104","172.30.1.205","TCP","66","135 > 45804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38467","18.192547","172.30.1.205","172.30.1.104","TCP","54","45804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38468","18.192935","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38469","18.193240","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38470","18.193249","172.30.1.205","172.30.1.104","TCP","54","45804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38471","18.195447","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38472","18.195834","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38473","18.195841","172.30.1.205","172.30.1.104","TCP","54","45804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38474","18.197697","172.30.1.205","172.30.1.104","TCP","54","45804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38475","18.197811","172.30.1.205","172.30.1.104","TCP","74","38442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921424 TSecr=0 WS=128" +"38476","18.198675","172.30.1.104","172.30.1.205","TCP","66","49671 > 38442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38477","18.198684","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38478","18.198704","172.30.1.104","172.30.1.205","TCP","54","135 > 45804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38479","18.198728","172.30.1.104","172.30.1.205","TCP","54","135 > 45804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38480","18.198735","172.30.1.205","172.30.1.104","TCP","54","45804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38481","18.199064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38482","18.199341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38483","18.199350","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38484","18.201258","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38485","18.201713","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38486","18.201720","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38487","18.203081","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38488","18.206177","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38489","18.206187","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38490","18.207177","172.30.1.205","172.30.1.104","TCP","74","45808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921433 TSecr=0 WS=128" +"38491","18.207592","172.30.1.104","172.30.1.205","TCP","66","135 > 45808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38492","18.207603","172.30.1.205","172.30.1.104","TCP","54","45808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38493","18.207951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38494","18.208271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38495","18.208280","172.30.1.205","172.30.1.104","TCP","54","45808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38496","18.210507","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38497","18.210942","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38498","18.210948","172.30.1.205","172.30.1.104","TCP","54","45808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38499","18.212758","172.30.1.205","172.30.1.104","TCP","54","45808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38500","18.212897","172.30.1.205","172.30.1.104","TCP","74","38446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921439 TSecr=0 WS=128" +"38501","18.213085","172.30.1.104","172.30.1.205","TCP","54","135 > 45808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38502","18.213095","172.30.1.104","172.30.1.205","TCP","54","135 > 45808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38503","18.213101","172.30.1.205","172.30.1.104","TCP","54","45808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38504","18.213225","172.30.1.104","172.30.1.205","TCP","66","49671 > 38446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38505","18.213233","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38506","18.213579","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38507","18.213874","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38508","18.213886","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38509","18.216071","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38510","18.216430","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38511","18.216436","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38512","18.217818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38513","18.220827","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38514","18.220837","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38515","18.221858","172.30.1.205","172.30.1.104","TCP","74","45812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921448 TSecr=0 WS=128" +"38516","18.222166","172.30.1.104","172.30.1.205","TCP","66","135 > 45812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38517","18.222177","172.30.1.205","172.30.1.104","TCP","54","45812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38518","18.222543","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38519","18.222807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38520","18.222816","172.30.1.205","172.30.1.104","TCP","54","45812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38521","18.225067","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38522","18.225448","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38523","18.225455","172.30.1.205","172.30.1.104","TCP","54","45812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38524","18.227259","172.30.1.205","172.30.1.104","TCP","54","45812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38525","18.227372","172.30.1.205","172.30.1.104","TCP","74","38450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921453 TSecr=0 WS=128" +"38526","18.227579","172.30.1.104","172.30.1.205","TCP","54","135 > 45812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38527","18.227592","172.30.1.104","172.30.1.205","TCP","54","135 > 45812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38528","18.227599","172.30.1.205","172.30.1.104","TCP","54","45812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38529","18.227672","172.30.1.104","172.30.1.205","TCP","66","49671 > 38450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38530","18.227681","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38531","18.228021","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38532","18.228974","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38533","18.228983","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38534","18.230859","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38535","18.231266","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38536","18.231273","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38537","18.232633","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38538","18.235770","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38539","18.235780","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38540","18.236769","172.30.1.205","172.30.1.104","TCP","74","45816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921463 TSecr=0 WS=128" +"38541","18.237160","172.30.1.104","172.30.1.205","TCP","66","135 > 45816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38542","18.237171","172.30.1.205","172.30.1.104","TCP","54","45816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38543","18.237526","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38544","18.237864","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38545","18.237873","172.30.1.205","172.30.1.104","TCP","54","45816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38546","18.240075","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38547","18.240532","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38548","18.240539","172.30.1.205","172.30.1.104","TCP","54","45816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38549","18.242375","172.30.1.205","172.30.1.104","TCP","54","45816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38550","18.242493","172.30.1.205","172.30.1.104","TCP","74","38454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921468 TSecr=0 WS=128" +"38551","18.242668","172.30.1.104","172.30.1.205","TCP","54","135 > 45816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38552","18.242716","172.30.1.104","172.30.1.205","TCP","54","135 > 45816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38553","18.242723","172.30.1.205","172.30.1.104","TCP","54","45816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38554","18.242808","172.30.1.104","172.30.1.205","TCP","66","49671 > 38454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38555","18.242817","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38556","18.243161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38557","18.244737","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38558","18.244745","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38559","18.246616","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38560","18.247055","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38561","18.247062","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38562","18.248415","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38563","18.251495","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38564","18.251505","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38565","18.252463","172.30.1.205","172.30.1.104","TCP","74","45820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921478 TSecr=0 WS=128" +"38566","18.252772","172.30.1.104","172.30.1.205","TCP","66","135 > 45820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38567","18.252793","172.30.1.205","172.30.1.104","TCP","54","45820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38568","18.253153","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38569","18.253423","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38570","18.253432","172.30.1.205","172.30.1.104","TCP","54","45820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38571","18.255625","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38572","18.256049","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38573","18.256055","172.30.1.205","172.30.1.104","TCP","54","45820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38574","18.257881","172.30.1.205","172.30.1.104","TCP","54","45820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38575","18.257994","172.30.1.205","172.30.1.104","TCP","74","38458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921484 TSecr=0 WS=128" +"38576","18.258173","172.30.1.104","172.30.1.205","TCP","54","135 > 45820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38577","18.258183","172.30.1.104","172.30.1.205","TCP","54","135 > 45820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38578","18.258190","172.30.1.205","172.30.1.104","TCP","54","45820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38579","18.258280","172.30.1.104","172.30.1.205","TCP","66","49671 > 38458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38580","18.258289","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38581","18.258634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38582","18.258926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38583","18.258935","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38584","18.260834","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38585","18.261200","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38586","18.261206","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38587","18.262554","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38588","18.265587","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38589","18.265597","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38590","18.266539","172.30.1.205","172.30.1.104","TCP","74","45824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921492 TSecr=0 WS=128" +"38591","18.266812","172.30.1.104","172.30.1.205","TCP","66","135 > 45824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38592","18.266823","172.30.1.205","172.30.1.104","TCP","54","45824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38593","18.267174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38594","18.267473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38595","18.267482","172.30.1.205","172.30.1.104","TCP","54","45824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38596","18.269690","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38597","18.270090","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38598","18.270097","172.30.1.205","172.30.1.104","TCP","54","45824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38599","18.271908","172.30.1.205","172.30.1.104","TCP","54","45824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38600","18.272021","172.30.1.205","172.30.1.104","TCP","74","38462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921498 TSecr=0 WS=128" +"38601","18.272178","172.30.1.104","172.30.1.205","TCP","54","135 > 45824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38602","18.272188","172.30.1.104","172.30.1.205","TCP","54","135 > 45824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38603","18.272194","172.30.1.205","172.30.1.104","TCP","54","45824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38604","18.274544","172.30.1.104","172.30.1.205","TCP","66","49671 > 38462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38605","18.274552","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38606","18.274903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38607","18.275242","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38608","18.275252","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38609","18.277162","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38610","18.277534","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38611","18.277541","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38612","18.278897","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38613","18.282013","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38614","18.282024","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38615","18.282982","172.30.1.205","172.30.1.104","TCP","74","45828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921509 TSecr=0 WS=128" +"38616","18.283296","172.30.1.104","172.30.1.205","TCP","66","135 > 45828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38617","18.283307","172.30.1.205","172.30.1.104","TCP","54","45828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38618","18.283663","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38619","18.283979","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38620","18.283988","172.30.1.205","172.30.1.104","TCP","54","45828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38621","18.286196","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38622","18.286606","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38623","18.286613","172.30.1.205","172.30.1.104","TCP","54","45828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38624","18.288419","172.30.1.205","172.30.1.104","TCP","54","45828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38625","18.288531","172.30.1.205","172.30.1.104","TCP","74","38466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921514 TSecr=0 WS=128" +"38626","18.288703","172.30.1.104","172.30.1.205","TCP","54","135 > 45828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38627","18.288742","172.30.1.104","172.30.1.205","TCP","54","135 > 45828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38628","18.288748","172.30.1.205","172.30.1.104","TCP","54","45828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38629","18.288852","172.30.1.104","172.30.1.205","TCP","66","49671 > 38466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38630","18.288861","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38631","18.289219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38632","18.289530","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38633","18.289538","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38634","18.291398","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38635","18.291806","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38636","18.291812","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38637","18.293185","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38638","18.296358","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38639","18.296368","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38640","18.297323","172.30.1.205","172.30.1.104","TCP","74","45832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921523 TSecr=0 WS=128" +"38641","18.297679","172.30.1.104","172.30.1.205","TCP","66","135 > 45832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38642","18.297689","172.30.1.205","172.30.1.104","TCP","54","45832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38643","18.298052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38644","18.298382","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38645","18.298391","172.30.1.205","172.30.1.104","TCP","54","45832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38646","18.300561","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38647","18.301023","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38648","18.301031","172.30.1.205","172.30.1.104","TCP","54","45832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38649","18.301876","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38650","18.301931","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38651","18.301961","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38652","18.301985","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38653","18.302012","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38654","18.302038","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38655","18.302063","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38656","18.302089","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38657","18.302117","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38658","18.302143","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38659","18.302170","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38660","18.302239","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38661","18.302243","172.30.1.104","172.30.1.205","TCP","54","49671 > 38426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38662","18.302270","172.30.1.104","172.30.1.205","TCP","54","49671 > 38430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38663","18.302500","172.30.1.104","172.30.1.205","TCP","54","49671 > 38426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38664","18.302508","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38665","18.302547","172.30.1.104","172.30.1.205","TCP","54","49671 > 38430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38666","18.302552","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38667","18.302576","172.30.1.104","172.30.1.205","TCP","54","49671 > 38434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38668","18.302608","172.30.1.104","172.30.1.205","TCP","54","49671 > 38438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38669","18.302637","172.30.1.104","172.30.1.205","TCP","54","49671 > 38442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38670","18.302667","172.30.1.104","172.30.1.205","TCP","54","49671 > 38446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38671","18.302695","172.30.1.104","172.30.1.205","TCP","54","49671 > 38450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38672","18.302725","172.30.1.104","172.30.1.205","TCP","54","49671 > 38450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38673","18.302731","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38674","18.302755","172.30.1.104","172.30.1.205","TCP","54","49671 > 38446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38675","18.302757","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38676","18.302794","172.30.1.104","172.30.1.205","TCP","54","49671 > 38434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38677","18.302796","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38678","18.302821","172.30.1.104","172.30.1.205","TCP","54","49671 > 38438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38679","18.302824","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38680","18.302852","172.30.1.104","172.30.1.205","TCP","54","49671 > 38442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38681","18.302855","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38682","18.302882","172.30.1.104","172.30.1.205","TCP","54","49671 > 38454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38683","18.302911","172.30.1.104","172.30.1.205","TCP","54","49671 > 38458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38684","18.302951","172.30.1.104","172.30.1.205","TCP","54","49671 > 38462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38685","18.302978","172.30.1.104","172.30.1.205","TCP","54","49671 > 38422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38686","18.303015","172.30.1.104","172.30.1.205","TCP","54","49671 > 38466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38687","18.303052","172.30.1.104","172.30.1.205","TCP","54","49671 > 38466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38688","18.303056","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38689","18.303088","172.30.1.104","172.30.1.205","TCP","54","49671 > 38422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38690","18.303091","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38691","18.303125","172.30.1.104","172.30.1.205","TCP","54","49671 > 38454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38692","18.303127","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38693","18.303161","172.30.1.104","172.30.1.205","TCP","54","49671 > 38458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38694","18.303164","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38695","18.303197","172.30.1.104","172.30.1.205","TCP","54","49671 > 38462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"38696","18.303200","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"38697","18.303856","172.30.1.205","172.30.1.104","TCP","54","45832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38698","18.303968","172.30.1.205","172.30.1.104","TCP","74","38470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921530 TSecr=0 WS=128" +"38699","18.304138","172.30.1.104","172.30.1.205","TCP","54","135 > 45832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38700","18.304175","172.30.1.104","172.30.1.205","TCP","54","135 > 45832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38701","18.304180","172.30.1.205","172.30.1.104","TCP","54","45832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38702","18.304294","172.30.1.104","172.30.1.205","TCP","66","49671 > 38470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38703","18.304302","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38704","18.304660","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38705","18.304977","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38706","18.304985","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38707","18.306867","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38708","18.307257","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38709","18.307263","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38710","18.308618","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38711","18.311764","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38712","18.311773","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38713","18.312707","172.30.1.205","172.30.1.104","TCP","74","45836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921539 TSecr=0 WS=128" +"38714","18.313048","172.30.1.104","172.30.1.205","TCP","66","135 > 45836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38715","18.313059","172.30.1.205","172.30.1.104","TCP","54","45836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38716","18.313413","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38717","18.313711","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38718","18.313720","172.30.1.205","172.30.1.104","TCP","54","45836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38719","18.315895","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38720","18.316358","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38721","18.316365","172.30.1.205","172.30.1.104","TCP","54","45836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38722","18.318178","172.30.1.205","172.30.1.104","TCP","54","45836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38723","18.318289","172.30.1.205","172.30.1.104","TCP","74","38474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921544 TSecr=0 WS=128" +"38724","18.318439","172.30.1.104","172.30.1.205","TCP","54","135 > 45836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38725","18.318467","172.30.1.104","172.30.1.205","TCP","54","135 > 45836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38726","18.318472","172.30.1.205","172.30.1.104","TCP","54","45836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38727","18.318565","172.30.1.104","172.30.1.205","TCP","66","49671 > 38474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38728","18.318573","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38729","18.318915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38730","18.319199","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38731","18.319208","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38732","18.321095","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38733","18.321748","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38734","18.321752","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38735","18.323094","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38736","18.326220","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38737","18.326231","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38738","18.327184","172.30.1.205","172.30.1.104","TCP","74","45840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921553 TSecr=0 WS=128" +"38739","18.327513","172.30.1.104","172.30.1.205","TCP","66","135 > 45840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38740","18.327524","172.30.1.205","172.30.1.104","TCP","54","45840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38741","18.327881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38742","18.328191","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38743","18.328200","172.30.1.205","172.30.1.104","TCP","54","45840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38744","18.330419","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38745","18.330851","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38746","18.330857","172.30.1.205","172.30.1.104","TCP","54","45840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38747","18.332667","172.30.1.205","172.30.1.104","TCP","54","45840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38748","18.332805","172.30.1.205","172.30.1.104","TCP","74","38478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921559 TSecr=0 WS=128" +"38749","18.332956","172.30.1.104","172.30.1.205","TCP","54","135 > 45840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38750","18.332992","172.30.1.104","172.30.1.205","TCP","54","135 > 45840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38751","18.332998","172.30.1.205","172.30.1.104","TCP","54","45840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38752","18.333107","172.30.1.104","172.30.1.205","TCP","66","49671 > 38478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38753","18.333115","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38754","18.333475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38755","18.333807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38756","18.333816","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38757","18.335678","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38758","18.336094","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38759","18.336100","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38760","18.337475","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38761","18.340772","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38762","18.340793","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38763","18.341767","172.30.1.205","172.30.1.104","TCP","74","45844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921568 TSecr=0 WS=128" +"38764","18.342090","172.30.1.104","172.30.1.205","TCP","66","135 > 45844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38765","18.342102","172.30.1.205","172.30.1.104","TCP","54","45844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38766","18.342464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38767","18.342750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38768","18.342758","172.30.1.205","172.30.1.104","TCP","54","45844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38769","18.344980","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38770","18.345375","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38771","18.345381","172.30.1.205","172.30.1.104","TCP","54","45844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38772","18.347208","172.30.1.205","172.30.1.104","TCP","54","45844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38773","18.347320","172.30.1.205","172.30.1.104","TCP","74","38482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921573 TSecr=0 WS=128" +"38774","18.347475","172.30.1.104","172.30.1.205","TCP","54","135 > 45844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38775","18.347486","172.30.1.104","172.30.1.205","TCP","54","135 > 45844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38776","18.347493","172.30.1.205","172.30.1.104","TCP","54","45844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38777","18.347584","172.30.1.104","172.30.1.205","TCP","66","49671 > 38482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38778","18.347593","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38779","18.347939","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38780","18.348225","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38781","18.348234","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38782","18.350160","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38783","18.350516","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38784","18.350522","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38785","18.351873","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38786","18.355043","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38787","18.355053","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38788","18.355995","172.30.1.205","172.30.1.104","TCP","74","45848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921582 TSecr=0 WS=128" +"38789","18.356308","172.30.1.104","172.30.1.205","TCP","66","135 > 45848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38790","18.356319","172.30.1.205","172.30.1.104","TCP","54","45848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38791","18.356665","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38792","18.356945","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38793","18.356955","172.30.1.205","172.30.1.104","TCP","54","45848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38794","18.359144","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38795","18.359594","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38796","18.359601","172.30.1.205","172.30.1.104","TCP","54","45848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38797","18.361441","172.30.1.205","172.30.1.104","TCP","54","45848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38798","18.361553","172.30.1.205","172.30.1.104","TCP","74","38486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921587 TSecr=0 WS=128" +"38799","18.361697","172.30.1.104","172.30.1.205","TCP","54","135 > 45848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38800","18.361708","172.30.1.104","172.30.1.205","TCP","54","135 > 45848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38801","18.361713","172.30.1.205","172.30.1.104","TCP","54","45848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38802","18.361843","172.30.1.104","172.30.1.205","TCP","66","49671 > 38486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38803","18.361851","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38804","18.362202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38805","18.362499","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38806","18.362507","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38807","18.364371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38808","18.364723","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38809","18.364729","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38810","18.366113","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38811","18.369213","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38812","18.369223","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38813","18.370274","172.30.1.205","172.30.1.104","TCP","74","45852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921596 TSecr=0 WS=128" +"38814","18.370569","172.30.1.104","172.30.1.205","TCP","66","135 > 45852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38815","18.370586","172.30.1.205","172.30.1.104","TCP","54","45852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38816","18.370991","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38817","18.371339","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38818","18.371348","172.30.1.205","172.30.1.104","TCP","54","45852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38819","18.373602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38820","18.374020","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38821","18.374026","172.30.1.205","172.30.1.104","TCP","54","45852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38822","18.375864","172.30.1.205","172.30.1.104","TCP","54","45852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38823","18.375981","172.30.1.205","172.30.1.104","TCP","74","38490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921602 TSecr=0 WS=128" +"38824","18.376112","172.30.1.104","172.30.1.205","TCP","54","135 > 45852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38825","18.376163","172.30.1.104","172.30.1.205","TCP","54","135 > 45852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38826","18.376169","172.30.1.205","172.30.1.104","TCP","54","45852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38827","18.376237","172.30.1.104","172.30.1.205","TCP","66","49671 > 38490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38828","18.376245","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38829","18.376591","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38830","18.376868","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38831","18.376878","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38832","18.378785","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38833","18.379152","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38834","18.379159","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38835","18.380522","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38836","18.383580","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38837","18.383590","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38838","18.384562","172.30.1.205","172.30.1.104","TCP","74","45856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921610 TSecr=0 WS=128" +"38839","18.384844","172.30.1.104","172.30.1.205","TCP","66","135 > 45856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38840","18.384855","172.30.1.205","172.30.1.104","TCP","54","45856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38841","18.385216","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38842","18.385501","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38843","18.385510","172.30.1.205","172.30.1.104","TCP","54","45856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38844","18.387706","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38845","18.388106","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38846","18.388113","172.30.1.205","172.30.1.104","TCP","54","45856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38847","18.389957","172.30.1.205","172.30.1.104","TCP","54","45856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38848","18.390069","172.30.1.205","172.30.1.104","TCP","74","38494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921616 TSecr=0 WS=128" +"38849","18.390214","172.30.1.104","172.30.1.205","TCP","54","135 > 45856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38850","18.390258","172.30.1.104","172.30.1.205","TCP","54","135 > 45856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38851","18.390264","172.30.1.205","172.30.1.104","TCP","54","45856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38852","18.390355","172.30.1.104","172.30.1.205","TCP","66","49671 > 38494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38853","18.390364","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38854","18.390725","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38855","18.391039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38856","18.391048","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38857","18.392944","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38858","18.393380","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38859","18.393387","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38860","18.394752","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38861","18.398094","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38862","18.398104","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38863","18.399051","172.30.1.205","172.30.1.104","TCP","74","45860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921625 TSecr=0 WS=128" +"38864","18.399404","172.30.1.104","172.30.1.205","TCP","66","135 > 45860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38865","18.399415","172.30.1.205","172.30.1.104","TCP","54","45860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38866","18.399765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38867","18.400076","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38868","18.400085","172.30.1.205","172.30.1.104","TCP","54","45860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38869","18.402341","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38870","18.402842","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38871","18.402849","172.30.1.205","172.30.1.104","TCP","54","45860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38872","18.404670","172.30.1.205","172.30.1.104","TCP","54","45860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38873","18.404808","172.30.1.205","172.30.1.104","TCP","74","38498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921631 TSecr=0 WS=128" +"38874","18.404968","172.30.1.104","172.30.1.205","TCP","54","135 > 45860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38875","18.404979","172.30.1.104","172.30.1.205","TCP","54","135 > 45860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38876","18.404984","172.30.1.205","172.30.1.104","TCP","54","45860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38877","18.405124","172.30.1.104","172.30.1.205","TCP","66","49671 > 38498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38878","18.405133","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38879","18.405487","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38880","18.405880","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38881","18.405889","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38882","18.407776","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38883","18.408186","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38884","18.408192","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38885","18.409592","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38886","18.412740","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38887","18.412750","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38888","18.413703","172.30.1.205","172.30.1.104","TCP","74","45864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921640 TSecr=0 WS=128" +"38889","18.414059","172.30.1.104","172.30.1.205","TCP","66","135 > 45864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38890","18.414070","172.30.1.205","172.30.1.104","TCP","54","45864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38891","18.414423","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38892","18.414756","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38893","18.414766","172.30.1.205","172.30.1.104","TCP","54","45864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38894","18.416968","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38895","18.417444","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38896","18.417451","172.30.1.205","172.30.1.104","TCP","54","45864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38897","18.419255","172.30.1.205","172.30.1.104","TCP","54","45864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38898","18.419367","172.30.1.205","172.30.1.104","TCP","74","38502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921645 TSecr=0 WS=128" +"38899","18.419561","172.30.1.104","172.30.1.205","TCP","54","135 > 45864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38900","18.419590","172.30.1.104","172.30.1.205","TCP","54","135 > 45864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38901","18.419596","172.30.1.205","172.30.1.104","TCP","54","45864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38902","18.419706","172.30.1.104","172.30.1.205","TCP","66","49671 > 38502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38903","18.419714","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38904","18.420060","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38905","18.421539","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38906","18.421547","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38907","18.423417","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38908","18.423832","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38909","18.423838","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38910","18.425228","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38911","18.428423","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38912","18.428433","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38913","18.429397","172.30.1.205","172.30.1.104","TCP","74","45868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921655 TSecr=0 WS=128" +"38914","18.429755","172.30.1.104","172.30.1.205","TCP","66","135 > 45868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38915","18.429766","172.30.1.205","172.30.1.104","TCP","54","45868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38916","18.430130","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38917","18.430452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38918","18.430469","172.30.1.205","172.30.1.104","TCP","54","45868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38919","18.432654","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38920","18.433100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38921","18.433106","172.30.1.205","172.30.1.104","TCP","54","45868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38922","18.434924","172.30.1.205","172.30.1.104","TCP","54","45868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38923","18.435035","172.30.1.205","172.30.1.104","TCP","74","38506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921661 TSecr=0 WS=128" +"38924","18.435209","172.30.1.104","172.30.1.205","TCP","54","135 > 45868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38925","18.435236","172.30.1.104","172.30.1.205","TCP","54","135 > 45868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38926","18.435241","172.30.1.205","172.30.1.104","TCP","54","45868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38927","18.435339","172.30.1.104","172.30.1.205","TCP","66","49671 > 38506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38928","18.435347","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38929","18.435693","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38930","18.435998","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38931","18.436006","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38932","18.437904","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38933","18.438333","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38934","18.438338","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38935","18.439692","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38936","18.443816","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38937","18.443835","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38938","18.444909","172.30.1.205","172.30.1.104","TCP","74","45872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921671 TSecr=0 WS=128" +"38939","18.445338","172.30.1.104","172.30.1.205","TCP","66","135 > 45872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38940","18.445350","172.30.1.205","172.30.1.104","TCP","54","45872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38941","18.445711","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38942","18.446037","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38943","18.446047","172.30.1.205","172.30.1.104","TCP","54","45872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38944","18.448244","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38945","18.448709","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38946","18.448715","172.30.1.205","172.30.1.104","TCP","54","45872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38947","18.450525","172.30.1.205","172.30.1.104","TCP","54","45872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38948","18.450639","172.30.1.205","172.30.1.104","TCP","74","38510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921677 TSecr=0 WS=128" +"38949","18.450820","172.30.1.104","172.30.1.205","TCP","54","135 > 45872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38950","18.450847","172.30.1.104","172.30.1.205","TCP","54","135 > 45872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38951","18.450853","172.30.1.205","172.30.1.104","TCP","54","45872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38952","18.450953","172.30.1.104","172.30.1.205","TCP","66","49671 > 38510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38953","18.450961","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38954","18.451312","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38955","18.451632","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38956","18.451640","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38957","18.453547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38958","18.453956","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38959","18.453962","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38960","18.455308","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38961","18.458386","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38962","18.458396","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38963","18.459343","172.30.1.205","172.30.1.104","TCP","74","45876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921685 TSecr=0 WS=128" +"38964","18.459628","172.30.1.104","172.30.1.205","TCP","66","135 > 45876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38965","18.459639","172.30.1.205","172.30.1.104","TCP","54","45876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38966","18.459985","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38967","18.460264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38968","18.460273","172.30.1.205","172.30.1.104","TCP","54","45876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38969","18.462501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38970","18.462904","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38971","18.462911","172.30.1.205","172.30.1.104","TCP","54","45876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38972","18.464718","172.30.1.205","172.30.1.104","TCP","54","45876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38973","18.464864","172.30.1.205","172.30.1.104","TCP","74","38514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921691 TSecr=0 WS=128" +"38974","18.465001","172.30.1.104","172.30.1.205","TCP","54","135 > 45876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38975","18.465011","172.30.1.104","172.30.1.205","TCP","54","135 > 45876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"38976","18.465016","172.30.1.205","172.30.1.104","TCP","54","45876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"38977","18.465154","172.30.1.104","172.30.1.205","TCP","66","49671 > 38514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38978","18.465162","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38979","18.465508","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"38980","18.465786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38981","18.465795","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38982","18.467656","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"38983","18.468030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"38984","18.468036","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"38985","18.469416","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"38986","18.472439","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"38987","18.472448","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38988","18.473428","172.30.1.205","172.30.1.104","TCP","74","45880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921699 TSecr=0 WS=128" +"38989","18.473738","172.30.1.104","172.30.1.205","TCP","66","135 > 45880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"38990","18.473748","172.30.1.205","172.30.1.104","TCP","54","45880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"38991","18.474121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"38992","18.474437","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"38993","18.474446","172.30.1.205","172.30.1.104","TCP","54","45880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"38994","18.476638","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"38995","18.477053","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"38996","18.477060","172.30.1.205","172.30.1.104","TCP","54","45880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"38997","18.477920","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38998","18.477971","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"38999","18.478009","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39000","18.478044","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39001","18.478079","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39002","18.478107","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39003","18.478136","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39004","18.478169","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39005","18.478201","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39006","18.478233","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39007","18.478266","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39008","18.478341","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39009","18.478447","172.30.1.104","172.30.1.205","TCP","54","49671 > 38474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39010","18.478475","172.30.1.104","172.30.1.205","TCP","54","49671 > 38478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39011","18.478506","172.30.1.104","172.30.1.205","TCP","54","49671 > 38474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39012","18.478514","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39013","18.478526","172.30.1.104","172.30.1.205","TCP","54","49671 > 38482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39014","18.478549","172.30.1.104","172.30.1.205","TCP","54","49671 > 38486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39015","18.478568","172.30.1.104","172.30.1.205","TCP","54","49671 > 38490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39016","18.478588","172.30.1.104","172.30.1.205","TCP","54","49671 > 38486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39017","18.478592","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39018","18.478607","172.30.1.104","172.30.1.205","TCP","54","49671 > 38494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39019","18.478627","172.30.1.104","172.30.1.205","TCP","54","49671 > 38498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39020","18.478646","172.30.1.104","172.30.1.205","TCP","54","49671 > 38498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39021","18.478650","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39022","18.478666","172.30.1.104","172.30.1.205","TCP","54","49671 > 38502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39023","18.478685","172.30.1.104","172.30.1.205","TCP","54","49671 > 38494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39024","18.478690","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39025","18.478708","172.30.1.104","172.30.1.205","TCP","54","49671 > 38506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39026","18.478813","172.30.1.104","172.30.1.205","TCP","54","49671 > 38490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39027","18.478818","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39028","18.478833","172.30.1.104","172.30.1.205","TCP","54","49671 > 38510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39029","18.478855","172.30.1.104","172.30.1.205","TCP","54","49671 > 38510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39030","18.478859","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39031","18.478875","172.30.1.104","172.30.1.205","TCP","54","49671 > 38506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39032","18.478878","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39033","18.478898","172.30.1.104","172.30.1.205","TCP","54","49671 > 38502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39034","18.478901","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39035","18.478919","172.30.1.104","172.30.1.205","TCP","54","49671 > 38478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39036","18.478923","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39037","18.478936","172.30.1.104","172.30.1.205","TCP","54","49671 > 38482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39038","18.478939","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39039","18.479128","172.30.1.104","172.30.1.205","TCP","54","49671 > 38514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39040","18.479135","172.30.1.104","172.30.1.205","TCP","54","49671 > 38470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39041","18.479140","172.30.1.104","172.30.1.205","TCP","54","49671 > 38514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39042","18.479145","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39043","18.479150","172.30.1.104","172.30.1.205","TCP","54","49671 > 38470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39044","18.479152","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39045","18.479950","172.30.1.205","172.30.1.104","TCP","54","45880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39046","18.480068","172.30.1.205","172.30.1.104","TCP","74","38518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921706 TSecr=0 WS=128" +"39047","18.480197","172.30.1.104","172.30.1.205","TCP","54","135 > 45880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39048","18.480208","172.30.1.104","172.30.1.205","TCP","54","135 > 45880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39049","18.480213","172.30.1.205","172.30.1.104","TCP","54","45880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39050","18.480346","172.30.1.104","172.30.1.205","TCP","66","49671 > 38518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39051","18.480355","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39052","18.480711","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39053","18.481090","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39054","18.481106","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39055","18.482988","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39056","18.483414","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39057","18.483421","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39058","18.484805","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39059","18.487890","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39060","18.487900","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39061","18.488887","172.30.1.205","172.30.1.104","TCP","74","45884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921715 TSecr=0 WS=128" +"39062","18.489173","172.30.1.104","172.30.1.205","TCP","66","135 > 45884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39063","18.489185","172.30.1.205","172.30.1.104","TCP","54","45884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39064","18.489544","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39065","18.489829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39066","18.489846","172.30.1.205","172.30.1.104","TCP","54","45884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39067","18.492041","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39068","18.492486","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39069","18.492492","172.30.1.205","172.30.1.104","TCP","54","45884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39070","18.494336","172.30.1.205","172.30.1.104","TCP","54","45884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39071","18.494450","172.30.1.205","172.30.1.104","TCP","74","38522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921720 TSecr=0 WS=128" +"39072","18.494621","172.30.1.104","172.30.1.205","TCP","54","135 > 45884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39073","18.494647","172.30.1.104","172.30.1.205","TCP","54","135 > 45884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39074","18.494654","172.30.1.205","172.30.1.104","TCP","54","45884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39075","18.494748","172.30.1.104","172.30.1.205","TCP","66","49671 > 38522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39076","18.494756","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39077","18.495103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39078","18.495510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39079","18.495520","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39080","18.497431","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39081","18.497856","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39082","18.497862","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39083","18.499220","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39084","18.502318","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39085","18.502329","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39086","18.503325","172.30.1.205","172.30.1.104","TCP","74","45888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921729 TSecr=0 WS=128" +"39087","18.503645","172.30.1.104","172.30.1.205","TCP","66","135 > 45888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39088","18.503657","172.30.1.205","172.30.1.104","TCP","54","45888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39089","18.504013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39090","18.504320","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39091","18.504329","172.30.1.205","172.30.1.104","TCP","54","45888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39092","18.506588","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39093","18.507006","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39094","18.507013","172.30.1.205","172.30.1.104","TCP","54","45888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39095","18.508868","172.30.1.205","172.30.1.104","TCP","54","45888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39096","18.508982","172.30.1.205","172.30.1.104","TCP","74","38526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921735 TSecr=0 WS=128" +"39097","18.509140","172.30.1.104","172.30.1.205","TCP","54","135 > 45888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39098","18.509153","172.30.1.104","172.30.1.205","TCP","54","135 > 45888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39099","18.509159","172.30.1.205","172.30.1.104","TCP","54","45888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39100","18.509241","172.30.1.104","172.30.1.205","TCP","66","49671 > 38526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39101","18.509250","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39102","18.509615","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39103","18.509890","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39104","18.509902","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39105","18.511784","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39106","18.512178","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39107","18.512185","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39108","18.513580","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39109","18.516709","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39110","18.516721","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39111","18.517750","172.30.1.205","172.30.1.104","TCP","74","45892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921744 TSecr=0 WS=128" +"39112","18.518064","172.30.1.104","172.30.1.205","TCP","66","135 > 45892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39113","18.518075","172.30.1.205","172.30.1.104","TCP","54","45892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39114","18.518436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39115","18.518740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39116","18.518749","172.30.1.205","172.30.1.104","TCP","54","45892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39117","18.520990","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39118","18.521386","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39119","18.521393","172.30.1.205","172.30.1.104","TCP","54","45892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39120","18.523226","172.30.1.205","172.30.1.104","TCP","54","45892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39121","18.523342","172.30.1.205","172.30.1.104","TCP","74","38530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921749 TSecr=0 WS=128" +"39122","18.523479","172.30.1.104","172.30.1.205","TCP","54","135 > 45892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39123","18.523513","172.30.1.104","172.30.1.205","TCP","54","135 > 45892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39124","18.523519","172.30.1.205","172.30.1.104","TCP","54","45892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39125","18.523677","172.30.1.104","172.30.1.205","TCP","66","49671 > 38530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39126","18.523685","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39127","18.524034","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39128","18.524308","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39129","18.524317","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39130","18.526242","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39131","18.526644","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39132","18.526651","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39133","18.528033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39134","18.531119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39135","18.531129","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39136","18.532087","172.30.1.205","172.30.1.104","TCP","74","45896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921758 TSecr=0 WS=128" +"39137","18.532430","172.30.1.104","172.30.1.205","TCP","66","135 > 45896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39138","18.532441","172.30.1.205","172.30.1.104","TCP","54","45896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39139","18.532827","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39140","18.533134","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39141","18.533144","172.30.1.205","172.30.1.104","TCP","54","45896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39142","18.535337","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39143","18.535745","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39144","18.535752","172.30.1.205","172.30.1.104","TCP","54","45896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39145","18.537580","172.30.1.205","172.30.1.104","TCP","54","45896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39146","18.537693","172.30.1.205","172.30.1.104","TCP","74","38534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921764 TSecr=0 WS=128" +"39147","18.537886","172.30.1.104","172.30.1.205","TCP","54","135 > 45896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39148","18.537957","172.30.1.104","172.30.1.205","TCP","54","135 > 45896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39149","18.537962","172.30.1.205","172.30.1.104","TCP","54","45896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39150","18.538035","172.30.1.104","172.30.1.205","TCP","66","49671 > 38534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39151","18.538043","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39152","18.538404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39153","18.538706","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39154","18.538714","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39155","18.540568","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39156","18.540932","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39157","18.540939","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39158","18.542306","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39159","18.546149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39160","18.546159","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39161","18.547102","172.30.1.205","172.30.1.104","TCP","74","45900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921773 TSecr=0 WS=128" +"39162","18.547448","172.30.1.104","172.30.1.205","TCP","66","135 > 45900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39163","18.547460","172.30.1.205","172.30.1.104","TCP","54","45900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39164","18.547814","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39165","18.548114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39166","18.548123","172.30.1.205","172.30.1.104","TCP","54","45900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39167","18.550334","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39168","18.550707","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39169","18.550713","172.30.1.205","172.30.1.104","TCP","54","45900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39170","18.552556","172.30.1.205","172.30.1.104","TCP","54","45900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39171","18.552668","172.30.1.205","172.30.1.104","TCP","74","38538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921779 TSecr=0 WS=128" +"39172","18.552833","172.30.1.104","172.30.1.205","TCP","54","135 > 45900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39173","18.552864","172.30.1.104","172.30.1.205","TCP","54","135 > 45900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39174","18.552870","172.30.1.205","172.30.1.104","TCP","54","45900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39175","18.552936","172.30.1.104","172.30.1.205","TCP","66","49671 > 38538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39176","18.552944","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39177","18.553311","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39178","18.553629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39179","18.553637","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39180","18.555534","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39181","18.555945","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39182","18.555951","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39183","18.557343","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39184","18.561588","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39185","18.561598","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39186","18.562548","172.30.1.205","172.30.1.104","TCP","74","45904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921788 TSecr=0 WS=128" +"39187","18.562939","172.30.1.104","172.30.1.205","TCP","66","135 > 45904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39188","18.562950","172.30.1.205","172.30.1.104","TCP","54","45904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39189","18.563300","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39190","18.563593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39191","18.563603","172.30.1.205","172.30.1.104","TCP","54","45904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39192","18.565814","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39193","18.566220","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39194","18.566227","172.30.1.205","172.30.1.104","TCP","54","45904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39195","18.568045","172.30.1.205","172.30.1.104","TCP","54","45904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39196","18.568160","172.30.1.205","172.30.1.104","TCP","74","38542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921794 TSecr=0 WS=128" +"39197","18.568310","172.30.1.104","172.30.1.205","TCP","54","135 > 45904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39198","18.568332","172.30.1.104","172.30.1.205","TCP","54","135 > 45904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39199","18.568338","172.30.1.205","172.30.1.104","TCP","54","45904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39200","18.568424","172.30.1.104","172.30.1.205","TCP","66","49671 > 38542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39201","18.568432","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39202","18.568805","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39203","18.569114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39204","18.569124","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39205","18.571020","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39206","18.571410","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39207","18.571418","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39208","18.572818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39209","18.576088","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39210","18.576097","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39211","18.577070","172.30.1.205","172.30.1.104","TCP","74","45908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921803 TSecr=0 WS=128" +"39212","18.577437","172.30.1.104","172.30.1.205","TCP","66","135 > 45908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39213","18.577448","172.30.1.205","172.30.1.104","TCP","54","45908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39214","18.577801","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39215","18.578078","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39216","18.578087","172.30.1.205","172.30.1.104","TCP","54","45908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39217","18.580270","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39218","18.580676","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39219","18.580683","172.30.1.205","172.30.1.104","TCP","54","45908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39220","18.582503","172.30.1.205","172.30.1.104","TCP","54","45908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39221","18.582615","172.30.1.205","172.30.1.104","TCP","74","38546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921809 TSecr=0 WS=128" +"39222","18.582860","172.30.1.104","172.30.1.205","TCP","54","135 > 45908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39223","18.582902","172.30.1.104","172.30.1.205","TCP","54","135 > 45908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39224","18.582907","172.30.1.205","172.30.1.104","TCP","54","45908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39225","18.582915","172.30.1.104","172.30.1.205","TCP","66","49671 > 38546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39226","18.582926","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39227","18.583273","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39228","18.583572","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39229","18.583581","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39230","18.585492","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39231","18.585851","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39232","18.585857","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39233","18.587208","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39234","18.590357","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39235","18.590367","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39236","18.591328","172.30.1.205","172.30.1.104","TCP","74","45912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921817 TSecr=0 WS=128" +"39237","18.591666","172.30.1.104","172.30.1.205","TCP","66","135 > 45912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39238","18.591677","172.30.1.205","172.30.1.104","TCP","54","45912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39239","18.592025","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39240","18.592309","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39241","18.592318","172.30.1.205","172.30.1.104","TCP","54","45912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39242","18.594524","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39243","18.594984","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39244","18.594991","172.30.1.205","172.30.1.104","TCP","54","45912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39245","18.596820","172.30.1.205","172.30.1.104","TCP","54","45912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39246","18.596930","172.30.1.205","172.30.1.104","TCP","74","38550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921823 TSecr=0 WS=128" +"39247","18.597132","172.30.1.104","172.30.1.205","TCP","54","135 > 45912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39248","18.597158","172.30.1.104","172.30.1.205","TCP","54","135 > 45912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39249","18.597164","172.30.1.205","172.30.1.104","TCP","54","45912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39250","18.597257","172.30.1.104","172.30.1.205","TCP","66","49671 > 38550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39251","18.597265","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39252","18.597612","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39253","18.597932","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39254","18.597941","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39255","18.599812","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39256","18.600171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39257","18.600178","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39258","18.601546","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39259","18.604667","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39260","18.604676","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39261","18.605632","172.30.1.205","172.30.1.104","TCP","74","45916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921832 TSecr=0 WS=128" +"39262","18.605939","172.30.1.104","172.30.1.205","TCP","66","135 > 45916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39263","18.605950","172.30.1.205","172.30.1.104","TCP","54","45916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39264","18.606303","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39265","18.606592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39266","18.606602","172.30.1.205","172.30.1.104","TCP","54","45916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39267","18.608767","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39268","18.609212","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39269","18.609219","172.30.1.205","172.30.1.104","TCP","54","45916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39270","18.611018","172.30.1.205","172.30.1.104","TCP","54","45916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39271","18.611130","172.30.1.205","172.30.1.104","TCP","74","38554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921837 TSecr=0 WS=128" +"39272","18.611326","172.30.1.104","172.30.1.205","TCP","54","135 > 45916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39273","18.611337","172.30.1.104","172.30.1.205","TCP","54","135 > 45916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39274","18.611343","172.30.1.205","172.30.1.104","TCP","54","45916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39275","18.611408","172.30.1.104","172.30.1.205","TCP","66","49671 > 38554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39276","18.611417","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39277","18.611761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39278","18.612048","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39279","18.612057","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39280","18.613953","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39281","18.616520","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39282","18.616527","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39283","18.617891","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39284","18.621049","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39285","18.621059","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39286","18.621996","172.30.1.205","172.30.1.104","TCP","74","45920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921848 TSecr=0 WS=128" +"39287","18.622373","172.30.1.104","172.30.1.205","TCP","66","135 > 45920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39288","18.622385","172.30.1.205","172.30.1.104","TCP","54","45920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39289","18.622742","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39290","18.623032","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39291","18.623041","172.30.1.205","172.30.1.104","TCP","54","45920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39292","18.625246","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39293","18.625645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39294","18.625652","172.30.1.205","172.30.1.104","TCP","54","45920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39295","18.627463","172.30.1.205","172.30.1.104","TCP","54","45920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39296","18.627574","172.30.1.205","172.30.1.104","TCP","74","38558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921853 TSecr=0 WS=128" +"39297","18.627719","172.30.1.104","172.30.1.205","TCP","54","135 > 45920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39298","18.627730","172.30.1.104","172.30.1.205","TCP","54","135 > 45920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39299","18.627735","172.30.1.205","172.30.1.104","TCP","54","45920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39300","18.627853","172.30.1.104","172.30.1.205","TCP","66","49671 > 38558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39301","18.627861","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39302","18.628207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39303","18.628739","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39304","18.628746","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39305","18.630643","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39306","18.631030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39307","18.631037","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39308","18.632383","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39309","18.635580","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39310","18.635589","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39311","18.636549","172.30.1.205","172.30.1.104","TCP","74","45924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921862 TSecr=0 WS=128" +"39312","18.636853","172.30.1.104","172.30.1.205","TCP","66","135 > 45924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39313","18.636865","172.30.1.205","172.30.1.104","TCP","54","45924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39314","18.637226","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39315","18.637533","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39316","18.637542","172.30.1.205","172.30.1.104","TCP","54","45924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39317","18.639735","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39318","18.640174","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39319","18.640181","172.30.1.205","172.30.1.104","TCP","54","45924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39320","18.642019","172.30.1.205","172.30.1.104","TCP","54","45924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39321","18.642135","172.30.1.205","172.30.1.104","TCP","74","38562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921868 TSecr=0 WS=128" +"39322","18.642291","172.30.1.104","172.30.1.205","TCP","54","135 > 45924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39323","18.642302","172.30.1.104","172.30.1.205","TCP","54","135 > 45924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39324","18.642308","172.30.1.205","172.30.1.104","TCP","54","45924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39325","18.642409","172.30.1.104","172.30.1.205","TCP","66","49671 > 38562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39326","18.642418","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39327","18.642761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39328","18.643059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39329","18.643068","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39330","18.644976","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39331","18.645338","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39332","18.645345","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39333","18.646692","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39334","18.649824","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39335","18.649833","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39336","18.650793","172.30.1.205","172.30.1.104","TCP","74","45928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921877 TSecr=0 WS=128" +"39337","18.651179","172.30.1.104","172.30.1.205","TCP","66","135 > 45928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39338","18.651190","172.30.1.205","172.30.1.104","TCP","54","45928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39339","18.651553","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39340","18.651843","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39341","18.651852","172.30.1.205","172.30.1.104","TCP","54","45928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39342","18.654071","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39343","18.654451","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39344","18.654458","172.30.1.205","172.30.1.104","TCP","54","45928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39345","18.655314","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39346","18.655363","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39347","18.655400","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39348","18.655434","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39349","18.655462","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39350","18.655493","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39351","18.655524","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39352","18.655552","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39353","18.655579","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39354","18.655609","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39355","18.655636","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39356","18.655704","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39357","18.655737","172.30.1.104","172.30.1.205","TCP","54","49671 > 38522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39358","18.655756","172.30.1.104","172.30.1.205","TCP","54","49671 > 38526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39359","18.655775","172.30.1.104","172.30.1.205","TCP","54","49671 > 38530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39360","18.655801","172.30.1.104","172.30.1.205","TCP","54","49671 > 38522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39361","18.655808","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39362","18.655819","172.30.1.104","172.30.1.205","TCP","54","49671 > 38534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39363","18.655838","172.30.1.104","172.30.1.205","TCP","54","49671 > 38538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39364","18.655858","172.30.1.104","172.30.1.205","TCP","54","49671 > 38542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39365","18.655877","172.30.1.104","172.30.1.205","TCP","54","49671 > 38546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39366","18.655970","172.30.1.104","172.30.1.205","TCP","54","49671 > 38546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39367","18.655976","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39368","18.655989","172.30.1.104","172.30.1.205","TCP","54","49671 > 38550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39369","18.656011","172.30.1.104","172.30.1.205","TCP","54","49671 > 38542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39370","18.656014","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39371","18.656030","172.30.1.104","172.30.1.205","TCP","54","49671 > 38538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39372","18.656033","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39373","18.656050","172.30.1.104","172.30.1.205","TCP","54","49671 > 38534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39374","18.656053","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39375","18.656069","172.30.1.104","172.30.1.205","TCP","54","49671 > 38550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39376","18.656071","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39377","18.656089","172.30.1.104","172.30.1.205","TCP","54","49671 > 38526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39378","18.656092","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39379","18.656108","172.30.1.104","172.30.1.205","TCP","54","49671 > 38530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39380","18.656111","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39381","18.656154","172.30.1.104","172.30.1.205","TCP","54","49671 > 38554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39382","18.656343","172.30.1.104","172.30.1.205","TCP","54","49671 > 38558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39383","18.656418","172.30.1.104","172.30.1.205","TCP","54","49671 > 38562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39384","18.656436","172.30.1.104","172.30.1.205","TCP","54","49671 > 38554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39385","18.656441","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39386","18.656457","172.30.1.104","172.30.1.205","TCP","54","49671 > 38558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39387","18.656459","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39388","18.656480","172.30.1.104","172.30.1.205","TCP","54","49671 > 38562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39389","18.656483","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39390","18.656498","172.30.1.104","172.30.1.205","TCP","54","49671 > 38518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39391","18.656519","172.30.1.104","172.30.1.205","TCP","54","49671 > 38518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39392","18.656522","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39393","18.657333","172.30.1.205","172.30.1.104","TCP","54","45928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39394","18.657445","172.30.1.205","172.30.1.104","TCP","74","38566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921883 TSecr=0 WS=128" +"39395","18.657608","172.30.1.104","172.30.1.205","TCP","54","135 > 45928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39396","18.657619","172.30.1.104","172.30.1.205","TCP","54","135 > 45928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39397","18.657624","172.30.1.205","172.30.1.104","TCP","54","45928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39398","18.657699","172.30.1.104","172.30.1.205","TCP","66","49671 > 38566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39399","18.657706","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39400","18.658065","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39401","18.658361","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39402","18.658370","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39403","18.660238","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39404","18.660620","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39405","18.660626","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39406","18.662021","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39407","18.665137","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39408","18.665146","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39409","18.666094","172.30.1.205","172.30.1.104","TCP","74","45932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921892 TSecr=0 WS=128" +"39410","18.666417","172.30.1.104","172.30.1.205","TCP","66","135 > 45932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39411","18.666428","172.30.1.205","172.30.1.104","TCP","54","45932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39412","18.666777","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39413","18.667053","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39414","18.667061","172.30.1.205","172.30.1.104","TCP","54","45932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39415","18.669258","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39416","18.669656","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39417","18.669663","172.30.1.205","172.30.1.104","TCP","54","45932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39418","18.671458","172.30.1.205","172.30.1.104","TCP","54","45932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39419","18.671571","172.30.1.205","172.30.1.104","TCP","74","38570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921897 TSecr=0 WS=128" +"39420","18.671782","172.30.1.104","172.30.1.205","TCP","54","135 > 45932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39421","18.671793","172.30.1.104","172.30.1.205","TCP","54","135 > 45932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39422","18.671798","172.30.1.205","172.30.1.104","TCP","54","45932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39423","18.671873","172.30.1.104","172.30.1.205","TCP","66","49671 > 38570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39424","18.671881","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39425","18.672224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39426","18.672497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39427","18.672506","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39428","18.674415","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39429","18.674774","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39430","18.674781","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39431","18.676128","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39432","18.679280","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39433","18.679289","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39434","18.680228","172.30.1.205","172.30.1.104","TCP","74","45936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921906 TSecr=0 WS=128" +"39435","18.680550","172.30.1.104","172.30.1.205","TCP","66","135 > 45936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39436","18.680566","172.30.1.205","172.30.1.104","TCP","54","45936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39437","18.680951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39438","18.681298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39439","18.681307","172.30.1.205","172.30.1.104","TCP","54","45936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39440","18.683512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39441","18.684010","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39442","18.684016","172.30.1.205","172.30.1.104","TCP","54","45936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39443","18.685857","172.30.1.205","172.30.1.104","TCP","54","45936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39444","18.685972","172.30.1.205","172.30.1.104","TCP","74","38574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921912 TSecr=0 WS=128" +"39445","18.686143","172.30.1.104","172.30.1.205","TCP","54","135 > 45936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39446","18.686228","172.30.1.104","172.30.1.205","TCP","54","135 > 45936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39447","18.686234","172.30.1.205","172.30.1.104","TCP","54","45936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39448","18.686278","172.30.1.104","172.30.1.205","TCP","66","49671 > 38574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39449","18.686286","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39450","18.686630","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39451","18.686927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39452","18.686934","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39453","18.688852","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39454","18.689263","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39455","18.689270","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39456","18.690629","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39457","18.693922","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39458","18.693932","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39459","18.694914","172.30.1.205","172.30.1.104","TCP","74","45940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921921 TSecr=0 WS=128" +"39460","18.695299","172.30.1.104","172.30.1.205","TCP","66","135 > 45940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39461","18.695309","172.30.1.205","172.30.1.104","TCP","54","45940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39462","18.695661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39463","18.695967","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39464","18.695976","172.30.1.205","172.30.1.104","TCP","54","45940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39465","18.698213","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39466","18.698622","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39467","18.698629","172.30.1.205","172.30.1.104","TCP","54","45940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39468","18.700452","172.30.1.205","172.30.1.104","TCP","54","45940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39469","18.700566","172.30.1.205","172.30.1.104","TCP","74","38578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921926 TSecr=0 WS=128" +"39470","18.700745","172.30.1.104","172.30.1.205","TCP","54","135 > 45940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39471","18.700756","172.30.1.104","172.30.1.205","TCP","54","135 > 45940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39472","18.700762","172.30.1.205","172.30.1.104","TCP","54","45940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39473","18.700883","172.30.1.104","172.30.1.205","TCP","66","49671 > 38578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39474","18.700892","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39475","18.701242","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39476","18.701542","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39477","18.701551","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39478","18.703420","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39479","18.703829","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39480","18.703835","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39481","18.705239","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39482","18.708428","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39483","18.708437","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39484","18.709405","172.30.1.205","172.30.1.104","TCP","74","45944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921935 TSecr=0 WS=128" +"39485","18.709709","172.30.1.104","172.30.1.205","TCP","66","135 > 45944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39486","18.709722","172.30.1.205","172.30.1.104","TCP","54","45944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39487","18.710085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39488","18.710359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39489","18.710369","172.30.1.205","172.30.1.104","TCP","54","45944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39490","18.712556","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39491","18.712990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39492","18.712997","172.30.1.205","172.30.1.104","TCP","54","45944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39493","18.714828","172.30.1.205","172.30.1.104","TCP","54","45944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39494","18.714949","172.30.1.205","172.30.1.104","TCP","74","38582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921941 TSecr=0 WS=128" +"39495","18.715161","172.30.1.104","172.30.1.205","TCP","54","135 > 45944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39496","18.715202","172.30.1.104","172.30.1.205","TCP","54","135 > 45944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39497","18.715209","172.30.1.205","172.30.1.104","TCP","54","45944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39498","18.715267","172.30.1.104","172.30.1.205","TCP","66","49671 > 38582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39499","18.715275","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39500","18.715620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39501","18.715902","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39502","18.715909","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39503","18.717801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39504","18.718161","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39505","18.718168","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39506","18.719517","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39507","18.722685","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39508","18.722696","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39509","18.723671","172.30.1.205","172.30.1.104","TCP","74","45948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921950 TSecr=0 WS=128" +"39510","18.724010","172.30.1.104","172.30.1.205","TCP","66","135 > 45948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39511","18.724021","172.30.1.205","172.30.1.104","TCP","54","45948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39512","18.724375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39513","18.724674","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39514","18.724683","172.30.1.205","172.30.1.104","TCP","54","45948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39515","18.726893","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39516","18.727353","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39517","18.727360","172.30.1.205","172.30.1.104","TCP","54","45948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39518","18.729199","172.30.1.205","172.30.1.104","TCP","54","45948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39519","18.729310","172.30.1.205","172.30.1.104","TCP","74","38586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921955 TSecr=0 WS=128" +"39520","18.729500","172.30.1.104","172.30.1.205","TCP","54","135 > 45948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39521","18.729541","172.30.1.104","172.30.1.205","TCP","54","135 > 45948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39522","18.729546","172.30.1.205","172.30.1.104","TCP","54","45948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39523","18.729633","172.30.1.104","172.30.1.205","TCP","66","49671 > 38586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39524","18.729641","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39525","18.730010","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39526","18.730294","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39527","18.730303","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39528","18.732174","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39529","18.732617","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39530","18.732623","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39531","18.734001","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39532","18.737247","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39533","18.737257","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39534","18.738210","172.30.1.205","172.30.1.104","TCP","74","45952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921964 TSecr=0 WS=128" +"39535","18.738565","172.30.1.104","172.30.1.205","TCP","66","135 > 45952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39536","18.738576","172.30.1.205","172.30.1.104","TCP","54","45952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39537","18.738924","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39538","18.739221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39539","18.739230","172.30.1.205","172.30.1.104","TCP","54","45952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39540","18.741463","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39541","18.741959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39542","18.741972","172.30.1.205","172.30.1.104","TCP","54","45952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39543","18.744001","172.30.1.205","172.30.1.104","TCP","54","45952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39544","18.744111","172.30.1.205","172.30.1.104","TCP","74","38590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921970 TSecr=0 WS=128" +"39545","18.744322","172.30.1.104","172.30.1.205","TCP","54","135 > 45952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39546","18.744350","172.30.1.104","172.30.1.205","TCP","54","135 > 45952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39547","18.744356","172.30.1.205","172.30.1.104","TCP","54","45952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39548","18.744472","172.30.1.104","172.30.1.205","TCP","66","49671 > 38590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39549","18.744481","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39550","18.744857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39551","18.745166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39552","18.745174","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39553","18.747090","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39554","18.747530","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39555","18.747537","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39556","18.748942","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39557","18.751992","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39558","18.752001","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39559","18.752952","172.30.1.205","172.30.1.104","TCP","74","45956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921979 TSecr=0 WS=128" +"39560","18.753292","172.30.1.104","172.30.1.205","TCP","66","135 > 45956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39561","18.753304","172.30.1.205","172.30.1.104","TCP","54","45956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39562","18.753664","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39563","18.753981","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39564","18.753998","172.30.1.205","172.30.1.104","TCP","54","45956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39565","18.756386","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39566","18.756778","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39567","18.756785","172.30.1.205","172.30.1.104","TCP","54","45956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39568","18.758645","172.30.1.205","172.30.1.104","TCP","54","45956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39569","18.758768","172.30.1.205","172.30.1.104","TCP","74","38594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921985 TSecr=0 WS=128" +"39570","18.758970","172.30.1.104","172.30.1.205","TCP","54","135 > 45956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39571","18.758985","172.30.1.104","172.30.1.205","TCP","54","135 > 45956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39572","18.758992","172.30.1.205","172.30.1.104","TCP","54","45956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39573","18.759246","172.30.1.104","172.30.1.205","TCP","66","49671 > 38594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39574","18.759258","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39575","18.759662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39576","18.759990","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39577","18.759999","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39578","18.761939","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39579","18.762314","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39580","18.762323","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39581","18.763676","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39582","18.766824","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39583","18.766834","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39584","18.767782","172.30.1.205","172.30.1.104","TCP","74","45960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921994 TSecr=0 WS=128" +"39585","18.768069","172.30.1.104","172.30.1.205","TCP","66","135 > 45960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39586","18.768081","172.30.1.205","172.30.1.104","TCP","54","45960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39587","18.768431","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39588","18.768703","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39589","18.768712","172.30.1.205","172.30.1.104","TCP","54","45960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39590","18.770920","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39591","18.771348","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39592","18.771355","172.30.1.205","172.30.1.104","TCP","54","45960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39593","18.773178","172.30.1.205","172.30.1.104","TCP","54","45960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39594","18.773288","172.30.1.205","172.30.1.104","TCP","74","38598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921999 TSecr=0 WS=128" +"39595","18.773457","172.30.1.104","172.30.1.205","TCP","54","135 > 45960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39596","18.773478","172.30.1.104","172.30.1.205","TCP","54","135 > 45960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39597","18.773487","172.30.1.205","172.30.1.104","TCP","54","45960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39598","18.773561","172.30.1.104","172.30.1.205","TCP","66","49671 > 38598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39599","18.773577","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39600","18.773985","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39601","18.774285","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39602","18.774295","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39603","18.776190","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39604","18.776602","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39605","18.776615","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39606","18.778193","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39607","18.781351","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39608","18.781361","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39609","18.782323","172.30.1.205","172.30.1.104","TCP","74","45964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922008 TSecr=0 WS=128" +"39610","18.782714","172.30.1.104","172.30.1.205","TCP","66","135 > 45964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39611","18.782735","172.30.1.205","172.30.1.104","TCP","54","45964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39612","18.783235","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39613","18.783551","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39614","18.783560","172.30.1.205","172.30.1.104","TCP","54","45964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39615","18.785790","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39616","18.786258","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39617","18.786265","172.30.1.205","172.30.1.104","TCP","54","45964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39618","18.788100","172.30.1.205","172.30.1.104","TCP","54","45964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39619","18.788225","172.30.1.205","172.30.1.104","TCP","74","38602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922014 TSecr=0 WS=128" +"39620","18.788424","172.30.1.104","172.30.1.205","TCP","54","135 > 45964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39621","18.788445","172.30.1.104","172.30.1.205","TCP","54","135 > 45964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39622","18.788455","172.30.1.205","172.30.1.104","TCP","54","45964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39623","18.788488","172.30.1.104","172.30.1.205","TCP","66","49671 > 38602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39624","18.788509","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39625","18.789068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39626","18.789333","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39627","18.789342","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39628","18.791218","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39629","18.792653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39630","18.792660","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39631","18.794027","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39632","18.797248","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39633","18.797259","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39634","18.798203","172.30.1.205","172.30.1.104","TCP","74","45968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922024 TSecr=0 WS=128" +"39635","18.798519","172.30.1.104","172.30.1.205","TCP","66","135 > 45968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39636","18.798530","172.30.1.205","172.30.1.104","TCP","54","45968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39637","18.798888","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39638","18.799207","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39639","18.799216","172.30.1.205","172.30.1.104","TCP","54","45968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39640","18.801433","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39641","18.801902","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39642","18.801908","172.30.1.205","172.30.1.104","TCP","54","45968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39643","18.803716","172.30.1.205","172.30.1.104","TCP","54","45968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39644","18.803829","172.30.1.205","172.30.1.104","TCP","74","38606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922030 TSecr=0 WS=128" +"39645","18.804136","172.30.1.104","172.30.1.205","TCP","66","49671 > 38606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39646","18.804147","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39647","18.804162","172.30.1.104","172.30.1.205","TCP","54","135 > 45968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39648","18.804184","172.30.1.104","172.30.1.205","TCP","54","135 > 45968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39649","18.804189","172.30.1.205","172.30.1.104","TCP","54","45968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39650","18.804522","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39651","18.804811","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39652","18.804819","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39653","18.806719","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39654","18.807087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39655","18.807094","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39656","18.808434","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39657","18.811681","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39658","18.811692","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39659","18.812653","172.30.1.205","172.30.1.104","TCP","74","45972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922039 TSecr=0 WS=128" +"39660","18.813053","172.30.1.104","172.30.1.205","TCP","66","135 > 45972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39661","18.813066","172.30.1.205","172.30.1.104","TCP","54","45972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39662","18.813426","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39663","18.813796","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39664","18.813805","172.30.1.205","172.30.1.104","TCP","54","45972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39665","18.816015","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39666","18.816454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39667","18.816461","172.30.1.205","172.30.1.104","TCP","54","45972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39668","18.818303","172.30.1.205","172.30.1.104","TCP","54","45972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39669","18.818416","172.30.1.205","172.30.1.104","TCP","74","38610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922044 TSecr=0 WS=128" +"39670","18.818581","172.30.1.104","172.30.1.205","TCP","54","135 > 45972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39671","18.818596","172.30.1.104","172.30.1.205","TCP","54","135 > 45972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39672","18.818603","172.30.1.205","172.30.1.104","TCP","54","45972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39673","18.818726","172.30.1.104","172.30.1.205","TCP","66","49671 > 38610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39674","18.818735","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39675","18.819097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39676","18.819381","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39677","18.819390","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39678","18.821281","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39679","18.821672","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39680","18.821678","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39681","18.823025","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39682","18.826337","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39683","18.826346","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39684","18.827286","172.30.1.205","172.30.1.104","TCP","74","45976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922053 TSecr=0 WS=128" +"39685","18.827673","172.30.1.104","172.30.1.205","TCP","66","135 > 45976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39686","18.827691","172.30.1.205","172.30.1.104","TCP","54","45976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39687","18.828058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39688","18.828356","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39689","18.828365","172.30.1.205","172.30.1.104","TCP","54","45976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39690","18.830575","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39691","18.831005","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39692","18.831012","172.30.1.205","172.30.1.104","TCP","54","45976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39693","18.831862","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39694","18.831909","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39695","18.831946","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39696","18.831979","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39697","18.832012","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39698","18.832039","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39699","18.832071","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39700","18.832098","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39701","18.832124","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39702","18.832139","172.30.1.104","172.30.1.205","TCP","54","49671 > 38570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39703","18.832158","172.30.1.104","172.30.1.205","TCP","54","49671 > 38574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39704","18.832224","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39705","18.832262","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39706","18.832334","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39707","18.832492","172.30.1.104","172.30.1.205","TCP","54","49671 > 38570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39708","18.832499","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39709","18.832507","172.30.1.104","172.30.1.205","TCP","54","49671 > 38578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39710","18.832533","172.30.1.104","172.30.1.205","TCP","54","49671 > 38574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39711","18.832537","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39712","18.832560","172.30.1.104","172.30.1.205","TCP","54","49671 > 38578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39713","18.832563","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39714","18.832583","172.30.1.104","172.30.1.205","TCP","54","49671 > 38582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39715","18.832603","172.30.1.104","172.30.1.205","TCP","54","49671 > 38582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39716","18.832608","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39717","18.832626","172.30.1.104","172.30.1.205","TCP","54","49671 > 38586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39718","18.832646","172.30.1.104","172.30.1.205","TCP","54","49671 > 38590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39719","18.832667","172.30.1.104","172.30.1.205","TCP","54","49671 > 38586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39720","18.832672","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39721","18.832687","172.30.1.104","172.30.1.205","TCP","54","49671 > 38594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39722","18.832706","172.30.1.104","172.30.1.205","TCP","54","49671 > 38590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39723","18.832710","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39724","18.832726","172.30.1.104","172.30.1.205","TCP","54","49671 > 38598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39725","18.832747","172.30.1.104","172.30.1.205","TCP","54","49671 > 38602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39726","18.832767","172.30.1.104","172.30.1.205","TCP","54","49671 > 38602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39727","18.832771","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39728","18.832797","172.30.1.104","172.30.1.205","TCP","54","49671 > 38606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39729","18.832978","172.30.1.104","172.30.1.205","TCP","54","49671 > 38594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39730","18.832984","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39731","18.832997","172.30.1.104","172.30.1.205","TCP","54","49671 > 38610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39732","18.833017","172.30.1.104","172.30.1.205","TCP","54","49671 > 38610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39733","18.833020","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39734","18.833036","172.30.1.104","172.30.1.205","TCP","54","49671 > 38598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39735","18.833039","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39736","18.833054","172.30.1.104","172.30.1.205","TCP","54","49671 > 38606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39737","18.833056","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39738","18.833165","172.30.1.104","172.30.1.205","TCP","54","49671 > 38566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39739","18.833184","172.30.1.104","172.30.1.205","TCP","54","49671 > 38566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"39740","18.833188","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"39741","18.834029","172.30.1.205","172.30.1.104","TCP","54","45976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39742","18.834141","172.30.1.205","172.30.1.104","TCP","74","38614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922060 TSecr=0 WS=128" +"39743","18.834277","172.30.1.104","172.30.1.205","TCP","54","135 > 45976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39744","18.834339","172.30.1.104","172.30.1.205","TCP","54","135 > 45976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39745","18.834344","172.30.1.205","172.30.1.104","TCP","54","45976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39746","18.834420","172.30.1.104","172.30.1.205","TCP","66","49671 > 38614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39747","18.834428","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39748","18.834795","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39749","18.835102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39750","18.835114","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39751","18.837010","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39752","18.837431","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39753","18.837439","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39754","18.838813","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39755","18.842109","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39756","18.842119","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39757","18.843061","172.30.1.205","172.30.1.104","TCP","74","45980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922069 TSecr=0 WS=128" +"39758","18.843415","172.30.1.104","172.30.1.205","TCP","66","135 > 45980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39759","18.843426","172.30.1.205","172.30.1.104","TCP","54","45980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39760","18.843776","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39761","18.844101","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39762","18.844109","172.30.1.205","172.30.1.104","TCP","54","45980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39763","18.846300","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39764","18.846713","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39765","18.846720","172.30.1.205","172.30.1.104","TCP","54","45980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39766","18.848542","172.30.1.205","172.30.1.104","TCP","54","45980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39767","18.848655","172.30.1.205","172.30.1.104","TCP","74","38618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922075 TSecr=0 WS=128" +"39768","18.848819","172.30.1.104","172.30.1.205","TCP","54","135 > 45980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39769","18.848830","172.30.1.104","172.30.1.205","TCP","54","135 > 45980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39770","18.848836","172.30.1.205","172.30.1.104","TCP","54","45980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39771","18.848964","172.30.1.104","172.30.1.205","TCP","66","49671 > 38618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39772","18.848972","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39773","18.849321","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39774","18.849601","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39775","18.849609","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39776","18.851457","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39777","18.851803","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39778","18.851809","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39779","18.853210","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39780","18.856443","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39781","18.856452","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39782","18.857395","172.30.1.205","172.30.1.104","TCP","74","45984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922083 TSecr=0 WS=128" +"39783","18.857714","172.30.1.104","172.30.1.205","TCP","66","135 > 45984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39784","18.857725","172.30.1.205","172.30.1.104","TCP","54","45984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39785","18.858084","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39786","18.858395","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39787","18.858404","172.30.1.205","172.30.1.104","TCP","54","45984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39788","18.860581","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39789","18.860976","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39790","18.860982","172.30.1.205","172.30.1.104","TCP","54","45984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39791","18.862787","172.30.1.205","172.30.1.104","TCP","54","45984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39792","18.862895","172.30.1.205","172.30.1.104","TCP","74","38622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922089 TSecr=0 WS=128" +"39793","18.863052","172.30.1.104","172.30.1.205","TCP","54","135 > 45984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39794","18.863067","172.30.1.104","172.30.1.205","TCP","54","135 > 45984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39795","18.863072","172.30.1.205","172.30.1.104","TCP","54","45984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39796","18.863166","172.30.1.104","172.30.1.205","TCP","66","49671 > 38622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39797","18.863174","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39798","18.863523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39799","18.863809","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39800","18.863817","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39801","18.865718","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39802","18.866108","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39803","18.866114","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39804","18.867455","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39805","18.870609","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39806","18.870618","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39807","18.871557","172.30.1.205","172.30.1.104","TCP","74","45988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922097 TSecr=0 WS=128" +"39808","18.871899","172.30.1.104","172.30.1.205","TCP","66","135 > 45988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39809","18.871910","172.30.1.205","172.30.1.104","TCP","54","45988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39810","18.872257","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39811","18.872564","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39812","18.872573","172.30.1.205","172.30.1.104","TCP","54","45988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39813","18.874770","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39814","18.875167","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39815","18.875173","172.30.1.205","172.30.1.104","TCP","54","45988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39816","18.877008","172.30.1.205","172.30.1.104","TCP","54","45988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39817","18.877116","172.30.1.205","172.30.1.104","TCP","74","38626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922103 TSecr=0 WS=128" +"39818","18.877264","172.30.1.104","172.30.1.205","TCP","54","135 > 45988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39819","18.877278","172.30.1.104","172.30.1.205","TCP","54","135 > 45988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39820","18.877282","172.30.1.205","172.30.1.104","TCP","54","45988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39821","18.877375","172.30.1.104","172.30.1.205","TCP","66","49671 > 38626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39822","18.877383","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39823","18.877727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39824","18.878018","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39825","18.878027","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39826","18.879902","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39827","18.880271","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39828","18.880277","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39829","18.881650","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39830","18.884769","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39831","18.884788","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39832","18.885717","172.30.1.205","172.30.1.104","TCP","74","45992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922112 TSecr=0 WS=128" +"39833","18.886026","172.30.1.104","172.30.1.205","TCP","66","135 > 45992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39834","18.886036","172.30.1.205","172.30.1.104","TCP","54","45992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39835","18.886382","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39836","18.886671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39837","18.886679","172.30.1.205","172.30.1.104","TCP","54","45992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39838","18.888873","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39839","18.889306","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39840","18.889312","172.30.1.205","172.30.1.104","TCP","54","45992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39841","18.891107","172.30.1.205","172.30.1.104","TCP","54","45992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39842","18.891216","172.30.1.205","172.30.1.104","TCP","74","38630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922117 TSecr=0 WS=128" +"39843","18.891435","172.30.1.104","172.30.1.205","TCP","54","135 > 45992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39844","18.891497","172.30.1.104","172.30.1.205","TCP","66","49671 > 38630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39845","18.891506","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39846","18.891515","172.30.1.104","172.30.1.205","TCP","54","135 > 45992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39847","18.891522","172.30.1.205","172.30.1.104","TCP","54","45992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39848","18.891863","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39849","18.892159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39850","18.892168","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39851","18.894078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39852","18.894488","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39853","18.894494","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39854","18.895835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39855","18.899027","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39856","18.899036","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39857","18.899973","172.30.1.205","172.30.1.104","TCP","74","45996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922126 TSecr=0 WS=128" +"39858","18.900305","172.30.1.104","172.30.1.205","TCP","66","135 > 45996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39859","18.900316","172.30.1.205","172.30.1.104","TCP","54","45996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39860","18.900670","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39861","18.900964","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39862","18.900973","172.30.1.205","172.30.1.104","TCP","54","45996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39863","18.903162","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39864","18.903620","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39865","18.903627","172.30.1.205","172.30.1.104","TCP","54","45996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39866","18.905465","172.30.1.205","172.30.1.104","TCP","54","45996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39867","18.905575","172.30.1.205","172.30.1.104","TCP","74","38634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922131 TSecr=0 WS=128" +"39868","18.905747","172.30.1.104","172.30.1.205","TCP","54","135 > 45996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39869","18.905792","172.30.1.104","172.30.1.205","TCP","54","135 > 45996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39870","18.905797","172.30.1.205","172.30.1.104","TCP","54","45996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39871","18.905898","172.30.1.104","172.30.1.205","TCP","66","49671 > 38634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39872","18.905906","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39873","18.906266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39874","18.906550","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39875","18.906557","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39876","18.908410","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39877","18.908822","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39878","18.908829","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39879","18.910187","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39880","18.913228","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39881","18.913238","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39882","18.914191","172.30.1.205","172.30.1.104","TCP","74","46000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922140 TSecr=0 WS=128" +"39883","18.914503","172.30.1.104","172.30.1.205","TCP","66","135 > 46000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39884","18.914515","172.30.1.205","172.30.1.104","TCP","54","46000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39885","18.914859","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39886","18.915137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39887","18.915146","172.30.1.205","172.30.1.104","TCP","54","46000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39888","18.917367","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39889","18.917774","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39890","18.917780","172.30.1.205","172.30.1.104","TCP","54","46000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39891","18.919586","172.30.1.205","172.30.1.104","TCP","54","46000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39892","18.919696","172.30.1.205","172.30.1.104","TCP","74","38638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922146 TSecr=0 WS=128" +"39893","18.919840","172.30.1.104","172.30.1.205","TCP","54","135 > 46000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39894","18.919851","172.30.1.104","172.30.1.205","TCP","54","135 > 46000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39895","18.919857","172.30.1.205","172.30.1.104","TCP","54","46000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39896","18.919953","172.30.1.104","172.30.1.205","TCP","66","49671 > 38638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39897","18.919962","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39898","18.920313","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39899","18.920609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39900","18.920618","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39901","18.922502","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39902","18.922885","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39903","18.922891","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39904","18.924244","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39905","18.927447","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39906","18.927456","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39907","18.928413","172.30.1.205","172.30.1.104","TCP","74","46004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922154 TSecr=0 WS=128" +"39908","18.928727","172.30.1.104","172.30.1.205","TCP","66","135 > 46004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39909","18.928738","172.30.1.205","172.30.1.104","TCP","54","46004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39910","18.929104","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39911","18.929421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39912","18.929431","172.30.1.205","172.30.1.104","TCP","54","46004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39913","18.931624","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39914","18.932038","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39915","18.932045","172.30.1.205","172.30.1.104","TCP","54","46004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39916","18.933865","172.30.1.205","172.30.1.104","TCP","54","46004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39917","18.933978","172.30.1.205","172.30.1.104","TCP","74","38642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922160 TSecr=0 WS=128" +"39918","18.934140","172.30.1.104","172.30.1.205","TCP","54","135 > 46004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39919","18.934155","172.30.1.104","172.30.1.205","TCP","54","135 > 46004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39920","18.934163","172.30.1.205","172.30.1.104","TCP","54","46004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39921","18.934280","172.30.1.104","172.30.1.205","TCP","66","49671 > 38642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39922","18.934291","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39923","18.934689","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39924","18.934992","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39925","18.935001","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39926","18.936948","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39927","18.938172","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39928","18.938179","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39929","18.939564","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39930","18.942847","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39931","18.942858","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39932","18.943830","172.30.1.205","172.30.1.104","TCP","74","46008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922170 TSecr=0 WS=128" +"39933","18.944136","172.30.1.104","172.30.1.205","TCP","66","135 > 46008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39934","18.944147","172.30.1.205","172.30.1.104","TCP","54","46008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39935","18.944492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39936","18.944814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39937","18.944823","172.30.1.205","172.30.1.104","TCP","54","46008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39938","18.947004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39939","18.947455","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39940","18.947461","172.30.1.205","172.30.1.104","TCP","54","46008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39941","18.949284","172.30.1.205","172.30.1.104","TCP","54","46008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39942","18.949394","172.30.1.205","172.30.1.104","TCP","74","38646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922175 TSecr=0 WS=128" +"39943","18.949568","172.30.1.104","172.30.1.205","TCP","54","135 > 46008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39944","18.949610","172.30.1.104","172.30.1.205","TCP","54","135 > 46008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39945","18.949616","172.30.1.205","172.30.1.104","TCP","54","46008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39946","18.949686","172.30.1.104","172.30.1.205","TCP","66","49671 > 38646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39947","18.949694","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39948","18.950040","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39949","18.950340","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39950","18.950357","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39951","18.952507","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39952","18.952881","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39953","18.952888","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39954","18.954250","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39955","18.957482","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39956","18.957492","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39957","18.958437","172.30.1.205","172.30.1.104","TCP","74","46012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922184 TSecr=0 WS=128" +"39958","18.958793","172.30.1.104","172.30.1.205","TCP","66","135 > 46012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39959","18.958807","172.30.1.205","172.30.1.104","TCP","54","46012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39960","18.959152","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39961","18.959421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39962","18.959431","172.30.1.205","172.30.1.104","TCP","54","46012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39963","18.961623","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39964","18.962070","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39965","18.962077","172.30.1.205","172.30.1.104","TCP","54","46012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39966","18.963874","172.30.1.205","172.30.1.104","TCP","54","46012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39967","18.963984","172.30.1.205","172.30.1.104","TCP","74","38650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922190 TSecr=0 WS=128" +"39968","18.964175","172.30.1.104","172.30.1.205","TCP","54","135 > 46012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39969","18.964184","172.30.1.104","172.30.1.205","TCP","54","135 > 46012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39970","18.964190","172.30.1.205","172.30.1.104","TCP","54","46012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39971","18.964284","172.30.1.104","172.30.1.205","TCP","66","49671 > 38650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39972","18.964294","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39973","18.964649","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39974","18.965063","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39975","18.965071","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39976","18.966921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"39977","18.967318","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"39978","18.967328","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"39979","18.969008","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"39980","18.972329","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"39981","18.972338","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"39982","18.973290","172.30.1.205","172.30.1.104","TCP","74","46016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922199 TSecr=0 WS=128" +"39983","18.973674","172.30.1.104","172.30.1.205","TCP","66","135 > 46016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39984","18.973684","172.30.1.205","172.30.1.104","TCP","54","46016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39985","18.974041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"39986","18.974387","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"39987","18.974402","172.30.1.205","172.30.1.104","TCP","54","46016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"39988","18.976715","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"39989","18.977154","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"39990","18.977161","172.30.1.205","172.30.1.104","TCP","54","46016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39991","18.978997","172.30.1.205","172.30.1.104","TCP","54","46016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"39992","18.979121","172.30.1.205","172.30.1.104","TCP","74","38654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922205 TSecr=0 WS=128" +"39993","18.979322","172.30.1.104","172.30.1.205","TCP","54","135 > 46016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39994","18.979362","172.30.1.104","172.30.1.205","TCP","54","135 > 46016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"39995","18.979367","172.30.1.205","172.30.1.104","TCP","54","46016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"39996","18.979444","172.30.1.104","172.30.1.205","TCP","66","49671 > 38654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"39997","18.979453","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"39998","18.979805","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"39999","18.980107","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40000","18.980114","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40001","18.982032","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40002","18.982418","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40003","18.982426","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40004","18.983795","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40005","18.987092","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40006","18.987103","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40007","18.988063","172.30.1.205","172.30.1.104","TCP","74","46020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922214 TSecr=0 WS=128" +"40008","18.988452","172.30.1.104","172.30.1.205","TCP","66","135 > 46020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40009","18.988463","172.30.1.205","172.30.1.104","TCP","54","46020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40010","18.988841","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40011","18.989158","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40012","18.989169","172.30.1.205","172.30.1.104","TCP","54","46020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40013","18.991376","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40014","18.991802","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40015","18.991809","172.30.1.205","172.30.1.104","TCP","54","46020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40016","18.993649","172.30.1.205","172.30.1.104","TCP","54","46020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40017","18.993767","172.30.1.205","172.30.1.104","TCP","74","38658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922220 TSecr=0 WS=128" +"40018","18.993959","172.30.1.104","172.30.1.205","TCP","54","135 > 46020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40019","18.993971","172.30.1.104","172.30.1.205","TCP","54","135 > 46020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40020","18.993976","172.30.1.205","172.30.1.104","TCP","54","46020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40021","18.994064","172.30.1.104","172.30.1.205","TCP","66","49671 > 38658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40022","18.994073","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40023","18.994433","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40024","18.994702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40025","18.994713","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40026","18.996590","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40027","18.996998","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40028","18.997012","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40029","18.998624","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40030","19.001777","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40031","19.001787","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40032","19.002744","172.30.1.205","172.30.1.104","TCP","74","46024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922229 TSecr=0 WS=128" +"40033","19.003065","172.30.1.104","172.30.1.205","TCP","66","135 > 46024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40034","19.003076","172.30.1.205","172.30.1.104","TCP","54","46024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40035","19.003428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40036","19.003733","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40037","19.003742","172.30.1.205","172.30.1.104","TCP","54","46024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40038","19.005951","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40039","19.006359","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40040","19.006366","172.30.1.205","172.30.1.104","TCP","54","46024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40041","19.007215","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40042","19.007267","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40043","19.007307","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40044","19.007340","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40045","19.007373","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40046","19.007401","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40047","19.007429","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40048","19.007457","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40049","19.007489","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40050","19.007517","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40051","19.007549","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40052","19.007589","172.30.1.104","172.30.1.205","TCP","54","49671 > 38618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40053","19.007607","172.30.1.104","172.30.1.205","TCP","54","49671 > 38618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40054","19.007613","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40055","19.007627","172.30.1.104","172.30.1.205","TCP","54","49671 > 38622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40056","19.007648","172.30.1.104","172.30.1.205","TCP","54","49671 > 38626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40057","19.007675","172.30.1.104","172.30.1.205","TCP","54","49671 > 38630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40058","19.007691","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40059","19.007710","172.30.1.104","172.30.1.205","TCP","54","49671 > 38634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40060","19.007856","172.30.1.104","172.30.1.205","TCP","54","49671 > 38634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40061","19.007863","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40062","19.007875","172.30.1.104","172.30.1.205","TCP","54","49671 > 38630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40063","19.007877","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40064","19.007897","172.30.1.104","172.30.1.205","TCP","54","49671 > 38622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40065","19.007900","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40066","19.007919","172.30.1.104","172.30.1.205","TCP","54","49671 > 38626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40067","19.007921","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40068","19.007938","172.30.1.104","172.30.1.205","TCP","54","49671 > 38638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40069","19.007959","172.30.1.104","172.30.1.205","TCP","54","49671 > 38642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40070","19.007978","172.30.1.104","172.30.1.205","TCP","54","49671 > 38646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40071","19.007998","172.30.1.104","172.30.1.205","TCP","54","49671 > 38638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40072","19.008003","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40073","19.008020","172.30.1.104","172.30.1.205","TCP","54","49671 > 38650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40074","19.008043","172.30.1.104","172.30.1.205","TCP","54","49671 > 38654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40075","19.008171","172.30.1.104","172.30.1.205","TCP","54","49671 > 38654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40076","19.008176","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40077","19.008190","172.30.1.104","172.30.1.205","TCP","54","49671 > 38650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40078","19.008192","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40079","19.008212","172.30.1.104","172.30.1.205","TCP","54","49671 > 38642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40080","19.008215","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40081","19.008232","172.30.1.104","172.30.1.205","TCP","54","49671 > 38646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40082","19.008235","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40083","19.008264","172.30.1.104","172.30.1.205","TCP","54","49671 > 38658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40084","19.008381","172.30.1.104","172.30.1.205","TCP","54","49671 > 38614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40085","19.008400","172.30.1.104","172.30.1.205","TCP","54","49671 > 38658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40086","19.008404","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40087","19.008420","172.30.1.104","172.30.1.205","TCP","54","49671 > 38614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40088","19.008423","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40089","19.009243","172.30.1.205","172.30.1.104","TCP","54","46024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40090","19.009354","172.30.1.205","172.30.1.104","TCP","74","38662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922235 TSecr=0 WS=128" +"40091","19.009562","172.30.1.104","172.30.1.205","TCP","54","135 > 46024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40092","19.009609","172.30.1.104","172.30.1.205","TCP","66","49671 > 38662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40093","19.009618","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40094","19.009629","172.30.1.104","172.30.1.205","TCP","54","135 > 46024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40095","19.009637","172.30.1.205","172.30.1.104","TCP","54","46024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40096","19.010008","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40097","19.010288","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40098","19.010297","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40099","19.012205","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40100","19.012607","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40101","19.012615","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40102","19.014033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40103","19.017284","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40104","19.017297","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40105","19.018350","172.30.1.205","172.30.1.104","TCP","74","46028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922244 TSecr=0 WS=128" +"40106","19.018662","172.30.1.104","172.30.1.205","TCP","66","135 > 46028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40107","19.018678","172.30.1.205","172.30.1.104","TCP","54","46028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40108","19.019053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40109","19.019351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40110","19.019365","172.30.1.205","172.30.1.104","TCP","54","46028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40111","19.021703","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40112","19.022178","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40113","19.022185","172.30.1.205","172.30.1.104","TCP","54","46028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40114","19.024049","172.30.1.205","172.30.1.104","TCP","54","46028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40115","19.024178","172.30.1.205","172.30.1.104","TCP","74","38666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922250 TSecr=0 WS=128" +"40116","19.024345","172.30.1.104","172.30.1.205","TCP","54","135 > 46028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40117","19.024358","172.30.1.104","172.30.1.205","TCP","54","135 > 46028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40118","19.024365","172.30.1.205","172.30.1.104","TCP","54","46028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40119","19.024526","172.30.1.104","172.30.1.205","TCP","66","49671 > 38666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40120","19.024536","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40121","19.024928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40122","19.025456","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40123","19.025465","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40124","19.027339","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40125","19.027755","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40126","19.027762","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40127","19.029148","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40128","19.034602","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40129","19.034613","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40130","19.035589","172.30.1.205","172.30.1.104","TCP","74","46032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922262 TSecr=0 WS=128" +"40131","19.035906","172.30.1.104","172.30.1.205","TCP","66","135 > 46032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40132","19.035917","172.30.1.205","172.30.1.104","TCP","54","46032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40133","19.036272","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40134","19.036542","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40135","19.036552","172.30.1.205","172.30.1.104","TCP","54","46032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40136","19.038765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40137","19.039168","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40138","19.039175","172.30.1.205","172.30.1.104","TCP","54","46032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40139","19.041010","172.30.1.205","172.30.1.104","TCP","54","46032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40140","19.041127","172.30.1.205","172.30.1.104","TCP","74","38670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922267 TSecr=0 WS=128" +"40141","19.041317","172.30.1.104","172.30.1.205","TCP","54","135 > 46032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40142","19.041335","172.30.1.104","172.30.1.205","TCP","54","135 > 46032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40143","19.041342","172.30.1.205","172.30.1.104","TCP","54","46032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40144","19.041418","172.30.1.104","172.30.1.205","TCP","66","49671 > 38670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40145","19.041427","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40146","19.041780","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40147","19.042073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40148","19.042082","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40149","19.043965","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40150","19.045757","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40151","19.045764","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40152","19.047142","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40153","19.050324","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40154","19.050335","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40155","19.051290","172.30.1.205","172.30.1.104","TCP","74","46036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922277 TSecr=0 WS=128" +"40156","19.051595","172.30.1.104","172.30.1.205","TCP","66","135 > 46036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40157","19.051605","172.30.1.205","172.30.1.104","TCP","54","46036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40158","19.051956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40159","19.052244","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40160","19.052253","172.30.1.205","172.30.1.104","TCP","54","46036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40161","19.054482","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40162","19.054896","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40163","19.054903","172.30.1.205","172.30.1.104","TCP","54","46036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40164","19.056728","172.30.1.205","172.30.1.104","TCP","54","46036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40165","19.056862","172.30.1.205","172.30.1.104","TCP","74","38674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922283 TSecr=0 WS=128" +"40166","19.057012","172.30.1.104","172.30.1.205","TCP","54","135 > 46036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40167","19.057021","172.30.1.104","172.30.1.205","TCP","54","135 > 46036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40168","19.057026","172.30.1.205","172.30.1.104","TCP","54","46036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40169","19.057164","172.30.1.104","172.30.1.205","TCP","66","49671 > 38674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40170","19.057172","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40171","19.057521","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40172","19.057798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40173","19.057805","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40174","19.059684","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40175","19.060066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40176","19.060072","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40177","19.061463","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40178","19.064630","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40179","19.064642","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40180","19.065653","172.30.1.205","172.30.1.104","TCP","74","46040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922292 TSecr=0 WS=128" +"40181","19.065945","172.30.1.104","172.30.1.205","TCP","66","135 > 46040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40182","19.065956","172.30.1.205","172.30.1.104","TCP","54","46040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40183","19.066309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40184","19.066597","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40185","19.066606","172.30.1.205","172.30.1.104","TCP","54","46040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40186","19.068816","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40187","19.069244","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40188","19.069250","172.30.1.205","172.30.1.104","TCP","54","46040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40189","19.071066","172.30.1.205","172.30.1.104","TCP","54","46040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40190","19.071178","172.30.1.205","172.30.1.104","TCP","74","38678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922297 TSecr=0 WS=128" +"40191","19.071406","172.30.1.104","172.30.1.205","TCP","54","135 > 46040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40192","19.071414","172.30.1.104","172.30.1.205","TCP","54","135 > 46040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40193","19.071420","172.30.1.205","172.30.1.104","TCP","54","46040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40194","19.071471","172.30.1.104","172.30.1.205","TCP","66","49671 > 38678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40195","19.071479","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40196","19.071822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40197","19.072108","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40198","19.072117","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40199","19.074029","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40200","19.074388","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40201","19.074395","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40202","19.075769","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40203","19.079695","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40204","19.079706","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40205","19.080656","172.30.1.205","172.30.1.104","TCP","74","46044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922307 TSecr=0 WS=128" +"40206","19.080955","172.30.1.104","172.30.1.205","TCP","66","135 > 46044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40207","19.080966","172.30.1.205","172.30.1.104","TCP","54","46044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40208","19.081328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40209","19.081634","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40210","19.081644","172.30.1.205","172.30.1.104","TCP","54","46044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40211","19.083829","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40212","19.084216","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40213","19.084224","172.30.1.205","172.30.1.104","TCP","54","46044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40214","19.086089","172.30.1.205","172.30.1.104","TCP","54","46044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40215","19.086201","172.30.1.205","172.30.1.104","TCP","74","38682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922312 TSecr=0 WS=128" +"40216","19.086370","172.30.1.104","172.30.1.205","TCP","54","135 > 46044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40217","19.086379","172.30.1.104","172.30.1.205","TCP","54","135 > 46044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40218","19.086384","172.30.1.205","172.30.1.104","TCP","54","46044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40219","19.086454","172.30.1.104","172.30.1.205","TCP","66","49671 > 38682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40220","19.086462","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40221","19.086808","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40222","19.087342","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40223","19.087350","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40224","19.089270","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40225","19.089618","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40226","19.089624","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40227","19.090975","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40228","19.094145","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40229","19.094155","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40230","19.095095","172.30.1.205","172.30.1.104","TCP","74","46048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922321 TSecr=0 WS=128" +"40231","19.095380","172.30.1.104","172.30.1.205","TCP","66","135 > 46048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40232","19.095390","172.30.1.205","172.30.1.104","TCP","54","46048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40233","19.095752","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40234","19.096059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40235","19.096068","172.30.1.205","172.30.1.104","TCP","54","46048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40236","19.098292","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40237","19.098674","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40238","19.098680","172.30.1.205","172.30.1.104","TCP","54","46048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40239","19.100498","172.30.1.205","172.30.1.104","TCP","54","46048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40240","19.100613","172.30.1.205","172.30.1.104","TCP","74","38686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922327 TSecr=0 WS=128" +"40241","19.100793","172.30.1.104","172.30.1.205","TCP","54","135 > 46048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40242","19.100802","172.30.1.104","172.30.1.205","TCP","54","135 > 46048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40243","19.100807","172.30.1.205","172.30.1.104","TCP","54","46048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40244","19.100884","172.30.1.104","172.30.1.205","TCP","66","49671 > 38686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40245","19.100892","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40246","19.101267","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40247","19.101563","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40248","19.101572","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40249","19.103572","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40250","19.103955","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40251","19.103961","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40252","19.105377","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40253","19.108697","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40254","19.108706","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40255","19.109663","172.30.1.205","172.30.1.104","TCP","74","46052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922336 TSecr=0 WS=128" +"40256","19.109957","172.30.1.104","172.30.1.205","TCP","66","135 > 46052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40257","19.109968","172.30.1.205","172.30.1.104","TCP","54","46052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40258","19.110323","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40259","19.110596","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40260","19.110605","172.30.1.205","172.30.1.104","TCP","54","46052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40261","19.112817","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40262","19.113262","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40263","19.113268","172.30.1.205","172.30.1.104","TCP","54","46052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40264","19.115076","172.30.1.205","172.30.1.104","TCP","54","46052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40265","19.115188","172.30.1.205","172.30.1.104","TCP","74","38690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922341 TSecr=0 WS=128" +"40266","19.115358","172.30.1.104","172.30.1.205","TCP","54","135 > 46052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40267","19.115369","172.30.1.104","172.30.1.205","TCP","54","135 > 46052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40268","19.115375","172.30.1.205","172.30.1.104","TCP","54","46052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40269","19.116076","172.30.1.104","172.30.1.205","TCP","66","49671 > 38690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40270","19.116085","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40271","19.116446","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40272","19.116727","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40273","19.116736","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40274","19.118643","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40275","19.119024","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40276","19.119031","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40277","19.120387","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40278","19.123736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40279","19.123746","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40280","19.124694","172.30.1.205","172.30.1.104","TCP","74","46056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922351 TSecr=0 WS=128" +"40281","19.125041","172.30.1.104","172.30.1.205","TCP","66","135 > 46056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40282","19.125053","172.30.1.205","172.30.1.104","TCP","54","46056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40283","19.125411","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40284","19.125758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40285","19.125767","172.30.1.205","172.30.1.104","TCP","54","46056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40286","19.127962","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40287","19.128427","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40288","19.128434","172.30.1.205","172.30.1.104","TCP","54","46056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40289","19.130269","172.30.1.205","172.30.1.104","TCP","54","46056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40290","19.130379","172.30.1.205","172.30.1.104","TCP","74","38694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922356 TSecr=0 WS=128" +"40291","19.130587","172.30.1.104","172.30.1.205","TCP","54","135 > 46056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40292","19.130625","172.30.1.104","172.30.1.205","TCP","54","135 > 46056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40293","19.130630","172.30.1.205","172.30.1.104","TCP","54","46056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40294","19.130752","172.30.1.104","172.30.1.205","TCP","66","49671 > 38694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40295","19.130761","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40296","19.131106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40297","19.131394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40298","19.131403","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40299","19.133304","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40300","19.133706","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40301","19.133713","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40302","19.135067","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40303","19.138485","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40304","19.138497","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40305","19.139462","172.30.1.205","172.30.1.104","TCP","74","46060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922365 TSecr=0 WS=128" +"40306","19.139807","172.30.1.104","172.30.1.205","TCP","66","135 > 46060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40307","19.139817","172.30.1.205","172.30.1.104","TCP","54","46060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40308","19.140167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40309","19.140498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40310","19.140507","172.30.1.205","172.30.1.104","TCP","54","46060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40311","19.142712","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40312","19.143152","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40313","19.143159","172.30.1.205","172.30.1.104","TCP","54","46060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40314","19.144999","172.30.1.205","172.30.1.104","TCP","54","46060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40315","19.145108","172.30.1.205","172.30.1.104","TCP","74","38698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922371 TSecr=0 WS=128" +"40316","19.145264","172.30.1.104","172.30.1.205","TCP","54","135 > 46060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40317","19.145303","172.30.1.104","172.30.1.205","TCP","54","135 > 46060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40318","19.145316","172.30.1.205","172.30.1.104","TCP","54","46060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40319","19.145395","172.30.1.104","172.30.1.205","TCP","66","49671 > 38698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40320","19.145404","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40321","19.145750","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40322","19.146051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40323","19.146059","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40324","19.147959","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40325","19.148352","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40326","19.148364","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40327","19.149739","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40328","19.153133","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40329","19.153142","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40330","19.154128","172.30.1.205","172.30.1.104","TCP","74","46064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922380 TSecr=0 WS=128" +"40331","19.154471","172.30.1.104","172.30.1.205","TCP","66","135 > 46064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40332","19.154482","172.30.1.205","172.30.1.104","TCP","54","46064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40333","19.154855","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40334","19.155154","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40335","19.155163","172.30.1.205","172.30.1.104","TCP","54","46064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40336","19.157380","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40337","19.157780","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40338","19.157787","172.30.1.205","172.30.1.104","TCP","54","46064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40339","19.159598","172.30.1.205","172.30.1.104","TCP","54","46064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40340","19.159707","172.30.1.205","172.30.1.104","TCP","74","38702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922386 TSecr=0 WS=128" +"40341","19.159866","172.30.1.104","172.30.1.205","TCP","54","135 > 46064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40342","19.159879","172.30.1.104","172.30.1.205","TCP","54","135 > 46064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40343","19.159885","172.30.1.205","172.30.1.104","TCP","54","46064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40344","19.159996","172.30.1.104","172.30.1.205","TCP","66","49671 > 38702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40345","19.160005","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40346","19.160353","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40347","19.160639","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40348","19.160647","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40349","19.162540","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40350","19.162881","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40351","19.162886","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40352","19.164232","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40353","19.167382","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40354","19.167392","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40355","19.168331","172.30.1.205","172.30.1.104","TCP","74","46068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922394 TSecr=0 WS=128" +"40356","19.168636","172.30.1.104","172.30.1.205","TCP","66","135 > 46068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40357","19.168647","172.30.1.205","172.30.1.104","TCP","54","46068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40358","19.169027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40359","19.169325","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40360","19.169334","172.30.1.205","172.30.1.104","TCP","54","46068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40361","19.171537","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40362","19.171955","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40363","19.171962","172.30.1.205","172.30.1.104","TCP","54","46068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40364","19.173796","172.30.1.205","172.30.1.104","TCP","54","46068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40365","19.173910","172.30.1.205","172.30.1.104","TCP","74","38706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922400 TSecr=0 WS=128" +"40366","19.174067","172.30.1.104","172.30.1.205","TCP","54","135 > 46068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40367","19.174088","172.30.1.104","172.30.1.205","TCP","54","135 > 46068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40368","19.174093","172.30.1.205","172.30.1.104","TCP","54","46068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40369","19.174200","172.30.1.104","172.30.1.205","TCP","66","49671 > 38706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40370","19.174208","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40371","19.174552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40372","19.174846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40373","19.174855","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40374","19.176753","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40375","19.177126","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40376","19.177133","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40377","19.178481","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40378","19.181729","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40379","19.181739","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40380","19.182681","172.30.1.205","172.30.1.104","TCP","74","46072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922409 TSecr=0 WS=128" +"40381","19.183023","172.30.1.104","172.30.1.205","TCP","66","135 > 46072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40382","19.183033","172.30.1.205","172.30.1.104","TCP","54","46072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40383","19.183394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40384","19.183679","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40385","19.183688","172.30.1.205","172.30.1.104","TCP","54","46072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40386","19.185895","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40387","19.186293","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40388","19.186300","172.30.1.205","172.30.1.104","TCP","54","46072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40389","19.187143","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40390","19.187195","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40391","19.187232","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40392","19.187261","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40393","19.187290","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40394","19.187318","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40395","19.187350","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40396","19.187382","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40397","19.187409","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40398","19.187436","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40399","19.187468","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40400","19.187535","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40401","19.187624","172.30.1.104","172.30.1.205","TCP","54","49671 > 38666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40402","19.187640","172.30.1.104","172.30.1.205","TCP","54","49671 > 38670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40403","19.187660","172.30.1.104","172.30.1.205","TCP","54","49671 > 38666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40404","19.187666","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40405","19.187679","172.30.1.104","172.30.1.205","TCP","54","49671 > 38674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40406","19.187700","172.30.1.104","172.30.1.205","TCP","54","49671 > 38678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40407","19.187719","172.30.1.104","172.30.1.205","TCP","54","49671 > 38678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40408","19.187723","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40409","19.187738","172.30.1.104","172.30.1.205","TCP","54","49671 > 38682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40410","19.187757","172.30.1.104","172.30.1.205","TCP","54","49671 > 38682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40411","19.187761","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40412","19.187788","172.30.1.104","172.30.1.205","TCP","54","49671 > 38686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40413","19.187807","172.30.1.104","172.30.1.205","TCP","54","49671 > 38690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40414","19.187827","172.30.1.104","172.30.1.205","TCP","54","49671 > 38694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40415","19.187847","172.30.1.104","172.30.1.205","TCP","54","49671 > 38698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40416","19.187944","172.30.1.104","172.30.1.205","TCP","54","49671 > 38698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40417","19.187949","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40418","19.187963","172.30.1.104","172.30.1.205","TCP","54","49671 > 38694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40419","19.187966","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40420","19.187985","172.30.1.104","172.30.1.205","TCP","54","49671 > 38690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40421","19.187988","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40422","19.188004","172.30.1.104","172.30.1.205","TCP","54","49671 > 38686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40423","19.188007","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40424","19.188025","172.30.1.104","172.30.1.205","TCP","54","49671 > 38670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40425","19.188029","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40426","19.188044","172.30.1.104","172.30.1.205","TCP","54","49671 > 38674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40427","19.188047","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40428","19.188076","172.30.1.104","172.30.1.205","TCP","54","49671 > 38702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40429","19.188095","172.30.1.104","172.30.1.205","TCP","54","49671 > 38706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40430","19.188236","172.30.1.104","172.30.1.205","TCP","54","49671 > 38662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40431","19.188268","172.30.1.104","172.30.1.205","TCP","54","49671 > 38702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40432","19.188273","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40433","19.188288","172.30.1.104","172.30.1.205","TCP","54","49671 > 38706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40434","19.188290","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40435","19.188308","172.30.1.104","172.30.1.205","TCP","54","49671 > 38662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40436","19.188310","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40437","19.189151","172.30.1.205","172.30.1.104","TCP","54","46072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40438","19.189263","172.30.1.205","172.30.1.104","TCP","74","38710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922415 TSecr=0 WS=128" +"40439","19.189393","172.30.1.104","172.30.1.205","TCP","54","135 > 46072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40440","19.189406","172.30.1.104","172.30.1.205","TCP","54","135 > 46072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40441","19.189411","172.30.1.205","172.30.1.104","TCP","54","46072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40442","19.189541","172.30.1.104","172.30.1.205","TCP","66","49671 > 38710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40443","19.189549","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40444","19.189936","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40445","19.190217","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40446","19.190226","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40447","19.192092","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40448","19.192443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40449","19.192449","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40450","19.193844","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40451","19.197050","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40452","19.197059","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40453","19.198002","172.30.1.205","172.30.1.104","TCP","74","46076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922424 TSecr=0 WS=128" +"40454","19.198308","172.30.1.104","172.30.1.205","TCP","66","135 > 46076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40455","19.198318","172.30.1.205","172.30.1.104","TCP","54","46076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40456","19.198674","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40457","19.198973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40458","19.198982","172.30.1.205","172.30.1.104","TCP","54","46076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40459","19.201189","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40460","19.201688","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40461","19.201694","172.30.1.205","172.30.1.104","TCP","54","46076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40462","19.203511","172.30.1.205","172.30.1.104","TCP","54","46076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40463","19.203622","172.30.1.205","172.30.1.104","TCP","74","38714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922430 TSecr=0 WS=128" +"40464","19.203840","172.30.1.104","172.30.1.205","TCP","54","135 > 46076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40465","19.203862","172.30.1.104","172.30.1.205","TCP","54","135 > 46076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40466","19.203867","172.30.1.205","172.30.1.104","TCP","54","46076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40467","19.203957","172.30.1.104","172.30.1.205","TCP","66","49671 > 38714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40468","19.203966","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40469","19.204310","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40470","19.204612","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40471","19.204620","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40472","19.206522","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40473","19.206884","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40474","19.206890","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40475","19.208244","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40476","19.211536","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40477","19.211545","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40478","19.212482","172.30.1.205","172.30.1.104","TCP","74","46080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922438 TSecr=0 WS=128" +"40479","19.212806","172.30.1.104","172.30.1.205","TCP","66","135 > 46080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40480","19.212818","172.30.1.205","172.30.1.104","TCP","54","46080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40481","19.213180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40482","19.213465","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40483","19.213474","172.30.1.205","172.30.1.104","TCP","54","46080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40484","19.215673","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40485","19.216100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40486","19.216107","172.30.1.205","172.30.1.104","TCP","54","46080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40487","19.217955","172.30.1.205","172.30.1.104","TCP","54","46080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40488","19.218065","172.30.1.205","172.30.1.104","TCP","74","38718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922444 TSecr=0 WS=128" +"40489","19.218216","172.30.1.104","172.30.1.205","TCP","54","135 > 46080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40490","19.218267","172.30.1.104","172.30.1.205","TCP","54","135 > 46080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40491","19.218272","172.30.1.205","172.30.1.104","TCP","54","46080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40492","19.218345","172.30.1.104","172.30.1.205","TCP","66","49671 > 38718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40493","19.218354","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40494","19.218697","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40495","19.218997","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40496","19.219006","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40497","19.220897","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40498","19.222581","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40499","19.222587","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40500","19.223939","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40501","19.227174","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40502","19.227185","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40503","19.228139","172.30.1.205","172.30.1.104","TCP","74","46084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922454 TSecr=0 WS=128" +"40504","19.228464","172.30.1.104","172.30.1.205","TCP","66","135 > 46084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40505","19.228475","172.30.1.205","172.30.1.104","TCP","54","46084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40506","19.228853","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40507","19.229151","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40508","19.229160","172.30.1.205","172.30.1.104","TCP","54","46084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40509","19.231355","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40510","19.231770","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40511","19.231776","172.30.1.205","172.30.1.104","TCP","54","46084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40512","19.233627","172.30.1.205","172.30.1.104","TCP","54","46084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40513","19.233739","172.30.1.205","172.30.1.104","TCP","74","38722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922460 TSecr=0 WS=128" +"40514","19.233892","172.30.1.104","172.30.1.205","TCP","54","135 > 46084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40515","19.233914","172.30.1.104","172.30.1.205","TCP","54","135 > 46084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40516","19.233920","172.30.1.205","172.30.1.104","TCP","54","46084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40517","19.234002","172.30.1.104","172.30.1.205","TCP","66","49671 > 38722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40518","19.234010","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40519","19.234357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40520","19.234642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40521","19.234650","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40522","19.236548","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40523","19.236951","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40524","19.236957","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40525","19.238332","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40526","19.241583","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40527","19.241593","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40528","19.242554","172.30.1.205","172.30.1.104","TCP","74","46088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922468 TSecr=0 WS=128" +"40529","19.242991","172.30.1.104","172.30.1.205","TCP","66","135 > 46088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40530","19.243002","172.30.1.205","172.30.1.104","TCP","54","46088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40531","19.243365","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40532","19.243775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40533","19.243784","172.30.1.205","172.30.1.104","TCP","54","46088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40534","19.246006","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40535","19.246497","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40536","19.246504","172.30.1.205","172.30.1.104","TCP","54","46088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40537","19.248322","172.30.1.205","172.30.1.104","TCP","54","46088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40538","19.248433","172.30.1.205","172.30.1.104","TCP","74","38726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922474 TSecr=0 WS=128" +"40539","19.248613","172.30.1.104","172.30.1.205","TCP","54","135 > 46088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40540","19.248671","172.30.1.104","172.30.1.205","TCP","54","135 > 46088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40541","19.248677","172.30.1.205","172.30.1.104","TCP","54","46088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40542","19.248748","172.30.1.104","172.30.1.205","TCP","66","49671 > 38726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40543","19.248757","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40544","19.249140","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40545","19.249451","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40546","19.249460","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40547","19.251346","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40548","19.252192","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40549","19.252204","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40550","19.253671","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40551","19.256922","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40552","19.256938","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40553","19.257957","172.30.1.205","172.30.1.104","TCP","74","46092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922484 TSecr=0 WS=128" +"40554","19.258386","172.30.1.104","172.30.1.205","TCP","66","135 > 46092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40555","19.258409","172.30.1.205","172.30.1.104","TCP","54","46092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40556","19.258998","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40557","19.259322","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40558","19.259331","172.30.1.205","172.30.1.104","TCP","54","46092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40559","19.261564","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40560","19.262284","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40561","19.262291","172.30.1.205","172.30.1.104","TCP","54","46092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40562","19.264127","172.30.1.205","172.30.1.104","TCP","54","46092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40563","19.264249","172.30.1.205","172.30.1.104","TCP","74","38730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922490 TSecr=0 WS=128" +"40564","19.264392","172.30.1.104","172.30.1.205","TCP","54","135 > 46092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40565","19.264443","172.30.1.104","172.30.1.205","TCP","54","135 > 46092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40566","19.264449","172.30.1.205","172.30.1.104","TCP","54","46092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40567","19.264614","172.30.1.104","172.30.1.205","TCP","66","49671 > 38730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40568","19.264622","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40569","19.265003","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40570","19.265301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40571","19.265312","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40572","19.267216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40573","19.267572","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40574","19.267576","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40575","19.268975","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40576","19.272330","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40577","19.272340","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40578","19.273323","172.30.1.205","172.30.1.104","TCP","74","46096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922499 TSecr=0 WS=128" +"40579","19.273617","172.30.1.104","172.30.1.205","TCP","66","135 > 46096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40580","19.273627","172.30.1.205","172.30.1.104","TCP","54","46096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40581","19.273985","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40582","19.274260","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40583","19.274269","172.30.1.205","172.30.1.104","TCP","54","46096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40584","19.276461","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40585","19.276882","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40586","19.276889","172.30.1.205","172.30.1.104","TCP","54","46096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40587","19.278738","172.30.1.205","172.30.1.104","TCP","54","46096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40588","19.278862","172.30.1.205","172.30.1.104","TCP","74","38734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922505 TSecr=0 WS=128" +"40589","19.279026","172.30.1.104","172.30.1.205","TCP","54","135 > 46096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40590","19.279035","172.30.1.104","172.30.1.205","TCP","54","135 > 46096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40591","19.279040","172.30.1.205","172.30.1.104","TCP","54","46096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40592","19.279142","172.30.1.104","172.30.1.205","TCP","66","49671 > 38734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40593","19.279150","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40594","19.279495","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40595","19.279799","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40596","19.279808","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40597","19.281774","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40598","19.282124","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40599","19.282133","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40600","19.283514","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40601","19.286714","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40602","19.286726","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40603","19.287697","172.30.1.205","172.30.1.104","TCP","74","46100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922514 TSecr=0 WS=128" +"40604","19.287989","172.30.1.104","172.30.1.205","TCP","66","135 > 46100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40605","19.288000","172.30.1.205","172.30.1.104","TCP","54","46100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40606","19.288349","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40607","19.288642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40608","19.288653","172.30.1.205","172.30.1.104","TCP","54","46100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40609","19.290871","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40610","19.291298","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40611","19.291305","172.30.1.205","172.30.1.104","TCP","54","46100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40612","19.293140","172.30.1.205","172.30.1.104","TCP","54","46100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40613","19.293252","172.30.1.205","172.30.1.104","TCP","74","38738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922519 TSecr=0 WS=128" +"40614","19.293403","172.30.1.104","172.30.1.205","TCP","54","135 > 46100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40615","19.293432","172.30.1.104","172.30.1.205","TCP","54","135 > 46100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40616","19.293438","172.30.1.205","172.30.1.104","TCP","54","46100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40617","19.293544","172.30.1.104","172.30.1.205","TCP","66","49671 > 38738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40618","19.293552","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40619","19.293904","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40620","19.294177","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40621","19.294186","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40622","19.296068","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40623","19.296431","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40624","19.296436","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40625","19.297820","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40626","19.300873","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40627","19.300883","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40628","19.301834","172.30.1.205","172.30.1.104","TCP","74","46104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922528 TSecr=0 WS=128" +"40629","19.302156","172.30.1.104","172.30.1.205","TCP","66","135 > 46104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40630","19.302171","172.30.1.205","172.30.1.104","TCP","54","46104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40631","19.302519","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40632","19.302814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40633","19.302823","172.30.1.205","172.30.1.104","TCP","54","46104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40634","19.305031","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40635","19.305428","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40636","19.305435","172.30.1.205","172.30.1.104","TCP","54","46104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40637","19.307245","172.30.1.205","172.30.1.104","TCP","54","46104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40638","19.307356","172.30.1.205","172.30.1.104","TCP","74","38742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922533 TSecr=0 WS=128" +"40639","19.307537","172.30.1.104","172.30.1.205","TCP","54","135 > 46104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40640","19.307552","172.30.1.104","172.30.1.205","TCP","54","135 > 46104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40641","19.307557","172.30.1.205","172.30.1.104","TCP","54","46104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40642","19.307674","172.30.1.104","172.30.1.205","TCP","66","49671 > 38742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40643","19.307683","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40644","19.308027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40645","19.308343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40646","19.308351","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40647","19.310237","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40648","19.310626","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40649","19.310633","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40650","19.311976","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40651","19.315203","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40652","19.315212","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40653","19.316152","172.30.1.205","172.30.1.104","TCP","74","46108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922542 TSecr=0 WS=128" +"40654","19.316487","172.30.1.104","172.30.1.205","TCP","66","135 > 46108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40655","19.316500","172.30.1.205","172.30.1.104","TCP","54","46108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40656","19.316881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40657","19.317189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40658","19.317197","172.30.1.205","172.30.1.104","TCP","54","46108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40659","19.319383","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40660","19.319816","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40661","19.319822","172.30.1.205","172.30.1.104","TCP","54","46108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40662","19.321671","172.30.1.205","172.30.1.104","TCP","54","46108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40663","19.321783","172.30.1.205","172.30.1.104","TCP","74","38746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922548 TSecr=0 WS=128" +"40664","19.321978","172.30.1.104","172.30.1.205","TCP","54","135 > 46108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40665","19.321990","172.30.1.104","172.30.1.205","TCP","54","135 > 46108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40666","19.321997","172.30.1.205","172.30.1.104","TCP","54","46108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40667","19.322072","172.30.1.104","172.30.1.205","TCP","66","49671 > 38746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40668","19.322083","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40669","19.322489","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40670","19.322778","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40671","19.322788","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40672","19.324685","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40673","19.325156","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40674","19.325162","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40675","19.326508","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40676","19.331619","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40677","19.331630","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40678","19.332582","172.30.1.205","172.30.1.104","TCP","74","46112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922559 TSecr=0 WS=128" +"40679","19.332863","172.30.1.104","172.30.1.205","TCP","66","135 > 46112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40680","19.332874","172.30.1.205","172.30.1.104","TCP","54","46112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40681","19.333229","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40682","19.333582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40683","19.333596","172.30.1.205","172.30.1.104","TCP","54","46112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40684","19.335859","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40685","19.336314","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40686","19.336321","172.30.1.205","172.30.1.104","TCP","54","46112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40687","19.338161","172.30.1.205","172.30.1.104","TCP","54","46112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40688","19.338284","172.30.1.205","172.30.1.104","TCP","74","38750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922564 TSecr=0 WS=128" +"40689","19.338481","172.30.1.104","172.30.1.205","TCP","54","135 > 46112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40690","19.338516","172.30.1.104","172.30.1.205","TCP","54","135 > 46112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40691","19.338522","172.30.1.205","172.30.1.104","TCP","54","46112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40692","19.338625","172.30.1.104","172.30.1.205","TCP","66","49671 > 38750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40693","19.338634","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40694","19.338982","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40695","19.339247","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40696","19.339255","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40697","19.341162","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40698","19.341511","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40699","19.341517","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40700","19.342861","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40701","19.346028","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40702","19.346039","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40703","19.347000","172.30.1.205","172.30.1.104","TCP","74","46116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922573 TSecr=0 WS=128" +"40704","19.347303","172.30.1.104","172.30.1.205","TCP","66","135 > 46116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40705","19.347314","172.30.1.205","172.30.1.104","TCP","54","46116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40706","19.347658","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40707","19.347943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40708","19.347952","172.30.1.205","172.30.1.104","TCP","54","46116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40709","19.350164","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40710","19.350550","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40711","19.350557","172.30.1.205","172.30.1.104","TCP","54","46116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40712","19.352359","172.30.1.205","172.30.1.104","TCP","54","46116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40713","19.352468","172.30.1.205","172.30.1.104","TCP","74","38754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922578 TSecr=0 WS=128" +"40714","19.352616","172.30.1.104","172.30.1.205","TCP","54","135 > 46116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40715","19.352661","172.30.1.104","172.30.1.205","TCP","54","135 > 46116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40716","19.352667","172.30.1.205","172.30.1.104","TCP","54","46116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40717","19.352755","172.30.1.104","172.30.1.205","TCP","66","49671 > 38754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40718","19.352763","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40719","19.353118","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40720","19.353396","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40721","19.353406","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40722","19.355266","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40723","19.355636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40724","19.355642","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40725","19.357011","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40726","19.360272","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40727","19.360283","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40728","19.361252","172.30.1.205","172.30.1.104","TCP","74","46120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922587 TSecr=0 WS=128" +"40729","19.361578","172.30.1.104","172.30.1.205","TCP","66","135 > 46120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40730","19.361589","172.30.1.205","172.30.1.104","TCP","54","46120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40731","19.361954","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40732","19.366982","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40733","19.366991","172.30.1.205","172.30.1.104","TCP","54","46120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40734","19.369235","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40735","19.370236","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40736","19.370243","172.30.1.205","172.30.1.104","TCP","54","46120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40737","19.371150","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40738","19.371198","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40739","19.371244","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40740","19.371280","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40741","19.371312","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40742","19.371344","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40743","19.371377","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40744","19.371400","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40745","19.371414","172.30.1.104","172.30.1.205","TCP","54","49671 > 38710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40746","19.371450","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40747","19.371484","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40748","19.371510","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40749","19.371520","172.30.1.104","172.30.1.205","TCP","54","49671 > 38714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40750","19.371539","172.30.1.104","172.30.1.205","TCP","54","49671 > 38710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40751","19.371545","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40752","19.371559","172.30.1.104","172.30.1.205","TCP","54","49671 > 38714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40753","19.371561","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40754","19.371573","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40755","19.371579","172.30.1.104","172.30.1.205","TCP","54","49671 > 38718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40756","19.371601","172.30.1.104","172.30.1.205","TCP","54","49671 > 38722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40757","19.371726","172.30.1.104","172.30.1.205","TCP","54","49671 > 38726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40758","19.371745","172.30.1.104","172.30.1.205","TCP","54","49671 > 38718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40759","19.371750","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40760","19.371764","172.30.1.104","172.30.1.205","TCP","54","49671 > 38722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40761","19.371767","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40762","19.371809","172.30.1.104","172.30.1.205","TCP","54","49671 > 38726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40763","19.371811","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40764","19.371814","172.30.1.104","172.30.1.205","TCP","54","49671 > 38730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40765","19.371835","172.30.1.104","172.30.1.205","TCP","54","49671 > 38734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40766","19.371939","172.30.1.104","172.30.1.205","TCP","54","49671 > 38738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40767","19.371958","172.30.1.104","172.30.1.205","TCP","54","49671 > 38742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40768","19.371978","172.30.1.104","172.30.1.205","TCP","54","49671 > 38738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40769","19.371982","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40770","19.372054","172.30.1.104","172.30.1.205","TCP","54","49671 > 38730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40771","19.372058","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40772","19.372072","172.30.1.104","172.30.1.205","TCP","54","49671 > 38734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40773","19.372073","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40774","19.372075","172.30.1.104","172.30.1.205","TCP","54","49671 > 38742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40775","19.372076","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40776","19.372081","172.30.1.104","172.30.1.205","TCP","54","49671 > 38746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40777","19.372091","172.30.1.104","172.30.1.205","TCP","54","49671 > 38750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40778","19.372200","172.30.1.104","172.30.1.205","TCP","54","49671 > 38746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40779","19.372204","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40780","19.372216","172.30.1.104","172.30.1.205","TCP","54","49671 > 38754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40781","19.372237","172.30.1.104","172.30.1.205","TCP","54","49671 > 38750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40782","19.372240","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40783","19.372256","172.30.1.104","172.30.1.205","TCP","54","49671 > 38754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"40784","19.372258","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"40785","19.373179","172.30.1.205","172.30.1.104","TCP","54","46120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40786","19.373289","172.30.1.205","172.30.1.104","TCP","74","38758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922599 TSecr=0 WS=128" +"40787","19.373432","172.30.1.104","172.30.1.205","TCP","54","135 > 46120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40788","19.373441","172.30.1.104","172.30.1.205","TCP","54","135 > 46120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40789","19.373446","172.30.1.205","172.30.1.104","TCP","54","46120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40790","19.373549","172.30.1.104","172.30.1.205","TCP","66","49671 > 38758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40791","19.373556","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40792","19.373950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40793","19.374224","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40794","19.374233","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40795","19.376331","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40796","19.376810","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40797","19.376818","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40798","19.378222","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40799","19.381492","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40800","19.381503","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40801","19.382507","172.30.1.205","172.30.1.104","TCP","74","46124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922608 TSecr=0 WS=128" +"40802","19.382833","172.30.1.104","172.30.1.205","TCP","66","135 > 46124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40803","19.382844","172.30.1.205","172.30.1.104","TCP","54","46124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40804","19.383207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40805","19.383577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40806","19.383586","172.30.1.205","172.30.1.104","TCP","54","46124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40807","19.385825","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40808","19.386279","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40809","19.386285","172.30.1.205","172.30.1.104","TCP","54","46124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40810","19.388110","172.30.1.205","172.30.1.104","TCP","54","46124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40811","19.388225","172.30.1.205","172.30.1.104","TCP","74","38762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922614 TSecr=0 WS=128" +"40812","19.388397","172.30.1.104","172.30.1.205","TCP","54","135 > 46124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40813","19.388420","172.30.1.104","172.30.1.205","TCP","54","135 > 46124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40814","19.388426","172.30.1.205","172.30.1.104","TCP","54","46124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40815","19.388506","172.30.1.104","172.30.1.205","TCP","66","49671 > 38762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40816","19.388514","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40817","19.388909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40818","19.389219","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40819","19.389228","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40820","19.391102","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40821","19.391487","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40822","19.391494","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40823","19.392889","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40824","19.396142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40825","19.396154","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40826","19.397133","172.30.1.205","172.30.1.104","TCP","74","46128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922623 TSecr=0 WS=128" +"40827","19.397451","172.30.1.104","172.30.1.205","TCP","66","135 > 46128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40828","19.397462","172.30.1.205","172.30.1.104","TCP","54","46128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40829","19.397821","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40830","19.398100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40831","19.398109","172.30.1.205","172.30.1.104","TCP","54","46128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40832","19.400306","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40833","19.400736","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40834","19.400749","172.30.1.205","172.30.1.104","TCP","54","46128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40835","19.402695","172.30.1.205","172.30.1.104","TCP","54","46128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40836","19.402808","172.30.1.205","172.30.1.104","TCP","74","38766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922629 TSecr=0 WS=128" +"40837","19.402971","172.30.1.104","172.30.1.205","TCP","54","135 > 46128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40838","19.403036","172.30.1.104","172.30.1.205","TCP","54","135 > 46128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40839","19.403046","172.30.1.205","172.30.1.104","TCP","54","46128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40840","19.403120","172.30.1.104","172.30.1.205","TCP","66","49671 > 38766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40841","19.403129","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40842","19.403475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40843","19.404272","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40844","19.404281","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40845","19.406210","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40846","19.406635","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40847","19.406642","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40848","19.407994","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40849","19.411247","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40850","19.411257","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40851","19.412199","172.30.1.205","172.30.1.104","TCP","74","46132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922638 TSecr=0 WS=128" +"40852","19.412543","172.30.1.104","172.30.1.205","TCP","66","135 > 46132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40853","19.412555","172.30.1.205","172.30.1.104","TCP","54","46132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40854","19.412943","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40855","19.413227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40856","19.413236","172.30.1.205","172.30.1.104","TCP","54","46132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40857","19.415432","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40858","19.415887","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40859","19.415894","172.30.1.205","172.30.1.104","TCP","54","46132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40860","19.417738","172.30.1.205","172.30.1.104","TCP","54","46132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40861","19.417854","172.30.1.205","172.30.1.104","TCP","74","38770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922644 TSecr=0 WS=128" +"40862","19.418051","172.30.1.104","172.30.1.205","TCP","54","135 > 46132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40863","19.418061","172.30.1.104","172.30.1.205","TCP","54","135 > 46132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40864","19.418066","172.30.1.205","172.30.1.104","TCP","54","46132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40865","19.418146","172.30.1.104","172.30.1.205","TCP","66","49671 > 38770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40866","19.418155","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40867","19.418521","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40868","19.418835","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40869","19.418843","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40870","19.420728","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40871","19.421087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40872","19.421094","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40873","19.422462","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40874","19.425705","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40875","19.425720","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40876","19.426741","172.30.1.205","172.30.1.104","TCP","74","46136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922653 TSecr=0 WS=128" +"40877","19.427058","172.30.1.104","172.30.1.205","TCP","66","135 > 46136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40878","19.427071","172.30.1.205","172.30.1.104","TCP","54","46136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40879","19.427428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40880","19.427747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40881","19.427758","172.30.1.205","172.30.1.104","TCP","54","46136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40882","19.429991","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40883","19.430426","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40884","19.430434","172.30.1.205","172.30.1.104","TCP","54","46136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40885","19.432249","172.30.1.205","172.30.1.104","TCP","54","46136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40886","19.432373","172.30.1.205","172.30.1.104","TCP","74","38774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922658 TSecr=0 WS=128" +"40887","19.432523","172.30.1.104","172.30.1.205","TCP","54","135 > 46136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40888","19.432551","172.30.1.104","172.30.1.205","TCP","54","135 > 46136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40889","19.432556","172.30.1.205","172.30.1.104","TCP","54","46136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40890","19.432637","172.30.1.104","172.30.1.205","TCP","66","49671 > 38774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40891","19.432645","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40892","19.433020","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40893","19.433304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40894","19.433313","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40895","19.435171","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40896","19.435555","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40897","19.435561","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40898","19.436930","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40899","19.440103","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40900","19.440116","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40901","19.441100","172.30.1.205","172.30.1.104","TCP","74","46140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922667 TSecr=0 WS=128" +"40902","19.441460","172.30.1.104","172.30.1.205","TCP","66","135 > 46140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40903","19.441471","172.30.1.205","172.30.1.104","TCP","54","46140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40904","19.441830","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40905","19.442189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40906","19.442201","172.30.1.205","172.30.1.104","TCP","54","46140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40907","19.444410","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40908","19.444798","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40909","19.444804","172.30.1.205","172.30.1.104","TCP","54","46140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40910","19.446631","172.30.1.205","172.30.1.104","TCP","54","46140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40911","19.446747","172.30.1.205","172.30.1.104","TCP","74","38778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922673 TSecr=0 WS=128" +"40912","19.446903","172.30.1.104","172.30.1.205","TCP","54","135 > 46140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40913","19.446943","172.30.1.104","172.30.1.205","TCP","54","135 > 46140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40914","19.446949","172.30.1.205","172.30.1.104","TCP","54","46140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40915","19.447023","172.30.1.104","172.30.1.205","TCP","66","49671 > 38778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40916","19.447035","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40917","19.447384","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40918","19.449422","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40919","19.449430","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40920","19.451320","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40921","19.451734","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40922","19.451741","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40923","19.453126","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40924","19.456350","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40925","19.456360","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40926","19.457323","172.30.1.205","172.30.1.104","TCP","74","46144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922683 TSecr=0 WS=128" +"40927","19.457622","172.30.1.104","172.30.1.205","TCP","66","135 > 46144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40928","19.457633","172.30.1.205","172.30.1.104","TCP","54","46144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40929","19.457993","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40930","19.458276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40931","19.458285","172.30.1.205","172.30.1.104","TCP","54","46144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40932","19.460492","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40933","19.460910","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40934","19.460925","172.30.1.205","172.30.1.104","TCP","54","46144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40935","19.462730","172.30.1.205","172.30.1.104","TCP","54","46144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40936","19.462841","172.30.1.205","172.30.1.104","TCP","74","38782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922689 TSecr=0 WS=128" +"40937","19.463060","172.30.1.104","172.30.1.205","TCP","54","135 > 46144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40938","19.463068","172.30.1.104","172.30.1.205","TCP","54","135 > 46144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40939","19.463073","172.30.1.205","172.30.1.104","TCP","54","46144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40940","19.463142","172.30.1.104","172.30.1.205","TCP","66","49671 > 38782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40941","19.463151","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40942","19.463504","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40943","19.463802","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40944","19.463811","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40945","19.465774","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40946","19.466211","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40947","19.466217","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40948","19.467611","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40949","19.470850","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40950","19.470860","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40951","19.471802","172.30.1.205","172.30.1.104","TCP","74","46148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922698 TSecr=0 WS=128" +"40952","19.472090","172.30.1.104","172.30.1.205","TCP","66","135 > 46148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40953","19.472110","172.30.1.205","172.30.1.104","TCP","54","46148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40954","19.472651","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40955","19.472950","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40956","19.472959","172.30.1.205","172.30.1.104","TCP","54","46148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40957","19.475207","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40958","19.475622","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40959","19.475629","172.30.1.205","172.30.1.104","TCP","54","46148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40960","19.477500","172.30.1.205","172.30.1.104","TCP","54","46148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40961","19.477609","172.30.1.205","172.30.1.104","TCP","74","38786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922704 TSecr=0 WS=128" +"40962","19.477749","172.30.1.104","172.30.1.205","TCP","54","135 > 46148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40963","19.477798","172.30.1.104","172.30.1.205","TCP","54","135 > 46148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40964","19.477803","172.30.1.205","172.30.1.104","TCP","54","46148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40965","19.477913","172.30.1.104","172.30.1.205","TCP","66","49671 > 38786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40966","19.477922","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40967","19.478288","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40968","19.478550","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40969","19.478559","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40970","19.480521","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40971","19.480918","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40972","19.480924","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40973","19.482356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40974","19.485705","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"40975","19.485715","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"40976","19.486649","172.30.1.205","172.30.1.104","TCP","74","46152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922713 TSecr=0 WS=128" +"40977","19.486966","172.30.1.104","172.30.1.205","TCP","66","135 > 46152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40978","19.486987","172.30.1.205","172.30.1.104","TCP","54","46152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40979","19.487474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"40980","19.491112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40981","19.491123","172.30.1.205","172.30.1.104","TCP","54","46152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40982","19.493432","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"40983","19.493860","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"40984","19.493866","172.30.1.205","172.30.1.104","TCP","54","46152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40985","19.495714","172.30.1.205","172.30.1.104","TCP","54","46152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"40986","19.495820","172.30.1.205","172.30.1.104","TCP","74","38790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922722 TSecr=0 WS=128" +"40987","19.495972","172.30.1.104","172.30.1.205","TCP","54","135 > 46152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40988","19.495994","172.30.1.104","172.30.1.205","TCP","54","135 > 46152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"40989","19.496010","172.30.1.205","172.30.1.104","TCP","54","46152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"40990","19.496112","172.30.1.104","172.30.1.205","TCP","66","49671 > 38790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"40991","19.496120","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"40992","19.496466","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"40993","19.496791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"40994","19.496812","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"40995","19.498730","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"40996","19.499140","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"40997","19.499152","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"40998","19.500681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"40999","19.503830","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41000","19.503839","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41001","19.504802","172.30.1.205","172.30.1.104","TCP","74","46156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922731 TSecr=0 WS=128" +"41002","19.505106","172.30.1.104","172.30.1.205","TCP","66","135 > 46156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41003","19.505117","172.30.1.205","172.30.1.104","TCP","54","46156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41004","19.505469","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41005","19.505789","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41006","19.505798","172.30.1.205","172.30.1.104","TCP","54","46156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41007","19.507997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41008","19.508426","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41009","19.508433","172.30.1.205","172.30.1.104","TCP","54","46156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41010","19.510246","172.30.1.205","172.30.1.104","TCP","54","46156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41011","19.510355","172.30.1.205","172.30.1.104","TCP","74","38794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922736 TSecr=0 WS=128" +"41012","19.510524","172.30.1.104","172.30.1.205","TCP","54","135 > 46156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41013","19.510547","172.30.1.104","172.30.1.205","TCP","54","135 > 46156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41014","19.510552","172.30.1.205","172.30.1.104","TCP","54","46156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41015","19.510664","172.30.1.104","172.30.1.205","TCP","66","49671 > 38794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41016","19.510672","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41017","19.511033","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41018","19.511351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41019","19.511360","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41020","19.513245","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41021","19.513615","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41022","19.513621","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41023","19.514958","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41024","19.518230","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41025","19.518241","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41026","19.519184","172.30.1.205","172.30.1.104","TCP","74","46160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922745 TSecr=0 WS=128" +"41027","19.519534","172.30.1.104","172.30.1.205","TCP","66","135 > 46160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41028","19.519554","172.30.1.205","172.30.1.104","TCP","54","46160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41029","19.520034","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41030","19.520349","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41031","19.520358","172.30.1.205","172.30.1.104","TCP","54","46160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41032","19.522571","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41033","19.522994","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41034","19.523001","172.30.1.205","172.30.1.104","TCP","54","46160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41035","19.524818","172.30.1.205","172.30.1.104","TCP","54","46160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41036","19.524929","172.30.1.205","172.30.1.104","TCP","74","38798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922751 TSecr=0 WS=128" +"41037","19.525099","172.30.1.104","172.30.1.205","TCP","54","135 > 46160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41038","19.525154","172.30.1.104","172.30.1.205","TCP","54","135 > 46160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41039","19.525160","172.30.1.205","172.30.1.104","TCP","54","46160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41040","19.525231","172.30.1.104","172.30.1.205","TCP","66","49671 > 38798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41041","19.525239","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41042","19.525583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41043","19.525894","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41044","19.525903","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41045","19.527790","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41046","19.528161","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41047","19.528168","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41048","19.529554","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41049","19.532745","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41050","19.532755","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41051","19.533716","172.30.1.205","172.30.1.104","TCP","74","46164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922760 TSecr=0 WS=128" +"41052","19.534018","172.30.1.104","172.30.1.205","TCP","66","135 > 46164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41053","19.534028","172.30.1.205","172.30.1.104","TCP","54","46164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41054","19.534375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41055","19.534707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41056","19.534716","172.30.1.205","172.30.1.104","TCP","54","46164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41057","19.536923","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41058","19.537306","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41059","19.537312","172.30.1.205","172.30.1.104","TCP","54","46164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41060","19.539109","172.30.1.205","172.30.1.104","TCP","54","46164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41061","19.539223","172.30.1.205","172.30.1.104","TCP","74","38802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922765 TSecr=0 WS=128" +"41062","19.539377","172.30.1.104","172.30.1.205","TCP","54","135 > 46164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41063","19.539419","172.30.1.104","172.30.1.205","TCP","54","135 > 46164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41064","19.539424","172.30.1.205","172.30.1.104","TCP","54","46164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41065","19.539538","172.30.1.104","172.30.1.205","TCP","66","49671 > 38802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41066","19.539545","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41067","19.539906","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41068","19.540182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41069","19.540190","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41070","19.542072","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41071","19.542438","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41072","19.542446","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41073","19.543779","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41074","19.547123","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41075","19.547133","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41076","19.548103","172.30.1.205","172.30.1.104","TCP","74","46168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922774 TSecr=0 WS=128" +"41077","19.548494","172.30.1.104","172.30.1.205","TCP","66","135 > 46168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41078","19.548504","172.30.1.205","172.30.1.104","TCP","54","46168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41079","19.548888","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41080","19.549206","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41081","19.549216","172.30.1.205","172.30.1.104","TCP","54","46168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41082","19.551437","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41083","19.551867","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41084","19.551880","172.30.1.205","172.30.1.104","TCP","54","46168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41085","19.552974","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41086","19.553031","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41087","19.553068","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41088","19.553096","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41089","19.553123","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41090","19.553149","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41091","19.553182","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41092","19.553208","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41093","19.553240","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41094","19.553266","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41095","19.553298","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41096","19.553364","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41097","19.553436","172.30.1.104","172.30.1.205","TCP","54","49671 > 38762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41098","19.553452","172.30.1.104","172.30.1.205","TCP","54","49671 > 38766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41099","19.553486","172.30.1.104","172.30.1.205","TCP","54","49671 > 38770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41100","19.553490","172.30.1.104","172.30.1.205","TCP","54","49671 > 38762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41101","19.553496","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41102","19.553529","172.30.1.104","172.30.1.205","TCP","54","49671 > 38774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41103","19.553551","172.30.1.104","172.30.1.205","TCP","54","49671 > 38778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41104","19.553571","172.30.1.104","172.30.1.205","TCP","54","49671 > 38774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41105","19.553576","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41106","19.553596","172.30.1.104","172.30.1.205","TCP","54","49671 > 38782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41107","19.553623","172.30.1.104","172.30.1.205","TCP","54","49671 > 38782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41108","19.553626","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41109","19.553642","172.30.1.104","172.30.1.205","TCP","54","49671 > 38786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41110","19.553663","172.30.1.104","172.30.1.205","TCP","54","49671 > 38778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41111","19.553665","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41112","19.553789","172.30.1.104","172.30.1.205","TCP","54","49671 > 38790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41113","19.553819","172.30.1.104","172.30.1.205","TCP","54","49671 > 38790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41114","19.553823","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41115","19.553839","172.30.1.104","172.30.1.205","TCP","54","49671 > 38786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41116","19.553841","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41117","19.553862","172.30.1.104","172.30.1.205","TCP","54","49671 > 38766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41118","19.553864","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41119","19.553884","172.30.1.104","172.30.1.205","TCP","54","49671 > 38770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41120","19.553887","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41121","19.553919","172.30.1.104","172.30.1.205","TCP","54","49671 > 38798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41122","19.553937","172.30.1.104","172.30.1.205","TCP","54","49671 > 38802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41123","19.553956","172.30.1.104","172.30.1.205","TCP","54","49671 > 38758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41124","19.554053","172.30.1.104","172.30.1.205","TCP","54","49671 > 38798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41125","19.554058","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41126","19.554088","172.30.1.104","172.30.1.205","TCP","54","49671 > 38794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41127","19.554106","172.30.1.104","172.30.1.205","TCP","54","49671 > 38794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41128","19.554109","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41129","19.554124","172.30.1.104","172.30.1.205","TCP","54","49671 > 38802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41130","19.554127","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41131","19.554143","172.30.1.104","172.30.1.205","TCP","54","49671 > 38758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41132","19.554145","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41133","19.554972","172.30.1.205","172.30.1.104","TCP","54","46168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41134","19.555079","172.30.1.205","172.30.1.104","TCP","74","38806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922781 TSecr=0 WS=128" +"41135","19.555244","172.30.1.104","172.30.1.205","TCP","54","135 > 46168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41136","19.555254","172.30.1.104","172.30.1.205","TCP","54","135 > 46168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41137","19.555258","172.30.1.205","172.30.1.104","TCP","54","46168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41138","19.555328","172.30.1.104","172.30.1.205","TCP","66","49671 > 38806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41139","19.555336","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41140","19.555707","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41141","19.555996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41142","19.556005","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41143","19.557991","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41144","19.558344","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41145","19.558351","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41146","19.559734","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41147","19.563067","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41148","19.563078","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41149","19.564026","172.30.1.205","172.30.1.104","TCP","74","46172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922790 TSecr=0 WS=128" +"41150","19.564390","172.30.1.104","172.30.1.205","TCP","66","135 > 46172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41151","19.564410","172.30.1.205","172.30.1.104","TCP","54","46172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41152","19.565001","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41153","19.565320","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41154","19.565329","172.30.1.205","172.30.1.104","TCP","54","46172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41155","19.567501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41156","19.567900","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41157","19.567912","172.30.1.205","172.30.1.104","TCP","54","46172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41158","19.569944","172.30.1.205","172.30.1.104","TCP","54","46172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41159","19.570052","172.30.1.205","172.30.1.104","TCP","74","38810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922796 TSecr=0 WS=128" +"41160","19.570228","172.30.1.104","172.30.1.205","TCP","54","135 > 46172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41161","19.570259","172.30.1.104","172.30.1.205","TCP","54","135 > 46172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41162","19.570265","172.30.1.205","172.30.1.104","TCP","54","46172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41163","19.570343","172.30.1.104","172.30.1.205","TCP","66","49671 > 38810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41164","19.570351","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41165","19.570691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41166","19.570975","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41167","19.570982","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41168","19.572917","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41169","19.573340","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41170","19.573347","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41171","19.574690","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41172","19.578004","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41173","19.578014","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41174","19.578972","172.30.1.205","172.30.1.104","TCP","74","46176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922805 TSecr=0 WS=128" +"41175","19.579335","172.30.1.104","172.30.1.205","TCP","66","135 > 46176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41176","19.579358","172.30.1.205","172.30.1.104","TCP","54","46176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41177","19.579973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41178","19.580325","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41179","19.580340","172.30.1.205","172.30.1.104","TCP","54","46176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41180","19.582689","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41181","19.583163","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41182","19.583176","172.30.1.205","172.30.1.104","TCP","54","46176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41183","19.585080","172.30.1.205","172.30.1.104","TCP","54","46176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41184","19.585196","172.30.1.205","172.30.1.104","TCP","74","38814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922811 TSecr=0 WS=128" +"41185","19.585396","172.30.1.104","172.30.1.205","TCP","54","135 > 46176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41186","19.585405","172.30.1.104","172.30.1.205","TCP","54","135 > 46176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41187","19.585410","172.30.1.205","172.30.1.104","TCP","54","46176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41188","19.585509","172.30.1.104","172.30.1.205","TCP","66","49671 > 38814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41189","19.585518","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41190","19.585877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41191","19.586223","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41192","19.586232","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41193","19.588106","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41194","19.588485","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41195","19.588491","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41196","19.589876","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41197","19.593124","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41198","19.593134","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41199","19.594120","172.30.1.205","172.30.1.104","TCP","74","46180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922820 TSecr=0 WS=128" +"41200","19.594463","172.30.1.104","172.30.1.205","TCP","66","135 > 46180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41201","19.594473","172.30.1.205","172.30.1.104","TCP","54","46180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41202","19.594880","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41203","19.595245","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41204","19.595254","172.30.1.205","172.30.1.104","TCP","54","46180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41205","19.597486","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41206","19.597936","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41207","19.597943","172.30.1.205","172.30.1.104","TCP","54","46180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41208","19.599757","172.30.1.205","172.30.1.104","TCP","54","46180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41209","19.599868","172.30.1.205","172.30.1.104","TCP","74","38818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922826 TSecr=0 WS=128" +"41210","19.600011","172.30.1.104","172.30.1.205","TCP","54","135 > 46180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41211","19.600065","172.30.1.104","172.30.1.205","TCP","54","135 > 46180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41212","19.600070","172.30.1.205","172.30.1.104","TCP","54","46180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41213","19.600141","172.30.1.104","172.30.1.205","TCP","66","49671 > 38818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41214","19.600150","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41215","19.600503","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41216","19.600783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41217","19.600791","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41218","19.602708","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41219","19.603116","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41220","19.603128","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41221","19.604653","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41222","19.608031","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41223","19.608042","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41224","19.609011","172.30.1.205","172.30.1.104","TCP","74","46184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922835 TSecr=0 WS=128" +"41225","19.609327","172.30.1.104","172.30.1.205","TCP","66","135 > 46184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41226","19.609340","172.30.1.205","172.30.1.104","TCP","54","46184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41227","19.609704","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41228","19.610012","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41229","19.610022","172.30.1.205","172.30.1.104","TCP","54","46184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41230","19.612232","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41231","19.612708","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41232","19.612716","172.30.1.205","172.30.1.104","TCP","54","46184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41233","19.614557","172.30.1.205","172.30.1.104","TCP","54","46184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41234","19.614670","172.30.1.205","172.30.1.104","TCP","74","38822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922841 TSecr=0 WS=128" +"41235","19.614850","172.30.1.104","172.30.1.205","TCP","54","135 > 46184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41236","19.614875","172.30.1.104","172.30.1.205","TCP","54","135 > 46184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41237","19.614881","172.30.1.205","172.30.1.104","TCP","54","46184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41238","19.614970","172.30.1.104","172.30.1.205","TCP","66","49671 > 38822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41239","19.614978","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41240","19.615337","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41241","19.615656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41242","19.615673","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41243","19.617597","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41244","19.618030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41245","19.618036","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41246","19.619392","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41247","19.622722","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41248","19.622734","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41249","19.623690","172.30.1.205","172.30.1.104","TCP","74","46188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922850 TSecr=0 WS=128" +"41250","19.624003","172.30.1.104","172.30.1.205","TCP","66","135 > 46188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41251","19.624014","172.30.1.205","172.30.1.104","TCP","54","46188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41252","19.624363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41253","19.624673","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41254","19.624683","172.30.1.205","172.30.1.104","TCP","54","46188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41255","19.626892","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41256","19.627329","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41257","19.627336","172.30.1.205","172.30.1.104","TCP","54","46188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41258","19.629178","172.30.1.205","172.30.1.104","TCP","54","46188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41259","19.629291","172.30.1.205","172.30.1.104","TCP","74","38826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922855 TSecr=0 WS=128" +"41260","19.629465","172.30.1.104","172.30.1.205","TCP","54","135 > 46188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41261","19.629474","172.30.1.104","172.30.1.205","TCP","54","135 > 46188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41262","19.629479","172.30.1.205","172.30.1.104","TCP","54","46188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41263","19.629549","172.30.1.104","172.30.1.205","TCP","66","49671 > 38826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41264","19.629557","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41265","19.629915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41266","19.630181","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41267","19.630188","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41268","19.632062","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41269","19.632427","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41270","19.632434","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41271","19.633817","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41272","19.637201","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41273","19.637211","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41274","19.638171","172.30.1.205","172.30.1.104","TCP","74","46192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922864 TSecr=0 WS=128" +"41275","19.638499","172.30.1.104","172.30.1.205","TCP","66","135 > 46192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41276","19.638509","172.30.1.205","172.30.1.104","TCP","54","46192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41277","19.638854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41278","19.639136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41279","19.639145","172.30.1.205","172.30.1.104","TCP","54","46192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41280","19.641359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41281","19.641790","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41282","19.641800","172.30.1.205","172.30.1.104","TCP","54","46192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41283","19.643677","172.30.1.205","172.30.1.104","TCP","54","46192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41284","19.643796","172.30.1.205","172.30.1.104","TCP","74","38830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922870 TSecr=0 WS=128" +"41285","19.643949","172.30.1.104","172.30.1.205","TCP","54","135 > 46192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41286","19.643983","172.30.1.104","172.30.1.205","TCP","54","135 > 46192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41287","19.643988","172.30.1.205","172.30.1.104","TCP","54","46192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41288","19.645933","172.30.1.104","172.30.1.205","TCP","66","49671 > 38830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41289","19.645944","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41290","19.646301","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41291","19.646617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41292","19.646626","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41293","19.648491","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41294","19.648923","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41295","19.648933","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41296","19.650372","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41297","19.654057","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41298","19.654069","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41299","19.655063","172.30.1.205","172.30.1.104","TCP","74","46196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922881 TSecr=0 WS=128" +"41300","19.655385","172.30.1.104","172.30.1.205","TCP","66","135 > 46196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41301","19.655398","172.30.1.205","172.30.1.104","TCP","54","46196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41302","19.655758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41303","19.656095","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41304","19.656104","172.30.1.205","172.30.1.104","TCP","54","46196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41305","19.658345","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41306","19.658871","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41307","19.658878","172.30.1.205","172.30.1.104","TCP","54","46196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41308","19.660719","172.30.1.205","172.30.1.104","TCP","54","46196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41309","19.660854","172.30.1.205","172.30.1.104","TCP","74","38834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922887 TSecr=0 WS=128" +"41310","19.660982","172.30.1.104","172.30.1.205","TCP","54","135 > 46196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41311","19.661008","172.30.1.104","172.30.1.205","TCP","54","135 > 46196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41312","19.661026","172.30.1.205","172.30.1.104","TCP","54","46196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41313","19.661131","172.30.1.104","172.30.1.205","TCP","66","49671 > 38834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41314","19.661139","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41315","19.661489","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41316","19.661782","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41317","19.661791","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41318","19.663700","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41319","19.664084","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41320","19.664091","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41321","19.665492","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41322","19.668712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41323","19.668722","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41324","19.669669","172.30.1.205","172.30.1.104","TCP","74","46200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922896 TSecr=0 WS=128" +"41325","19.669953","172.30.1.104","172.30.1.205","TCP","66","135 > 46200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41326","19.669964","172.30.1.205","172.30.1.104","TCP","54","46200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41327","19.670318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41328","19.670618","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41329","19.670626","172.30.1.205","172.30.1.104","TCP","54","46200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41330","19.672816","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41331","19.673188","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41332","19.673194","172.30.1.205","172.30.1.104","TCP","54","46200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41333","19.675001","172.30.1.205","172.30.1.104","TCP","54","46200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41334","19.675117","172.30.1.205","172.30.1.104","TCP","74","38838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922901 TSecr=0 WS=128" +"41335","19.675275","172.30.1.104","172.30.1.205","TCP","54","135 > 46200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41336","19.675286","172.30.1.104","172.30.1.205","TCP","54","135 > 46200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41337","19.675291","172.30.1.205","172.30.1.104","TCP","54","46200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41338","19.675392","172.30.1.104","172.30.1.205","TCP","66","49671 > 38838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41339","19.675401","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41340","19.675759","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41341","19.676052","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41342","19.676060","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41343","19.677960","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41344","19.678327","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41345","19.678333","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41346","19.679676","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41347","19.682938","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41348","19.682947","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41349","19.683888","172.30.1.205","172.30.1.104","TCP","74","46204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922910 TSecr=0 WS=128" +"41350","19.684275","172.30.1.104","172.30.1.205","TCP","66","135 > 46204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41351","19.684285","172.30.1.205","172.30.1.104","TCP","54","46204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41352","19.684638","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41353","19.684932","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41354","19.684942","172.30.1.205","172.30.1.104","TCP","54","46204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41355","19.687128","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41356","19.687572","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41357","19.687582","172.30.1.205","172.30.1.104","TCP","54","46204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41358","19.689517","172.30.1.205","172.30.1.104","TCP","54","46204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41359","19.689635","172.30.1.205","172.30.1.104","TCP","74","38842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922916 TSecr=0 WS=128" +"41360","19.689800","172.30.1.104","172.30.1.205","TCP","54","135 > 46204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41361","19.689831","172.30.1.104","172.30.1.205","TCP","54","135 > 46204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41362","19.689837","172.30.1.205","172.30.1.104","TCP","54","46204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41363","19.689932","172.30.1.104","172.30.1.205","TCP","66","49671 > 38842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41364","19.689941","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41365","19.690291","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41366","19.690580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41367","19.690587","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41368","19.692462","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41369","19.692830","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41370","19.692837","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41371","19.694213","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41372","19.697400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41373","19.697411","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41374","19.698370","172.30.1.205","172.30.1.104","TCP","74","46208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922924 TSecr=0 WS=128" +"41375","19.698704","172.30.1.104","172.30.1.205","TCP","66","135 > 46208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41376","19.698715","172.30.1.205","172.30.1.104","TCP","54","46208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41377","19.699069","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41378","19.699374","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41379","19.699383","172.30.1.205","172.30.1.104","TCP","54","46208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41380","19.701607","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41381","19.702016","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41382","19.702023","172.30.1.205","172.30.1.104","TCP","54","46208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41383","19.703832","172.30.1.205","172.30.1.104","TCP","54","46208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41384","19.703943","172.30.1.205","172.30.1.104","TCP","74","38846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922930 TSecr=0 WS=128" +"41385","19.704192","172.30.1.104","172.30.1.205","TCP","54","135 > 46208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41386","19.704201","172.30.1.104","172.30.1.205","TCP","54","135 > 46208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41387","19.704207","172.30.1.205","172.30.1.104","TCP","54","46208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41388","19.704262","172.30.1.104","172.30.1.205","TCP","66","49671 > 38846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41389","19.704271","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41390","19.704624","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41391","19.704955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41392","19.704964","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41393","19.706872","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41394","19.707230","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41395","19.707237","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41396","19.708580","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41397","19.711935","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41398","19.711945","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41399","19.712906","172.30.1.205","172.30.1.104","TCP","74","46212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922939 TSecr=0 WS=128" +"41400","19.713288","172.30.1.104","172.30.1.205","TCP","66","135 > 46212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41401","19.713300","172.30.1.205","172.30.1.104","TCP","54","46212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41402","19.713653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41403","19.713945","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41404","19.713954","172.30.1.205","172.30.1.104","TCP","54","46212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41405","19.716140","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41406","19.716569","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41407","19.716576","172.30.1.205","172.30.1.104","TCP","54","46212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41408","19.718405","172.30.1.205","172.30.1.104","TCP","54","46212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41409","19.718518","172.30.1.205","172.30.1.104","TCP","74","38850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922944 TSecr=0 WS=128" +"41410","19.718738","172.30.1.104","172.30.1.205","TCP","54","135 > 46212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41411","19.718794","172.30.1.104","172.30.1.205","TCP","54","135 > 46212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41412","19.718799","172.30.1.205","172.30.1.104","TCP","54","46212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41413","19.718833","172.30.1.104","172.30.1.205","TCP","66","49671 > 38850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41414","19.718841","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41415","19.719208","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41416","19.719501","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41417","19.719510","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41418","19.721405","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41419","19.721790","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41420","19.721797","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41421","19.723146","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41422","19.726479","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41423","19.726489","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41424","19.727465","172.30.1.205","172.30.1.104","TCP","74","46216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922953 TSecr=0 WS=128" +"41425","19.727811","172.30.1.104","172.30.1.205","TCP","66","135 > 46216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41426","19.727822","172.30.1.205","172.30.1.104","TCP","54","46216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41427","19.728178","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41428","19.728464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41429","19.728473","172.30.1.205","172.30.1.104","TCP","54","46216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41430","19.730673","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41431","19.731128","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41432","19.731134","172.30.1.205","172.30.1.104","TCP","54","46216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41433","19.731981","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41434","19.732031","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41435","19.732069","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41436","19.732103","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41437","19.732134","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41438","19.732167","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41439","19.732195","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41440","19.732227","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41441","19.732250","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41442","19.732262","172.30.1.104","172.30.1.205","TCP","54","49671 > 38810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41443","19.732300","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41444","19.732332","172.30.1.104","172.30.1.205","TCP","54","49671 > 38814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41445","19.732341","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41446","19.732351","172.30.1.104","172.30.1.205","TCP","54","49671 > 38818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41447","19.732371","172.30.1.104","172.30.1.205","TCP","54","49671 > 38810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41448","19.732378","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41449","19.732393","172.30.1.104","172.30.1.205","TCP","54","49671 > 38822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41450","19.732458","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41451","19.732494","172.30.1.104","172.30.1.205","TCP","54","49671 > 38826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41452","19.732512","172.30.1.104","172.30.1.205","TCP","54","49671 > 38830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41453","19.732534","172.30.1.104","172.30.1.205","TCP","54","49671 > 38826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41454","19.732539","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41455","19.732553","172.30.1.104","172.30.1.205","TCP","54","49671 > 38822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41456","19.732555","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41457","19.732572","172.30.1.104","172.30.1.205","TCP","54","49671 > 38830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41458","19.732575","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41459","19.732592","172.30.1.104","172.30.1.205","TCP","54","49671 > 38814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41460","19.732594","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41461","19.732611","172.30.1.104","172.30.1.205","TCP","54","49671 > 38818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41462","19.732613","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41463","19.732630","172.30.1.104","172.30.1.205","TCP","54","49671 > 38834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41464","19.732788","172.30.1.104","172.30.1.205","TCP","54","49671 > 38838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41465","19.732804","172.30.1.104","172.30.1.205","TCP","54","49671 > 38842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41466","19.732818","172.30.1.104","172.30.1.205","TCP","54","49671 > 38834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41467","19.732822","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41468","19.732839","172.30.1.104","172.30.1.205","TCP","54","49671 > 38838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41469","19.732841","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41470","19.732860","172.30.1.104","172.30.1.205","TCP","54","49671 > 38842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41471","19.732863","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41472","19.732880","172.30.1.104","172.30.1.205","TCP","54","49671 > 38846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41473","19.732965","172.30.1.104","172.30.1.205","TCP","54","49671 > 38850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41474","19.732985","172.30.1.104","172.30.1.205","TCP","54","49671 > 38846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41475","19.732989","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41476","19.733005","172.30.1.104","172.30.1.205","TCP","54","49671 > 38850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41477","19.733007","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41478","19.733027","172.30.1.104","172.30.1.205","TCP","54","49671 > 38806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41479","19.733101","172.30.1.104","172.30.1.205","TCP","54","49671 > 38806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41480","19.733105","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41481","19.734280","172.30.1.205","172.30.1.104","TCP","54","46216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41482","19.734394","172.30.1.205","172.30.1.104","TCP","74","38854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922960 TSecr=0 WS=128" +"41483","19.734525","172.30.1.104","172.30.1.205","TCP","54","135 > 46216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41484","19.734535","172.30.1.104","172.30.1.205","TCP","54","135 > 46216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41485","19.734547","172.30.1.205","172.30.1.104","TCP","54","46216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41486","19.734669","172.30.1.104","172.30.1.205","TCP","66","49671 > 38854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41487","19.734677","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41488","19.735063","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41489","19.735340","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41490","19.735349","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41491","19.737296","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41492","19.737769","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41493","19.737775","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41494","19.739140","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41495","19.742400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41496","19.742410","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41497","19.743381","172.30.1.205","172.30.1.104","TCP","74","46220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922969 TSecr=0 WS=128" +"41498","19.743698","172.30.1.104","172.30.1.205","TCP","66","135 > 46220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41499","19.743708","172.30.1.205","172.30.1.104","TCP","54","46220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41500","19.744068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41501","19.744371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41502","19.744380","172.30.1.205","172.30.1.104","TCP","54","46220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41503","19.746584","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41504","19.747076","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41505","19.747082","172.30.1.205","172.30.1.104","TCP","54","46220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41506","19.748902","172.30.1.205","172.30.1.104","TCP","54","46220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41507","19.749012","172.30.1.205","172.30.1.104","TCP","74","38858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922975 TSecr=0 WS=128" +"41508","19.749160","172.30.1.104","172.30.1.205","TCP","54","135 > 46220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41509","19.749198","172.30.1.104","172.30.1.205","TCP","54","135 > 46220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41510","19.749204","172.30.1.205","172.30.1.104","TCP","54","46220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41511","19.749284","172.30.1.104","172.30.1.205","TCP","66","49671 > 38858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41512","19.749292","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41513","19.749658","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41514","19.749921","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41515","19.749930","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41516","19.751791","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41517","19.752142","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41518","19.752148","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41519","19.753517","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41520","19.756762","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41521","19.756772","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41522","19.757737","172.30.1.205","172.30.1.104","TCP","74","46224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922984 TSecr=0 WS=128" +"41523","19.758032","172.30.1.104","172.30.1.205","TCP","66","135 > 46224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41524","19.758043","172.30.1.205","172.30.1.104","TCP","54","46224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41525","19.758391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41526","19.758735","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41527","19.758744","172.30.1.205","172.30.1.104","TCP","54","46224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41528","19.760982","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41529","19.761396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41530","19.761403","172.30.1.205","172.30.1.104","TCP","54","46224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41531","19.763224","172.30.1.205","172.30.1.104","TCP","54","46224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41532","19.763337","172.30.1.205","172.30.1.104","TCP","74","38862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922989 TSecr=0 WS=128" +"41533","19.763491","172.30.1.104","172.30.1.205","TCP","54","135 > 46224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41534","19.763622","172.30.1.104","172.30.1.205","TCP","66","49671 > 38862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41535","19.763632","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41536","19.763975","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41537","19.764313","172.30.1.104","172.30.1.205","TCP","54","135 > 46224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41538","19.764320","172.30.1.205","172.30.1.104","TCP","54","46224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41539","19.764429","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41540","19.764437","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41541","19.766351","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41542","19.766759","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41543","19.766765","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41544","19.768114","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41545","19.771357","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41546","19.771366","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41547","19.772309","172.30.1.205","172.30.1.104","TCP","74","46228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922998 TSecr=0 WS=128" +"41548","19.772601","172.30.1.104","172.30.1.205","TCP","66","135 > 46228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41549","19.772612","172.30.1.205","172.30.1.104","TCP","54","46228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41550","19.773002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41551","19.773268","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41552","19.773277","172.30.1.205","172.30.1.104","TCP","54","46228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41553","19.775508","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41554","19.775990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41555","19.775997","172.30.1.205","172.30.1.104","TCP","54","46228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41556","19.777849","172.30.1.205","172.30.1.104","TCP","54","46228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41557","19.777960","172.30.1.205","172.30.1.104","TCP","74","38866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923004 TSecr=0 WS=128" +"41558","19.778128","172.30.1.104","172.30.1.205","TCP","54","135 > 46228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41559","19.778232","172.30.1.104","172.30.1.205","TCP","66","49671 > 38866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41560","19.778241","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41561","19.778586","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41562","19.781837","172.30.1.104","172.30.1.205","TCP","54","135 > 46228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41563","19.781843","172.30.1.205","172.30.1.104","TCP","54","46228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41564","19.781958","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41565","19.781965","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41566","19.783890","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41567","19.784313","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41568","19.784320","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41569","19.785704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41570","19.789998","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41571","19.790009","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41572","19.790961","172.30.1.205","172.30.1.104","TCP","74","46232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923017 TSecr=0 WS=128" +"41573","19.791574","172.30.1.104","172.30.1.205","TCP","66","135 > 46232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41574","19.791586","172.30.1.205","172.30.1.104","TCP","54","46232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41575","19.791943","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41576","19.792243","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41577","19.792251","172.30.1.205","172.30.1.104","TCP","54","46232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41578","19.794456","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41579","19.794890","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41580","19.794896","172.30.1.205","172.30.1.104","TCP","54","46232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41581","19.796742","172.30.1.205","172.30.1.104","TCP","54","46232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41582","19.796901","172.30.1.205","172.30.1.104","TCP","74","38870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923023 TSecr=0 WS=128" +"41583","19.797050","172.30.1.104","172.30.1.205","TCP","54","135 > 46232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41584","19.797071","172.30.1.104","172.30.1.205","TCP","54","135 > 46232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41585","19.797076","172.30.1.205","172.30.1.104","TCP","54","46232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41586","19.797220","172.30.1.104","172.30.1.205","TCP","66","49671 > 38870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41587","19.797229","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41588","19.797575","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41589","19.797933","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41590","19.797941","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41591","19.799807","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41592","19.800605","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41593","19.800612","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41594","19.801984","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41595","19.805667","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41596","19.805677","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41597","19.806628","172.30.1.205","172.30.1.104","TCP","74","46236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923033 TSecr=0 WS=128" +"41598","19.806967","172.30.1.104","172.30.1.205","TCP","66","135 > 46236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41599","19.806979","172.30.1.205","172.30.1.104","TCP","54","46236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41600","19.807342","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41601","19.809005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41602","19.809014","172.30.1.205","172.30.1.104","TCP","54","46236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41603","19.811205","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41604","19.811715","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41605","19.811729","172.30.1.205","172.30.1.104","TCP","54","46236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41606","19.813651","172.30.1.205","172.30.1.104","TCP","54","46236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41607","19.813775","172.30.1.205","172.30.1.104","TCP","74","38874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923040 TSecr=0 WS=128" +"41608","19.813926","172.30.1.104","172.30.1.205","TCP","54","135 > 46236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41609","19.814047","172.30.1.104","172.30.1.205","TCP","66","49671 > 38874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41610","19.814056","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41611","19.814412","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41612","19.814651","172.30.1.104","172.30.1.205","TCP","54","135 > 46236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41613","19.814657","172.30.1.205","172.30.1.104","TCP","54","46236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41614","19.814727","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41615","19.814733","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41616","19.816599","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41617","19.816996","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41618","19.817009","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41619","19.818631","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41620","19.822552","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41621","19.822562","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41622","19.823510","172.30.1.205","172.30.1.104","TCP","74","46240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923049 TSecr=0 WS=128" +"41623","19.823835","172.30.1.104","172.30.1.205","TCP","66","135 > 46240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41624","19.823846","172.30.1.205","172.30.1.104","TCP","54","46240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41625","19.824196","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41626","19.824604","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41627","19.824613","172.30.1.205","172.30.1.104","TCP","54","46240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41628","19.826828","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41629","19.827215","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41630","19.827222","172.30.1.205","172.30.1.104","TCP","54","46240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41631","19.829062","172.30.1.205","172.30.1.104","TCP","54","46240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41632","19.829173","172.30.1.205","172.30.1.104","TCP","74","38878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923055 TSecr=0 WS=128" +"41633","19.829374","172.30.1.104","172.30.1.205","TCP","54","135 > 46240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41634","19.829383","172.30.1.104","172.30.1.205","TCP","54","135 > 46240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41635","19.829388","172.30.1.205","172.30.1.104","TCP","54","46240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41636","19.829468","172.30.1.104","172.30.1.205","TCP","66","49671 > 38878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41637","19.829476","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41638","19.829828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41639","19.830136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41640","19.830146","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41641","19.832030","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41642","19.832395","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41643","19.832402","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41644","19.833784","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41645","19.838129","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41646","19.838139","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41647","19.839088","172.30.1.205","172.30.1.104","TCP","74","46244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923065 TSecr=0 WS=128" +"41648","19.839411","172.30.1.104","172.30.1.205","TCP","66","135 > 46244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41649","19.839422","172.30.1.205","172.30.1.104","TCP","54","46244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41650","19.839773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41651","19.840051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41652","19.840060","172.30.1.205","172.30.1.104","TCP","54","46244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41653","19.842287","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41654","19.842678","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41655","19.842685","172.30.1.205","172.30.1.104","TCP","54","46244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41656","19.844518","172.30.1.205","172.30.1.104","TCP","54","46244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41657","19.844630","172.30.1.205","172.30.1.104","TCP","74","38882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923071 TSecr=0 WS=128" +"41658","19.844788","172.30.1.104","172.30.1.205","TCP","54","135 > 46244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41659","19.844838","172.30.1.104","172.30.1.205","TCP","54","135 > 46244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41660","19.844845","172.30.1.205","172.30.1.104","TCP","54","46244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41661","19.844917","172.30.1.104","172.30.1.205","TCP","66","49671 > 38882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41662","19.844924","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41663","19.845276","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41664","19.845588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41665","19.845597","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41666","19.847478","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41667","19.847838","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41668","19.847845","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41669","19.849233","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41670","19.852525","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41671","19.852534","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41672","19.853492","172.30.1.205","172.30.1.104","TCP","74","46248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923079 TSecr=0 WS=128" +"41673","19.853805","172.30.1.104","172.30.1.205","TCP","66","135 > 46248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41674","19.853815","172.30.1.205","172.30.1.104","TCP","54","46248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41675","19.854168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41676","19.854478","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41677","19.854487","172.30.1.205","172.30.1.104","TCP","54","46248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41678","19.856696","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41679","19.857100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41680","19.857107","172.30.1.205","172.30.1.104","TCP","54","46248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41681","19.858918","172.30.1.205","172.30.1.104","TCP","54","46248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41682","19.859030","172.30.1.205","172.30.1.104","TCP","74","38886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923085 TSecr=0 WS=128" +"41683","19.859197","172.30.1.104","172.30.1.205","TCP","54","135 > 46248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41684","19.859208","172.30.1.104","172.30.1.205","TCP","54","135 > 46248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41685","19.859214","172.30.1.205","172.30.1.104","TCP","54","46248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41686","19.859357","172.30.1.104","172.30.1.205","TCP","66","49671 > 38886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41687","19.859366","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41688","19.859734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41689","19.860017","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41690","19.860026","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41691","19.861929","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41692","19.862287","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41693","19.862294","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41694","19.863648","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41695","19.866927","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41696","19.866938","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41697","19.867897","172.30.1.205","172.30.1.104","TCP","74","46252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923094 TSecr=0 WS=128" +"41698","19.868246","172.30.1.104","172.30.1.205","TCP","66","135 > 46252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41699","19.868257","172.30.1.205","172.30.1.104","TCP","54","46252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41700","19.868609","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41701","19.868970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41702","19.868980","172.30.1.205","172.30.1.104","TCP","54","46252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41703","19.871180","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41704","19.871674","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41705","19.871681","172.30.1.205","172.30.1.104","TCP","54","46252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41706","19.873524","172.30.1.205","172.30.1.104","TCP","54","46252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41707","19.873638","172.30.1.205","172.30.1.104","TCP","74","38890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923100 TSecr=0 WS=128" +"41708","19.873810","172.30.1.104","172.30.1.205","TCP","54","135 > 46252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41709","19.873831","172.30.1.104","172.30.1.205","TCP","54","135 > 46252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41710","19.873837","172.30.1.205","172.30.1.104","TCP","54","46252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41711","19.873943","172.30.1.104","172.30.1.205","TCP","66","49671 > 38890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41712","19.873951","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41713","19.874296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41714","19.874585","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41715","19.874594","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41716","19.876488","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41717","19.876872","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41718","19.876878","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41719","19.878248","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41720","19.881673","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41721","19.881692","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41722","19.882772","172.30.1.205","172.30.1.104","TCP","74","46256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923109 TSecr=0 WS=128" +"41723","19.883073","172.30.1.104","172.30.1.205","TCP","66","135 > 46256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41724","19.883084","172.30.1.205","172.30.1.104","TCP","54","46256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41725","19.883436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41726","19.883773","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41727","19.883784","172.30.1.205","172.30.1.104","TCP","54","46256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41728","19.886026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41729","19.886447","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41730","19.886454","172.30.1.205","172.30.1.104","TCP","54","46256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41731","19.888265","172.30.1.205","172.30.1.104","TCP","54","46256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41732","19.888381","172.30.1.205","172.30.1.104","TCP","74","38894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923114 TSecr=0 WS=128" +"41733","19.888516","172.30.1.104","172.30.1.205","TCP","54","135 > 46256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41734","19.888531","172.30.1.104","172.30.1.205","TCP","54","135 > 46256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41735","19.888536","172.30.1.205","172.30.1.104","TCP","54","46256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41736","19.888697","172.30.1.104","172.30.1.205","TCP","66","49671 > 38894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41737","19.888709","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41738","19.889110","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41739","19.889399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41740","19.889408","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41741","19.891289","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41742","19.891713","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41743","19.891725","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41744","19.893292","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41745","19.896717","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41746","19.896739","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41747","19.897905","172.30.1.205","172.30.1.104","TCP","74","46260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923124 TSecr=0 WS=128" +"41748","19.898251","172.30.1.104","172.30.1.205","TCP","66","135 > 46260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41749","19.898263","172.30.1.205","172.30.1.104","TCP","54","46260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41750","19.898624","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41751","19.898947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41752","19.898961","172.30.1.205","172.30.1.104","TCP","54","46260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41753","19.901267","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41754","19.901719","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41755","19.901726","172.30.1.205","172.30.1.104","TCP","54","46260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41756","19.903543","172.30.1.205","172.30.1.104","TCP","54","46260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41757","19.903662","172.30.1.205","172.30.1.104","TCP","74","38898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923130 TSecr=0 WS=128" +"41758","19.903800","172.30.1.104","172.30.1.205","TCP","54","135 > 46260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41759","19.903816","172.30.1.104","172.30.1.205","TCP","54","135 > 46260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41760","19.903821","172.30.1.205","172.30.1.104","TCP","54","46260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41761","19.903986","172.30.1.104","172.30.1.205","TCP","66","49671 > 38898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41762","19.903994","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41763","19.904343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41764","19.904692","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41765","19.904701","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41766","19.906604","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41767","19.906985","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41768","19.906991","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41769","19.908328","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41770","19.912164","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41771","19.912175","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41772","19.913165","172.30.1.205","172.30.1.104","TCP","74","46264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923139 TSecr=0 WS=128" +"41773","19.913481","172.30.1.104","172.30.1.205","TCP","66","135 > 46264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41774","19.913493","172.30.1.205","172.30.1.104","TCP","54","46264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41775","19.913853","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41776","19.914143","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41777","19.914152","172.30.1.205","172.30.1.104","TCP","54","46264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41778","19.916413","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41779","19.916827","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41780","19.916834","172.30.1.205","172.30.1.104","TCP","54","46264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41781","19.917678","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41782","19.917726","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41783","19.917762","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41784","19.917791","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41785","19.917820","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41786","19.917848","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41787","19.917879","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41788","19.917907","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41789","19.917933","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41790","19.917960","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41791","19.917981","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41792","19.918002","172.30.1.104","172.30.1.205","TCP","54","49671 > 38858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41793","19.918073","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41794","19.918334","172.30.1.104","172.30.1.205","TCP","54","49671 > 38862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41795","19.918350","172.30.1.104","172.30.1.205","TCP","54","49671 > 38858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41796","19.918356","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41797","19.918371","172.30.1.104","172.30.1.205","TCP","54","49671 > 38862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41798","19.918374","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41799","19.918394","172.30.1.104","172.30.1.205","TCP","54","49671 > 38866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41800","19.918415","172.30.1.104","172.30.1.205","TCP","54","49671 > 38870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41801","19.918435","172.30.1.104","172.30.1.205","TCP","54","49671 > 38866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41802","19.918439","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41803","19.918455","172.30.1.104","172.30.1.205","TCP","54","49671 > 38874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41804","19.918475","172.30.1.104","172.30.1.205","TCP","54","49671 > 38878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41805","19.918495","172.30.1.104","172.30.1.205","TCP","54","49671 > 38870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41806","19.918499","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41807","19.918515","172.30.1.104","172.30.1.205","TCP","54","49671 > 38882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41808","19.918536","172.30.1.104","172.30.1.205","TCP","54","49671 > 38882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41809","19.918539","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41810","19.918555","172.30.1.104","172.30.1.205","TCP","54","49671 > 38886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41811","19.918574","172.30.1.104","172.30.1.205","TCP","54","49671 > 38890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41812","19.918595","172.30.1.104","172.30.1.205","TCP","54","49671 > 38894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41813","19.918617","172.30.1.104","172.30.1.205","TCP","54","49671 > 38898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41814","19.918746","172.30.1.104","172.30.1.205","TCP","54","49671 > 38854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41815","19.918765","172.30.1.104","172.30.1.205","TCP","54","49671 > 38854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41816","19.918770","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41817","19.918786","172.30.1.104","172.30.1.205","TCP","54","49671 > 38898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41818","19.918789","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41819","19.918809","172.30.1.104","172.30.1.205","TCP","54","49671 > 38894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41820","19.918815","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41821","19.918829","172.30.1.104","172.30.1.205","TCP","54","49671 > 38890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41822","19.918832","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41823","19.918850","172.30.1.104","172.30.1.205","TCP","54","49671 > 38886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41824","19.918853","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41825","19.918907","172.30.1.104","172.30.1.205","TCP","54","49671 > 38874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41826","19.918910","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41827","19.918912","172.30.1.104","172.30.1.205","TCP","54","49671 > 38878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"41828","19.918913","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"41829","19.919609","172.30.1.205","172.30.1.104","TCP","54","46264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41830","19.919718","172.30.1.205","172.30.1.104","TCP","74","38902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923146 TSecr=0 WS=128" +"41831","19.919873","172.30.1.104","172.30.1.205","TCP","54","135 > 46264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41832","19.919924","172.30.1.104","172.30.1.205","TCP","54","135 > 46264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41833","19.919929","172.30.1.205","172.30.1.104","TCP","54","46264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41834","19.920027","172.30.1.104","172.30.1.205","TCP","66","49671 > 38902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41835","19.920035","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41836","19.920391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41837","19.920691","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41838","19.920700","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41839","19.922583","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41840","19.922949","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41841","19.922955","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41842","19.924350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41843","19.927554","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41844","19.927565","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41845","19.928507","172.30.1.205","172.30.1.104","TCP","74","46268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923154 TSecr=0 WS=128" +"41846","19.928849","172.30.1.104","172.30.1.205","TCP","66","135 > 46268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41847","19.928860","172.30.1.205","172.30.1.104","TCP","54","46268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41848","19.929221","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41849","19.929614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41850","19.929622","172.30.1.205","172.30.1.104","TCP","54","46268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41851","19.931800","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41852","19.932219","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41853","19.932226","172.30.1.205","172.30.1.104","TCP","54","46268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41854","19.934069","172.30.1.205","172.30.1.104","TCP","54","46268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41855","19.934179","172.30.1.205","172.30.1.104","TCP","74","38906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923160 TSecr=0 WS=128" +"41856","19.934347","172.30.1.104","172.30.1.205","TCP","54","135 > 46268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41857","19.934372","172.30.1.104","172.30.1.205","TCP","54","135 > 46268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41858","19.934378","172.30.1.205","172.30.1.104","TCP","54","46268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41859","19.934465","172.30.1.104","172.30.1.205","TCP","66","49671 > 38906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41860","19.934473","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41861","19.934821","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41862","19.935160","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41863","19.935169","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41864","19.937074","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41865","19.937454","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41866","19.937460","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41867","19.938804","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41868","19.941983","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41869","19.941992","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41870","19.942928","172.30.1.205","172.30.1.104","TCP","74","46272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923169 TSecr=0 WS=128" +"41871","19.943243","172.30.1.104","172.30.1.205","TCP","66","135 > 46272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41872","19.943253","172.30.1.205","172.30.1.104","TCP","54","46272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41873","19.943597","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41874","19.943934","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41875","19.943949","172.30.1.205","172.30.1.104","TCP","54","46272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41876","19.946304","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41877","19.946726","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41878","19.946734","172.30.1.205","172.30.1.104","TCP","54","46272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41879","19.948577","172.30.1.205","172.30.1.104","TCP","54","46272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41880","19.948692","172.30.1.205","172.30.1.104","TCP","74","38910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923175 TSecr=0 WS=128" +"41881","19.948915","172.30.1.104","172.30.1.205","TCP","54","135 > 46272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41882","19.948942","172.30.1.104","172.30.1.205","TCP","54","135 > 46272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41883","19.948948","172.30.1.205","172.30.1.104","TCP","54","46272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41884","19.949029","172.30.1.104","172.30.1.205","TCP","66","49671 > 38910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41885","19.949037","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41886","19.949394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41887","19.949702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41888","19.949711","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41889","19.951585","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41890","19.953151","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41891","19.953159","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41892","19.954550","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41893","19.957861","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41894","19.957880","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41895","19.958995","172.30.1.205","172.30.1.104","TCP","74","46276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923185 TSecr=0 WS=128" +"41896","19.959311","172.30.1.104","172.30.1.205","TCP","66","135 > 46276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41897","19.959323","172.30.1.205","172.30.1.104","TCP","54","46276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41898","19.959684","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41899","19.959970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41900","19.959980","172.30.1.205","172.30.1.104","TCP","54","46276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41901","19.962202","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41902","19.962620","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41903","19.962627","172.30.1.205","172.30.1.104","TCP","54","46276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41904","19.964446","172.30.1.205","172.30.1.104","TCP","54","46276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41905","19.964565","172.30.1.205","172.30.1.104","TCP","74","38914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923190 TSecr=0 WS=128" +"41906","19.964720","172.30.1.104","172.30.1.205","TCP","54","135 > 46276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41907","19.964789","172.30.1.104","172.30.1.205","TCP","54","135 > 46276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41908","19.964795","172.30.1.205","172.30.1.104","TCP","54","46276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41909","19.964894","172.30.1.104","172.30.1.205","TCP","66","49671 > 38914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41910","19.964902","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41911","19.965249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41912","19.965545","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41913","19.965555","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41914","19.967432","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41915","19.967843","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41916","19.967850","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41917","19.969258","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41918","19.972560","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41919","19.972569","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41920","19.973514","172.30.1.205","172.30.1.104","TCP","74","46280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923199 TSecr=0 WS=128" +"41921","19.973804","172.30.1.104","172.30.1.205","TCP","66","135 > 46280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41922","19.973815","172.30.1.205","172.30.1.104","TCP","54","46280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41923","19.974166","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41924","19.974474","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41925","19.974484","172.30.1.205","172.30.1.104","TCP","54","46280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41926","19.976671","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41927","19.977084","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41928","19.977092","172.30.1.205","172.30.1.104","TCP","54","46280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41929","19.979140","172.30.1.205","172.30.1.104","TCP","54","46280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41930","19.979251","172.30.1.205","172.30.1.104","TCP","74","38918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923205 TSecr=0 WS=128" +"41931","19.979445","172.30.1.104","172.30.1.205","TCP","54","135 > 46280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41932","19.979454","172.30.1.104","172.30.1.205","TCP","54","135 > 46280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41933","19.979459","172.30.1.205","172.30.1.104","TCP","54","46280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41934","19.979577","172.30.1.104","172.30.1.205","TCP","66","49671 > 38918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41935","19.979585","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41936","19.980001","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41937","19.980288","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41938","19.980296","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41939","19.982406","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41940","19.982781","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41941","19.982787","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41942","19.984306","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41943","19.987538","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41944","19.987549","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41945","19.988522","172.30.1.205","172.30.1.104","TCP","74","46284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923214 TSecr=0 WS=128" +"41946","19.988813","172.30.1.104","172.30.1.205","TCP","66","135 > 46284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41947","19.988836","172.30.1.205","172.30.1.104","TCP","54","46284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41948","19.989676","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41949","19.989992","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41950","19.990006","172.30.1.205","172.30.1.104","TCP","54","46284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41951","19.992352","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41952","19.992763","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41953","19.992770","172.30.1.205","172.30.1.104","TCP","54","46284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41954","19.994607","172.30.1.205","172.30.1.104","TCP","54","46284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41955","19.994752","172.30.1.205","172.30.1.104","TCP","74","38922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923221 TSecr=0 WS=128" +"41956","19.994901","172.30.1.104","172.30.1.205","TCP","54","135 > 46284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41957","19.994910","172.30.1.104","172.30.1.205","TCP","54","135 > 46284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41958","19.994916","172.30.1.205","172.30.1.104","TCP","54","46284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41959","19.995016","172.30.1.104","172.30.1.205","TCP","66","49671 > 38922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41960","19.995025","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41961","19.995372","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41962","19.996036","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41963","19.996051","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41964","19.998189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41965","19.998564","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41966","19.998570","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41967","19.999951","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41968","20.003236","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41969","20.003248","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41970","20.004232","172.30.1.205","172.30.1.104","TCP","74","46288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923230 TSecr=0 WS=128" +"41971","20.004564","172.30.1.104","172.30.1.205","TCP","66","135 > 46288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41972","20.004575","172.30.1.205","172.30.1.104","TCP","54","46288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41973","20.004952","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41974","20.005282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41975","20.005291","172.30.1.205","172.30.1.104","TCP","54","46288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41976","20.007500","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"41977","20.007901","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"41978","20.007908","172.30.1.205","172.30.1.104","TCP","54","46288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41979","20.009777","172.30.1.205","172.30.1.104","TCP","54","46288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"41980","20.009903","172.30.1.205","172.30.1.104","TCP","74","38926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923236 TSecr=0 WS=128" +"41981","20.010054","172.30.1.104","172.30.1.205","TCP","54","135 > 46288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41982","20.010067","172.30.1.104","172.30.1.205","TCP","54","135 > 46288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"41983","20.010074","172.30.1.205","172.30.1.104","TCP","54","46288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"41984","20.010196","172.30.1.104","172.30.1.205","TCP","66","49671 > 38926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41985","20.010208","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41986","20.010566","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"41987","20.010838","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"41988","20.010849","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"41989","20.012815","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"41990","20.013186","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"41991","20.013194","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"41992","20.014588","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"41993","20.017933","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"41994","20.017948","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"41995","20.019052","172.30.1.205","172.30.1.104","TCP","74","46292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923245 TSecr=0 WS=128" +"41996","20.019445","172.30.1.104","172.30.1.205","TCP","66","135 > 46292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"41997","20.019458","172.30.1.205","172.30.1.104","TCP","54","46292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"41998","20.019819","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"41999","20.020115","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42000","20.020125","172.30.1.205","172.30.1.104","TCP","54","46292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42001","20.022421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42002","20.022829","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42003","20.022835","172.30.1.205","172.30.1.104","TCP","54","46292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42004","20.024683","172.30.1.205","172.30.1.104","TCP","54","46292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42005","20.024830","172.30.1.205","172.30.1.104","TCP","74","38930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923251 TSecr=0 WS=128" +"42006","20.025037","172.30.1.104","172.30.1.205","TCP","54","135 > 46292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42007","20.025048","172.30.1.104","172.30.1.205","TCP","54","135 > 46292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42008","20.025056","172.30.1.205","172.30.1.104","TCP","54","46292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42009","20.025113","172.30.1.104","172.30.1.205","TCP","66","49671 > 38930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42010","20.025121","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42011","20.025464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42012","20.025740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42013","20.025749","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42014","20.027619","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42015","20.028003","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42016","20.028009","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42017","20.029410","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42018","20.032588","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42019","20.032600","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42020","20.033645","172.30.1.205","172.30.1.104","TCP","74","46296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923260 TSecr=0 WS=128" +"42021","20.034000","172.30.1.104","172.30.1.205","TCP","66","135 > 46296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42022","20.034012","172.30.1.205","172.30.1.104","TCP","54","46296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42023","20.034367","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42024","20.034676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42025","20.034686","172.30.1.205","172.30.1.104","TCP","54","46296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42026","20.036917","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42027","20.037340","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42028","20.037346","172.30.1.205","172.30.1.104","TCP","54","46296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42029","20.039168","172.30.1.205","172.30.1.104","TCP","54","46296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42030","20.039291","172.30.1.205","172.30.1.104","TCP","74","38934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923265 TSecr=0 WS=128" +"42031","20.039426","172.30.1.104","172.30.1.205","TCP","54","135 > 46296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42032","20.039458","172.30.1.104","172.30.1.205","TCP","54","135 > 46296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42033","20.039465","172.30.1.205","172.30.1.104","TCP","54","46296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42034","20.039603","172.30.1.104","172.30.1.205","TCP","66","49671 > 38934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42035","20.039612","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42036","20.039974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42037","20.040277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42038","20.040285","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42039","20.042197","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42040","20.042599","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42041","20.042606","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42042","20.043965","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42043","20.047281","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42044","20.047293","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42045","20.048320","172.30.1.205","172.30.1.104","TCP","74","46300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923274 TSecr=0 WS=128" +"42046","20.048640","172.30.1.104","172.30.1.205","TCP","66","135 > 46300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42047","20.048652","172.30.1.205","172.30.1.104","TCP","54","46300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42048","20.049046","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42049","20.049343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42050","20.049353","172.30.1.205","172.30.1.104","TCP","54","46300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42051","20.051566","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42052","20.052008","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42053","20.052015","172.30.1.205","172.30.1.104","TCP","54","46300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42054","20.053868","172.30.1.205","172.30.1.104","TCP","54","46300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42055","20.053984","172.30.1.205","172.30.1.104","TCP","74","38938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923280 TSecr=0 WS=128" +"42056","20.054145","172.30.1.104","172.30.1.205","TCP","54","135 > 46300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42057","20.054185","172.30.1.104","172.30.1.205","TCP","54","135 > 46300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42058","20.054192","172.30.1.205","172.30.1.104","TCP","54","46300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42059","20.054291","172.30.1.104","172.30.1.205","TCP","66","49671 > 38938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42060","20.054300","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42061","20.054645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42062","20.054956","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42063","20.054965","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42064","20.056874","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42065","20.057245","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42066","20.057251","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42067","20.058602","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42068","20.062062","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42069","20.062072","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42070","20.063061","172.30.1.205","172.30.1.104","TCP","74","46304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923289 TSecr=0 WS=128" +"42071","20.063380","172.30.1.104","172.30.1.205","TCP","66","135 > 46304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42072","20.063391","172.30.1.205","172.30.1.104","TCP","54","46304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42073","20.063743","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42074","20.064042","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42075","20.064051","172.30.1.205","172.30.1.104","TCP","54","46304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42076","20.066282","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42077","20.066733","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42078","20.066740","172.30.1.205","172.30.1.104","TCP","54","46304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42079","20.068559","172.30.1.205","172.30.1.104","TCP","54","46304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42080","20.068672","172.30.1.205","172.30.1.104","TCP","74","38942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923295 TSecr=0 WS=128" +"42081","20.068809","172.30.1.104","172.30.1.205","TCP","54","135 > 46304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42082","20.068821","172.30.1.104","172.30.1.205","TCP","54","135 > 46304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42083","20.068828","172.30.1.205","172.30.1.104","TCP","54","46304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42084","20.068989","172.30.1.104","172.30.1.205","TCP","66","49671 > 38942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42085","20.068997","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42086","20.069381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42087","20.070732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42088","20.070742","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42089","20.072629","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42090","20.073004","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42091","20.073011","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42092","20.074386","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42093","20.077704","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42094","20.077713","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42095","20.078702","172.30.1.205","172.30.1.104","TCP","74","46308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923305 TSecr=0 WS=128" +"42096","20.079017","172.30.1.104","172.30.1.205","TCP","66","135 > 46308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42097","20.079028","172.30.1.205","172.30.1.104","TCP","54","46308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42098","20.079386","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42099","20.079717","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42100","20.079727","172.30.1.205","172.30.1.104","TCP","54","46308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42101","20.081948","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42102","20.082371","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42103","20.082379","172.30.1.205","172.30.1.104","TCP","54","46308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42104","20.084228","172.30.1.205","172.30.1.104","TCP","54","46308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42105","20.084348","172.30.1.205","172.30.1.104","TCP","74","38946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923310 TSecr=0 WS=128" +"42106","20.084558","172.30.1.104","172.30.1.205","TCP","54","135 > 46308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42107","20.084570","172.30.1.104","172.30.1.205","TCP","54","135 > 46308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42108","20.084576","172.30.1.205","172.30.1.104","TCP","54","46308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42109","20.084655","172.30.1.104","172.30.1.205","TCP","66","49671 > 38946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42110","20.084664","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42111","20.085042","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42112","20.085345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42113","20.085360","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42114","20.087351","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42115","20.087785","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42116","20.087792","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42117","20.089202","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42118","20.092589","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42119","20.092601","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42120","20.093629","172.30.1.205","172.30.1.104","TCP","74","46312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923320 TSecr=0 WS=128" +"42121","20.093948","172.30.1.104","172.30.1.205","TCP","66","135 > 46312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42122","20.093960","172.30.1.205","172.30.1.104","TCP","54","46312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42123","20.094330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42124","20.094652","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42125","20.094663","172.30.1.205","172.30.1.104","TCP","54","46312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42126","20.096896","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42127","20.097301","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42128","20.097308","172.30.1.205","172.30.1.104","TCP","54","46312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42129","20.098168","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42130","20.098218","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42131","20.098255","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42132","20.098279","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42133","20.098308","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42134","20.098335","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42135","20.098362","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42136","20.098392","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42137","20.098415","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42138","20.098442","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42139","20.098464","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42140","20.098494","172.30.1.104","172.30.1.205","TCP","54","49671 > 38906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42141","20.098563","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42142","20.098697","172.30.1.104","172.30.1.205","TCP","54","49671 > 38910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42143","20.098715","172.30.1.104","172.30.1.205","TCP","54","49671 > 38906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42144","20.098722","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42145","20.098737","172.30.1.104","172.30.1.205","TCP","54","49671 > 38910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42146","20.098740","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42147","20.098765","172.30.1.104","172.30.1.205","TCP","54","49671 > 38914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42148","20.098785","172.30.1.104","172.30.1.205","TCP","54","49671 > 38918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42149","20.098804","172.30.1.104","172.30.1.205","TCP","54","49671 > 38922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42150","20.098825","172.30.1.104","172.30.1.205","TCP","54","49671 > 38914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42151","20.098829","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42152","20.098846","172.30.1.104","172.30.1.205","TCP","54","49671 > 38918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42153","20.098849","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42154","20.098867","172.30.1.104","172.30.1.205","TCP","54","49671 > 38922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42155","20.098870","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42156","20.099000","172.30.1.104","172.30.1.205","TCP","54","49671 > 38926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42157","20.099022","172.30.1.104","172.30.1.205","TCP","54","49671 > 38930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42158","20.099043","172.30.1.104","172.30.1.205","TCP","54","49671 > 38934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42159","20.099064","172.30.1.104","172.30.1.205","TCP","54","49671 > 38938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42160","20.099084","172.30.1.104","172.30.1.205","TCP","54","49671 > 38942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42161","20.099105","172.30.1.104","172.30.1.205","TCP","54","49671 > 38902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42162","20.099124","172.30.1.104","172.30.1.205","TCP","54","49671 > 38946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42163","20.099253","172.30.1.104","172.30.1.205","TCP","54","49671 > 38946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42164","20.099259","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42165","20.099267","172.30.1.104","172.30.1.205","TCP","54","49671 > 38902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42166","20.099270","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42167","20.099295","172.30.1.104","172.30.1.205","TCP","54","49671 > 38942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42168","20.099298","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42169","20.099314","172.30.1.104","172.30.1.205","TCP","54","49671 > 38938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42170","20.099316","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42171","20.099347","172.30.1.104","172.30.1.205","TCP","54","49671 > 38926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42172","20.099349","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42173","20.099351","172.30.1.104","172.30.1.205","TCP","54","49671 > 38930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42174","20.099353","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42175","20.099382","172.30.1.104","172.30.1.205","TCP","54","49671 > 38934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42176","20.099385","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42177","20.100124","172.30.1.205","172.30.1.104","TCP","54","46312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42178","20.100238","172.30.1.205","172.30.1.104","TCP","74","38950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923326 TSecr=0 WS=128" +"42179","20.100382","172.30.1.104","172.30.1.205","TCP","54","135 > 46312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42180","20.100392","172.30.1.104","172.30.1.205","TCP","54","135 > 46312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42181","20.100397","172.30.1.205","172.30.1.104","TCP","54","46312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42182","20.100520","172.30.1.104","172.30.1.205","TCP","66","49671 > 38950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42183","20.100528","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42184","20.100910","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42185","20.101205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42186","20.101214","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42187","20.103116","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42188","20.103487","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42189","20.103493","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42190","20.104888","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42191","20.108408","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42192","20.108419","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42193","20.109404","172.30.1.205","172.30.1.104","TCP","74","46316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923335 TSecr=0 WS=128" +"42194","20.109695","172.30.1.104","172.30.1.205","TCP","66","135 > 46316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42195","20.109706","172.30.1.205","172.30.1.104","TCP","54","46316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42196","20.110060","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42197","20.110408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42198","20.110417","172.30.1.205","172.30.1.104","TCP","54","46316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42199","20.112594","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42200","20.113011","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42201","20.113017","172.30.1.205","172.30.1.104","TCP","54","46316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42202","20.114832","172.30.1.205","172.30.1.104","TCP","54","46316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42203","20.114947","172.30.1.205","172.30.1.104","TCP","74","38954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923341 TSecr=0 WS=128" +"42204","20.115087","172.30.1.104","172.30.1.205","TCP","54","135 > 46316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42205","20.115098","172.30.1.104","172.30.1.205","TCP","54","135 > 46316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42206","20.115104","172.30.1.205","172.30.1.104","TCP","54","46316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42207","20.115238","172.30.1.104","172.30.1.205","TCP","66","49671 > 38954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42208","20.115246","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42209","20.115589","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42210","20.115889","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42211","20.115895","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42212","20.117795","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42213","20.118197","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42214","20.118203","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42215","20.119552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42216","20.122987","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42217","20.122997","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42218","20.123965","172.30.1.205","172.30.1.104","TCP","74","46320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923350 TSecr=0 WS=128" +"42219","20.124330","172.30.1.104","172.30.1.205","TCP","66","135 > 46320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42220","20.124342","172.30.1.205","172.30.1.104","TCP","54","46320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42221","20.124698","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42222","20.125037","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42223","20.125047","172.30.1.205","172.30.1.104","TCP","54","46320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42224","20.127255","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42225","20.127689","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42226","20.127695","172.30.1.205","172.30.1.104","TCP","54","46320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42227","20.129530","172.30.1.205","172.30.1.104","TCP","54","46320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42228","20.129642","172.30.1.205","172.30.1.104","TCP","74","38958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923356 TSecr=0 WS=128" +"42229","20.129813","172.30.1.104","172.30.1.205","TCP","54","135 > 46320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42230","20.129822","172.30.1.104","172.30.1.205","TCP","54","135 > 46320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42231","20.129828","172.30.1.205","172.30.1.104","TCP","54","46320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42232","20.129940","172.30.1.104","172.30.1.205","TCP","66","49671 > 38958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42233","20.129949","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42234","20.130297","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42235","20.130565","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42236","20.130573","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42237","20.132448","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42238","20.132830","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42239","20.132843","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42240","20.134403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42241","20.137672","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42242","20.137681","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42243","20.138644","172.30.1.205","172.30.1.104","TCP","74","46324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923365 TSecr=0 WS=128" +"42244","20.138959","172.30.1.104","172.30.1.205","TCP","66","135 > 46324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42245","20.138969","172.30.1.205","172.30.1.104","TCP","54","46324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42246","20.139319","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42247","20.139620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42248","20.139630","172.30.1.205","172.30.1.104","TCP","54","46324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42249","20.141855","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42250","20.142247","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42251","20.142254","172.30.1.205","172.30.1.104","TCP","54","46324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42252","20.144094","172.30.1.205","172.30.1.104","TCP","54","46324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42253","20.144205","172.30.1.205","172.30.1.104","TCP","74","38962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923370 TSecr=0 WS=128" +"42254","20.144366","172.30.1.104","172.30.1.205","TCP","54","135 > 46324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42255","20.144402","172.30.1.104","172.30.1.205","TCP","54","135 > 46324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42256","20.144408","172.30.1.205","172.30.1.104","TCP","54","46324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42257","20.144519","172.30.1.104","172.30.1.205","TCP","66","49671 > 38962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42258","20.144539","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42259","20.144930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42260","20.145242","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42261","20.145250","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42262","20.147125","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42263","20.147533","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42264","20.147540","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42265","20.148944","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42266","20.152256","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42267","20.152267","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42268","20.153243","172.30.1.205","172.30.1.104","TCP","74","46328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923379 TSecr=0 WS=128" +"42269","20.153557","172.30.1.104","172.30.1.205","TCP","66","135 > 46328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42270","20.153567","172.30.1.205","172.30.1.104","TCP","54","46328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42271","20.153925","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42272","20.154227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42273","20.154237","172.30.1.205","172.30.1.104","TCP","54","46328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42274","20.156431","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42275","20.156861","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42276","20.156867","172.30.1.205","172.30.1.104","TCP","54","46328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42277","20.158674","172.30.1.205","172.30.1.104","TCP","54","46328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42278","20.158785","172.30.1.205","172.30.1.104","TCP","74","38966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923385 TSecr=0 WS=128" +"42279","20.158945","172.30.1.104","172.30.1.205","TCP","54","135 > 46328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42280","20.158956","172.30.1.104","172.30.1.205","TCP","54","135 > 46328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42281","20.158961","172.30.1.205","172.30.1.104","TCP","54","46328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42282","20.159079","172.30.1.104","172.30.1.205","TCP","66","49671 > 38966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42283","20.159087","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42284","20.159429","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42285","20.159713","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42286","20.159721","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42287","20.161630","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42288","20.162020","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42289","20.162032","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42290","20.163558","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42291","20.166892","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42292","20.166902","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42293","20.167845","172.30.1.205","172.30.1.104","TCP","74","46332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923394 TSecr=0 WS=128" +"42294","20.168203","172.30.1.104","172.30.1.205","TCP","66","135 > 46332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42295","20.168213","172.30.1.205","172.30.1.104","TCP","54","46332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42296","20.168567","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42297","20.168902","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42298","20.168911","172.30.1.205","172.30.1.104","TCP","54","46332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42299","20.171115","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42300","20.171505","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42301","20.171511","172.30.1.205","172.30.1.104","TCP","54","46332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42302","20.173351","172.30.1.205","172.30.1.104","TCP","54","46332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42303","20.173463","172.30.1.205","172.30.1.104","TCP","74","38970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923399 TSecr=0 WS=128" +"42304","20.173609","172.30.1.104","172.30.1.205","TCP","54","135 > 46332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42305","20.173625","172.30.1.104","172.30.1.205","TCP","54","135 > 46332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42306","20.173630","172.30.1.205","172.30.1.104","TCP","54","46332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42307","20.173772","172.30.1.104","172.30.1.205","TCP","66","49671 > 38970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42308","20.173780","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42309","20.174146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42310","20.174452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42311","20.174469","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42312","20.176557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42313","20.176934","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42314","20.176941","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42315","20.178345","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42316","20.181670","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42317","20.181690","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42318","20.182748","172.30.1.205","172.30.1.104","TCP","74","46336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923409 TSecr=0 WS=128" +"42319","20.183094","172.30.1.104","172.30.1.205","TCP","66","135 > 46336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42320","20.183114","172.30.1.205","172.30.1.104","TCP","54","46336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42321","20.183638","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42322","20.183999","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42323","20.184008","172.30.1.205","172.30.1.104","TCP","54","46336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42324","20.186242","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42325","20.186621","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42326","20.186628","172.30.1.205","172.30.1.104","TCP","54","46336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42327","20.188442","172.30.1.205","172.30.1.104","TCP","54","46336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42328","20.188553","172.30.1.205","172.30.1.104","TCP","74","38974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923414 TSecr=0 WS=128" +"42329","20.188724","172.30.1.104","172.30.1.205","TCP","54","135 > 46336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42330","20.188766","172.30.1.104","172.30.1.205","TCP","54","135 > 46336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42331","20.188772","172.30.1.205","172.30.1.104","TCP","54","46336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42332","20.188848","172.30.1.104","172.30.1.205","TCP","66","49671 > 38974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42333","20.188856","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42334","20.189206","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42335","20.189462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42336","20.189476","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42337","20.191541","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42338","20.191913","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42339","20.191920","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42340","20.193315","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42341","20.196602","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42342","20.196611","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42343","20.197582","172.30.1.205","172.30.1.104","TCP","74","46340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923424 TSecr=0 WS=128" +"42344","20.197867","172.30.1.104","172.30.1.205","TCP","66","135 > 46340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42345","20.197878","172.30.1.205","172.30.1.104","TCP","54","46340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42346","20.198233","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42347","20.198484","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42348","20.198494","172.30.1.205","172.30.1.104","TCP","54","46340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42349","20.200693","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42350","20.201152","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42351","20.201166","172.30.1.205","172.30.1.104","TCP","54","46340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42352","20.202977","172.30.1.205","172.30.1.104","TCP","54","46340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42353","20.203090","172.30.1.205","172.30.1.104","TCP","74","38978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923429 TSecr=0 WS=128" +"42354","20.203268","172.30.1.104","172.30.1.205","TCP","54","135 > 46340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42355","20.203278","172.30.1.104","172.30.1.205","TCP","54","135 > 46340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42356","20.203284","172.30.1.205","172.30.1.104","TCP","54","46340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42357","20.203359","172.30.1.104","172.30.1.205","TCP","66","49671 > 38978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42358","20.203369","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42359","20.203715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42360","20.203990","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42361","20.203999","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42362","20.205927","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42363","20.206293","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42364","20.206300","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42365","20.207662","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42366","20.211058","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42367","20.211069","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42368","20.212023","172.30.1.205","172.30.1.104","TCP","74","46344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923438 TSecr=0 WS=128" +"42369","20.212329","172.30.1.104","172.30.1.205","TCP","66","135 > 46344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42370","20.212339","172.30.1.205","172.30.1.104","TCP","54","46344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42371","20.212686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42372","20.212967","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42373","20.212977","172.30.1.205","172.30.1.104","TCP","54","46344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42374","20.215176","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42375","20.215589","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42376","20.215595","172.30.1.205","172.30.1.104","TCP","54","46344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42377","20.217426","172.30.1.205","172.30.1.104","TCP","54","46344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42378","20.217537","172.30.1.205","172.30.1.104","TCP","74","38982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923443 TSecr=0 WS=128" +"42379","20.217685","172.30.1.104","172.30.1.205","TCP","54","135 > 46344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42380","20.217725","172.30.1.104","172.30.1.205","TCP","54","135 > 46344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42381","20.217734","172.30.1.205","172.30.1.104","TCP","54","46344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42382","20.217811","172.30.1.104","172.30.1.205","TCP","66","49671 > 38982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42383","20.217823","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42384","20.218219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42385","20.218528","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42386","20.218538","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42387","20.220440","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42388","20.220845","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42389","20.220852","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42390","20.222208","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42391","20.225478","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42392","20.225488","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42393","20.226451","172.30.1.205","172.30.1.104","TCP","74","46348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923452 TSecr=0 WS=128" +"42394","20.226758","172.30.1.104","172.30.1.205","TCP","66","135 > 46348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42395","20.226769","172.30.1.205","172.30.1.104","TCP","54","46348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42396","20.227123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42397","20.227441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42398","20.227450","172.30.1.205","172.30.1.104","TCP","54","46348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42399","20.229670","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42400","20.230097","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42401","20.230104","172.30.1.205","172.30.1.104","TCP","54","46348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42402","20.231957","172.30.1.205","172.30.1.104","TCP","54","46348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42403","20.232069","172.30.1.205","172.30.1.104","TCP","74","38986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923458 TSecr=0 WS=128" +"42404","20.232239","172.30.1.104","172.30.1.205","TCP","54","135 > 46348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42405","20.232247","172.30.1.104","172.30.1.205","TCP","54","135 > 46348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42406","20.232252","172.30.1.205","172.30.1.104","TCP","54","46348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42407","20.232322","172.30.1.104","172.30.1.205","TCP","66","49671 > 38986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42408","20.232331","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42409","20.232694","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42410","20.232990","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42411","20.233011","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42412","20.234979","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42413","20.235378","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42414","20.235384","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42415","20.236733","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42416","20.240009","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42417","20.240018","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42418","20.240970","172.30.1.205","172.30.1.104","TCP","74","46352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923467 TSecr=0 WS=128" +"42419","20.241335","172.30.1.104","172.30.1.205","TCP","66","135 > 46352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42420","20.241357","172.30.1.205","172.30.1.104","TCP","54","46352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42421","20.241924","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42422","20.242195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42423","20.242206","172.30.1.205","172.30.1.104","TCP","54","46352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42424","20.244492","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42425","20.244869","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42426","20.244889","172.30.1.205","172.30.1.104","TCP","54","46352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42427","20.246763","172.30.1.205","172.30.1.104","TCP","54","46352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42428","20.246889","172.30.1.205","172.30.1.104","TCP","74","38990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923473 TSecr=0 WS=128" +"42429","20.247029","172.30.1.104","172.30.1.205","TCP","54","135 > 46352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42430","20.247039","172.30.1.104","172.30.1.205","TCP","54","135 > 46352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42431","20.247044","172.30.1.205","172.30.1.104","TCP","54","46352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42432","20.247187","172.30.1.104","172.30.1.205","TCP","66","49671 > 38990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42433","20.247196","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42434","20.247546","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42435","20.247862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42436","20.247869","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42437","20.249810","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42438","20.250160","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42439","20.250167","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42440","20.251516","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42441","20.254877","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42442","20.254891","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42443","20.255872","172.30.1.205","172.30.1.104","TCP","74","46356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923482 TSecr=0 WS=128" +"42444","20.256253","172.30.1.104","172.30.1.205","TCP","66","135 > 46356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42445","20.256277","172.30.1.205","172.30.1.104","TCP","54","46356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42446","20.256761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42447","20.257066","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42448","20.257076","172.30.1.205","172.30.1.104","TCP","54","46356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42449","20.259359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42450","20.259828","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42451","20.259835","172.30.1.205","172.30.1.104","TCP","54","46356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42452","20.261776","172.30.1.205","172.30.1.104","TCP","54","46356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42453","20.261898","172.30.1.205","172.30.1.104","TCP","74","38994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923488 TSecr=0 WS=128" +"42454","20.262113","172.30.1.104","172.30.1.205","TCP","54","135 > 46356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42455","20.262154","172.30.1.104","172.30.1.205","TCP","54","135 > 46356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42456","20.262160","172.30.1.205","172.30.1.104","TCP","54","46356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42457","20.262229","172.30.1.104","172.30.1.205","TCP","66","49671 > 38994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42458","20.262238","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42459","20.262583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42460","20.262849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42461","20.262858","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42462","20.264731","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42463","20.265115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42464","20.265122","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42465","20.266476","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42466","20.269768","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42467","20.269778","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42468","20.270721","172.30.1.205","172.30.1.104","TCP","74","46360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923497 TSecr=0 WS=128" +"42469","20.271112","172.30.1.104","172.30.1.205","TCP","66","135 > 46360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42470","20.271125","172.30.1.205","172.30.1.104","TCP","54","46360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42471","20.271490","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42472","20.271801","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42473","20.271810","172.30.1.205","172.30.1.104","TCP","54","46360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42474","20.274036","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42475","20.274442","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42476","20.274449","172.30.1.205","172.30.1.104","TCP","54","46360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42477","20.275299","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42478","20.275353","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42479","20.275385","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42480","20.275418","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42481","20.275450","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42482","20.275483","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42483","20.275511","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42484","20.275543","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42485","20.275569","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42486","20.275583","172.30.1.104","172.30.1.205","TCP","54","49671 > 38954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42487","20.275598","172.30.1.104","172.30.1.205","TCP","54","49671 > 38958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42488","20.275628","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42489","20.275656","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42490","20.275700","172.30.1.104","172.30.1.205","TCP","54","49671 > 38962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42491","20.275715","172.30.1.104","172.30.1.205","TCP","54","49671 > 38954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42492","20.275721","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42493","20.275734","172.30.1.104","172.30.1.205","TCP","54","49671 > 38958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42494","20.275737","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42495","20.275753","172.30.1.104","172.30.1.205","TCP","54","49671 > 38966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42496","20.275772","172.30.1.104","172.30.1.205","TCP","54","49671 > 38970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42497","20.275786","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42498","20.275792","172.30.1.104","172.30.1.205","TCP","54","49671 > 38962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42499","20.275796","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42500","20.275945","172.30.1.104","172.30.1.205","TCP","54","49671 > 38974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42501","20.275965","172.30.1.104","172.30.1.205","TCP","54","49671 > 38978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42502","20.275985","172.30.1.104","172.30.1.205","TCP","54","49671 > 38978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42503","20.275990","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42504","20.276005","172.30.1.104","172.30.1.205","TCP","54","49671 > 38974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42505","20.276008","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42506","20.276026","172.30.1.104","172.30.1.205","TCP","54","49671 > 38966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42507","20.276029","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42508","20.276045","172.30.1.104","172.30.1.205","TCP","54","49671 > 38970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42509","20.276048","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42510","20.276066","172.30.1.104","172.30.1.205","TCP","54","49671 > 38982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42511","20.276167","172.30.1.104","172.30.1.205","TCP","54","49671 > 38986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42512","20.276185","172.30.1.104","172.30.1.205","TCP","54","49671 > 38990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42513","20.276217","172.30.1.104","172.30.1.205","TCP","54","49671 > 38982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42514","20.276222","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42515","20.276238","172.30.1.104","172.30.1.205","TCP","54","49671 > 38986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42516","20.276241","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42517","20.276258","172.30.1.104","172.30.1.205","TCP","54","49671 > 38990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42518","20.276261","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42519","20.276280","172.30.1.104","172.30.1.205","TCP","54","49671 > 38994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42520","20.276391","172.30.1.104","172.30.1.205","TCP","54","49671 > 38950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42521","20.276410","172.30.1.104","172.30.1.205","TCP","54","49671 > 38994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42522","20.276414","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42523","20.276428","172.30.1.104","172.30.1.205","TCP","54","49671 > 38950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42524","20.276430","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42525","20.277335","172.30.1.205","172.30.1.104","TCP","54","46360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42526","20.277447","172.30.1.205","172.30.1.104","TCP","74","38998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923503 TSecr=0 WS=128" +"42527","20.277654","172.30.1.104","172.30.1.205","TCP","54","135 > 46360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42528","20.277703","172.30.1.104","172.30.1.205","TCP","66","49671 > 38998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42529","20.277712","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42530","20.277726","172.30.1.104","172.30.1.205","TCP","54","135 > 46360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42531","20.277730","172.30.1.205","172.30.1.104","TCP","54","46360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42532","20.278082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42533","20.278357","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42534","20.278366","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42535","20.280243","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42536","20.280612","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42537","20.280618","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42538","20.282014","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42539","20.286078","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42540","20.286087","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42541","20.287047","172.30.1.205","172.30.1.104","TCP","74","46364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923513 TSecr=0 WS=128" +"42542","20.287414","172.30.1.104","172.30.1.205","TCP","66","135 > 46364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42543","20.287426","172.30.1.205","172.30.1.104","TCP","54","46364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42544","20.287776","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42545","20.288084","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42546","20.288093","172.30.1.205","172.30.1.104","TCP","54","46364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42547","20.290302","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42548","20.290679","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42549","20.290686","172.30.1.205","172.30.1.104","TCP","54","46364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42550","20.292499","172.30.1.205","172.30.1.104","TCP","54","46364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42551","20.292611","172.30.1.205","172.30.1.104","TCP","74","39002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923519 TSecr=0 WS=128" +"42552","20.292793","172.30.1.104","172.30.1.205","TCP","54","135 > 46364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42553","20.292816","172.30.1.104","172.30.1.205","TCP","54","135 > 46364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42554","20.292824","172.30.1.205","172.30.1.104","TCP","54","46364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42555","20.292893","172.30.1.104","172.30.1.205","TCP","66","49671 > 39002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42556","20.292902","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42557","20.293255","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42558","20.293544","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42559","20.293553","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42560","20.295498","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42561","20.295869","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42562","20.295875","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42563","20.297264","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42564","20.300563","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42565","20.300577","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42566","20.301563","172.30.1.205","172.30.1.104","TCP","74","46368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923527 TSecr=0 WS=128" +"42567","20.301899","172.30.1.104","172.30.1.205","TCP","66","135 > 46368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42568","20.301910","172.30.1.205","172.30.1.104","TCP","54","46368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42569","20.302266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42570","20.302547","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42571","20.302556","172.30.1.205","172.30.1.104","TCP","54","46368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42572","20.304768","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42573","20.305158","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42574","20.305165","172.30.1.205","172.30.1.104","TCP","54","46368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42575","20.306987","172.30.1.205","172.30.1.104","TCP","54","46368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42576","20.307098","172.30.1.205","172.30.1.104","TCP","74","39006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923533 TSecr=0 WS=128" +"42577","20.307333","172.30.1.104","172.30.1.205","TCP","54","135 > 46368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42578","20.307342","172.30.1.104","172.30.1.205","TCP","54","135 > 46368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42579","20.307347","172.30.1.205","172.30.1.104","TCP","54","46368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42580","20.307420","172.30.1.104","172.30.1.205","TCP","66","49671 > 39006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42581","20.307429","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42582","20.307819","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42583","20.308099","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42584","20.308108","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42585","20.310022","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42586","20.310414","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42587","20.310420","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42588","20.311767","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42589","20.316950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42590","20.316959","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42591","20.317919","172.30.1.205","172.30.1.104","TCP","74","46372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923544 TSecr=0 WS=128" +"42592","20.318316","172.30.1.104","172.30.1.205","TCP","66","135 > 46372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42593","20.318328","172.30.1.205","172.30.1.104","TCP","54","46372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42594","20.318689","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42595","20.318957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42596","20.318973","172.30.1.205","172.30.1.104","TCP","54","46372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42597","20.321186","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42598","20.321639","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42599","20.321646","172.30.1.205","172.30.1.104","TCP","54","46372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42600","20.323460","172.30.1.205","172.30.1.104","TCP","54","46372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42601","20.323574","172.30.1.205","172.30.1.104","TCP","74","39010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923549 TSecr=0 WS=128" +"42602","20.323755","172.30.1.104","172.30.1.205","TCP","54","135 > 46372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42603","20.323763","172.30.1.104","172.30.1.205","TCP","54","135 > 46372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42604","20.323769","172.30.1.205","172.30.1.104","TCP","54","46372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42605","20.323841","172.30.1.104","172.30.1.205","TCP","66","49671 > 39010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42606","20.323849","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42607","20.324195","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42608","20.324619","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42609","20.324636","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42610","20.326816","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42611","20.327195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42612","20.327201","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42613","20.328564","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42614","20.331952","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42615","20.331963","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42616","20.332945","172.30.1.205","172.30.1.104","TCP","74","46376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923559 TSecr=0 WS=128" +"42617","20.333347","172.30.1.104","172.30.1.205","TCP","66","135 > 46376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42618","20.333358","172.30.1.205","172.30.1.104","TCP","54","46376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42619","20.333721","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42620","20.333997","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42621","20.334006","172.30.1.205","172.30.1.104","TCP","54","46376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42622","20.336191","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42623","20.336641","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42624","20.336648","172.30.1.205","172.30.1.104","TCP","54","46376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42625","20.338486","172.30.1.205","172.30.1.104","TCP","54","46376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42626","20.338599","172.30.1.205","172.30.1.104","TCP","74","39014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923565 TSecr=0 WS=128" +"42627","20.338797","172.30.1.104","172.30.1.205","TCP","54","135 > 46376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42628","20.338806","172.30.1.104","172.30.1.205","TCP","54","135 > 46376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42629","20.338811","172.30.1.205","172.30.1.104","TCP","54","46376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42630","20.338899","172.30.1.104","172.30.1.205","TCP","66","49671 > 39014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42631","20.338908","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42632","20.339253","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42633","20.339519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42634","20.339527","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42635","20.341451","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42636","20.341901","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42637","20.341908","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42638","20.343257","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42639","20.346590","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42640","20.346609","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42641","20.347806","172.30.1.205","172.30.1.104","TCP","74","46380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923574 TSecr=0 WS=128" +"42642","20.348133","172.30.1.104","172.30.1.205","TCP","66","135 > 46380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42643","20.348144","172.30.1.205","172.30.1.104","TCP","54","46380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42644","20.348505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42645","20.348834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42646","20.348844","172.30.1.205","172.30.1.104","TCP","54","46380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42647","20.351099","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42648","20.351548","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42649","20.351555","172.30.1.205","172.30.1.104","TCP","54","46380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42650","20.353392","172.30.1.205","172.30.1.104","TCP","54","46380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42651","20.353505","172.30.1.205","172.30.1.104","TCP","74","39018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923579 TSecr=0 WS=128" +"42652","20.353721","172.30.1.104","172.30.1.205","TCP","54","135 > 46380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42653","20.353768","172.30.1.104","172.30.1.205","TCP","54","135 > 46380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42654","20.353773","172.30.1.205","172.30.1.104","TCP","54","46380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42655","20.353862","172.30.1.104","172.30.1.205","TCP","66","49671 > 39018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42656","20.353871","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42657","20.354218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42658","20.354511","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42659","20.354518","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42660","20.356393","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42661","20.356835","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42662","20.356842","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42663","20.358248","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42664","20.361653","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42665","20.361662","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42666","20.362616","172.30.1.205","172.30.1.104","TCP","74","46384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923589 TSecr=0 WS=128" +"42667","20.363017","172.30.1.104","172.30.1.205","TCP","66","135 > 46384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42668","20.363028","172.30.1.205","172.30.1.104","TCP","54","46384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42669","20.363371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42670","20.363643","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42671","20.363652","172.30.1.205","172.30.1.104","TCP","54","46384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42672","20.365883","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42673","20.366333","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42674","20.366340","172.30.1.205","172.30.1.104","TCP","54","46384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42675","20.368167","172.30.1.205","172.30.1.104","TCP","54","46384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42676","20.368285","172.30.1.205","172.30.1.104","TCP","74","39022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923594 TSecr=0 WS=128" +"42677","20.368446","172.30.1.104","172.30.1.205","TCP","54","135 > 46384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42678","20.368523","172.30.1.104","172.30.1.205","TCP","54","135 > 46384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42679","20.368529","172.30.1.205","172.30.1.104","TCP","54","46384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42680","20.368601","172.30.1.104","172.30.1.205","TCP","66","49671 > 39022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42681","20.368609","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42682","20.368988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42683","20.369269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42684","20.369278","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42685","20.371168","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42686","20.371539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42687","20.371546","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42688","20.372939","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42689","20.376356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42690","20.376368","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42691","20.377408","172.30.1.205","172.30.1.104","TCP","74","46388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923603 TSecr=0 WS=128" +"42692","20.377718","172.30.1.104","172.30.1.205","TCP","66","135 > 46388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42693","20.377729","172.30.1.205","172.30.1.104","TCP","54","46388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42694","20.378086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42695","20.378442","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42696","20.378451","172.30.1.205","172.30.1.104","TCP","54","46388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42697","20.380670","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42698","20.381087","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42699","20.381093","172.30.1.205","172.30.1.104","TCP","54","46388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42700","20.382930","172.30.1.205","172.30.1.104","TCP","54","46388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42701","20.383052","172.30.1.205","172.30.1.104","TCP","74","39026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923609 TSecr=0 WS=128" +"42702","20.383202","172.30.1.104","172.30.1.205","TCP","54","135 > 46388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42703","20.383226","172.30.1.104","172.30.1.205","TCP","54","135 > 46388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42704","20.383233","172.30.1.205","172.30.1.104","TCP","54","46388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42705","20.383347","172.30.1.104","172.30.1.205","TCP","66","49671 > 39026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42706","20.383355","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42707","20.383698","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42708","20.383970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42709","20.383978","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42710","20.385902","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42711","20.386284","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42712","20.386291","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42713","20.387654","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42714","20.393595","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42715","20.393606","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42716","20.394605","172.30.1.205","172.30.1.104","TCP","74","46392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923621 TSecr=0 WS=128" +"42717","20.394934","172.30.1.104","172.30.1.205","TCP","66","135 > 46392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42718","20.394946","172.30.1.205","172.30.1.104","TCP","54","46392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42719","20.395303","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42720","20.395605","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42721","20.395614","172.30.1.205","172.30.1.104","TCP","54","46392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42722","20.397835","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42723","20.398264","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42724","20.398271","172.30.1.205","172.30.1.104","TCP","54","46392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42725","20.400089","172.30.1.205","172.30.1.104","TCP","54","46392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42726","20.400207","172.30.1.205","172.30.1.104","TCP","74","39030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923626 TSecr=0 WS=128" +"42727","20.400401","172.30.1.104","172.30.1.205","TCP","54","135 > 46392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42728","20.400418","172.30.1.104","172.30.1.205","TCP","54","135 > 46392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42729","20.400424","172.30.1.205","172.30.1.104","TCP","54","46392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42730","20.400496","172.30.1.104","172.30.1.205","TCP","66","49671 > 39030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42731","20.400504","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42732","20.400892","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42733","20.401180","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42734","20.401188","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42735","20.403042","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42736","20.403446","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42737","20.403453","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42738","20.404829","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42739","20.408141","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42740","20.408150","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42741","20.409120","172.30.1.205","172.30.1.104","TCP","74","46396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923635 TSecr=0 WS=128" +"42742","20.409459","172.30.1.104","172.30.1.205","TCP","66","135 > 46396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42743","20.409470","172.30.1.205","172.30.1.104","TCP","54","46396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42744","20.409829","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42745","20.410134","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42746","20.410143","172.30.1.205","172.30.1.104","TCP","54","46396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42747","20.412332","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42748","20.412758","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42749","20.412764","172.30.1.205","172.30.1.104","TCP","54","46396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42750","20.414572","172.30.1.205","172.30.1.104","TCP","54","46396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42751","20.414692","172.30.1.205","172.30.1.104","TCP","74","39034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923641 TSecr=0 WS=128" +"42752","20.414854","172.30.1.104","172.30.1.205","TCP","54","135 > 46396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42753","20.414934","172.30.1.104","172.30.1.205","TCP","54","135 > 46396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42754","20.414940","172.30.1.205","172.30.1.104","TCP","54","46396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42755","20.414944","172.30.1.104","172.30.1.205","TCP","66","49671 > 39034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42756","20.414952","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42757","20.415302","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42758","20.415616","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42759","20.415625","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42760","20.417541","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42761","20.417916","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42762","20.417922","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42763","20.419268","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42764","20.422647","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42765","20.422656","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42766","20.423600","172.30.1.205","172.30.1.104","TCP","74","46400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923650 TSecr=0 WS=128" +"42767","20.423913","172.30.1.104","172.30.1.205","TCP","66","135 > 46400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42768","20.423923","172.30.1.205","172.30.1.104","TCP","54","46400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42769","20.424276","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42770","20.424563","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42771","20.424571","172.30.1.205","172.30.1.104","TCP","54","46400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42772","20.426778","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42773","20.427203","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42774","20.427209","172.30.1.205","172.30.1.104","TCP","54","46400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42775","20.429038","172.30.1.205","172.30.1.104","TCP","54","46400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42776","20.429149","172.30.1.205","172.30.1.104","TCP","74","39038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923655 TSecr=0 WS=128" +"42777","20.429366","172.30.1.104","172.30.1.205","TCP","54","135 > 46400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42778","20.429435","172.30.1.104","172.30.1.205","TCP","66","49671 > 39038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42779","20.429444","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42780","20.429456","172.30.1.104","172.30.1.205","TCP","54","135 > 46400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42781","20.429464","172.30.1.205","172.30.1.104","TCP","54","46400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42782","20.429816","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42783","20.430094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42784","20.430102","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42785","20.431974","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42786","20.432375","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42787","20.432381","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42788","20.433754","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42789","20.437108","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42790","20.437118","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42791","20.438091","172.30.1.205","172.30.1.104","TCP","74","46404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923664 TSecr=0 WS=128" +"42792","20.438436","172.30.1.104","172.30.1.205","TCP","66","135 > 46404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42793","20.438457","172.30.1.205","172.30.1.104","TCP","54","46404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42794","20.439012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42795","20.439318","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42796","20.439330","172.30.1.205","172.30.1.104","TCP","54","46404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42797","20.441552","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42798","20.441976","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42799","20.441986","172.30.1.205","172.30.1.104","TCP","54","46404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42800","20.443886","172.30.1.205","172.30.1.104","TCP","54","46404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42801","20.444019","172.30.1.205","172.30.1.104","TCP","74","39042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923670 TSecr=0 WS=128" +"42802","20.444171","172.30.1.104","172.30.1.205","TCP","54","135 > 46404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42803","20.444182","172.30.1.104","172.30.1.205","TCP","54","135 > 46404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42804","20.444188","172.30.1.205","172.30.1.104","TCP","54","46404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42805","20.444287","172.30.1.104","172.30.1.205","TCP","66","49671 > 39042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42806","20.444295","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42807","20.444643","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42808","20.444917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42809","20.444927","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42810","20.446821","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42811","20.447215","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42812","20.447224","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42813","20.448655","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42814","20.452677","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42815","20.452690","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42816","20.453719","172.30.1.205","172.30.1.104","TCP","74","46408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923680 TSecr=0 WS=128" +"42817","20.454055","172.30.1.104","172.30.1.205","TCP","66","135 > 46408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42818","20.454066","172.30.1.205","172.30.1.104","TCP","54","46408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42819","20.454456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42820","20.454736","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42821","20.454755","172.30.1.205","172.30.1.104","TCP","54","46408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42822","20.457180","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42823","20.457601","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42824","20.457608","172.30.1.205","172.30.1.104","TCP","54","46408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42825","20.458460","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42826","20.458508","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42827","20.458544","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42828","20.458577","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42829","20.458604","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42830","20.458632","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42831","20.458658","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42832","20.458680","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42833","20.458713","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42834","20.458741","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42835","20.458767","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42836","20.458806","172.30.1.104","172.30.1.205","TCP","54","49671 > 39002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42837","20.458825","172.30.1.104","172.30.1.205","TCP","54","49671 > 39006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42838","20.458849","172.30.1.104","172.30.1.205","TCP","54","49671 > 39002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42839","20.458856","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42840","20.458872","172.30.1.104","172.30.1.205","TCP","54","49671 > 39006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42841","20.458875","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42842","20.458893","172.30.1.104","172.30.1.205","TCP","54","49671 > 39010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42843","20.458908","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42844","20.459021","172.30.1.104","172.30.1.205","TCP","54","49671 > 39014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42845","20.459038","172.30.1.104","172.30.1.205","TCP","54","49671 > 39010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42846","20.459043","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42847","20.459058","172.30.1.104","172.30.1.205","TCP","54","49671 > 39018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42848","20.459079","172.30.1.104","172.30.1.205","TCP","54","49671 > 39014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42849","20.459083","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42850","20.459099","172.30.1.104","172.30.1.205","TCP","54","49671 > 39018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42851","20.459102","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42852","20.459119","172.30.1.104","172.30.1.205","TCP","54","49671 > 39022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42853","20.459143","172.30.1.104","172.30.1.205","TCP","54","49671 > 39026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42854","20.459202","172.30.1.104","172.30.1.205","TCP","54","49671 > 39022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42855","20.459207","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42856","20.459285","172.30.1.104","172.30.1.205","TCP","54","49671 > 39030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42857","20.459302","172.30.1.104","172.30.1.205","TCP","54","49671 > 39034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42858","20.459323","172.30.1.104","172.30.1.205","TCP","54","49671 > 39034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42859","20.459328","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42860","20.459349","172.30.1.104","172.30.1.205","TCP","54","49671 > 39026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42861","20.459352","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42862","20.459375","172.30.1.104","172.30.1.205","TCP","54","49671 > 39030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42863","20.459379","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42864","20.459400","172.30.1.104","172.30.1.205","TCP","54","49671 > 39038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42865","20.459419","172.30.1.104","172.30.1.205","TCP","54","49671 > 39042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42866","20.459528","172.30.1.104","172.30.1.205","TCP","54","49671 > 39038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42867","20.459533","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42868","20.459559","172.30.1.104","172.30.1.205","TCP","54","49671 > 39042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42869","20.459562","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42870","20.459584","172.30.1.104","172.30.1.205","TCP","54","49671 > 38998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42871","20.459608","172.30.1.104","172.30.1.205","TCP","54","49671 > 38998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"42872","20.459611","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"42873","20.460507","172.30.1.205","172.30.1.104","TCP","54","46408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42874","20.460620","172.30.1.205","172.30.1.104","TCP","74","39046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923687 TSecr=0 WS=128" +"42875","20.460766","172.30.1.104","172.30.1.205","TCP","54","135 > 46408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42876","20.460791","172.30.1.104","172.30.1.205","TCP","54","135 > 46408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42877","20.460796","172.30.1.205","172.30.1.104","TCP","54","46408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42878","20.460877","172.30.1.104","172.30.1.205","TCP","66","49671 > 39046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42879","20.460885","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42880","20.461256","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42881","20.461528","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42882","20.461537","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42883","20.463406","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42884","20.463756","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42885","20.463762","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42886","20.465153","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42887","20.468516","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42888","20.468527","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42889","20.469524","172.30.1.205","172.30.1.104","TCP","74","46412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923695 TSecr=0 WS=128" +"42890","20.469910","172.30.1.104","172.30.1.205","TCP","66","135 > 46412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42891","20.469921","172.30.1.205","172.30.1.104","TCP","54","46412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42892","20.470270","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42893","20.470588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42894","20.470597","172.30.1.205","172.30.1.104","TCP","54","46412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42895","20.472770","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42896","20.473198","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42897","20.473205","172.30.1.205","172.30.1.104","TCP","54","46412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42898","20.475011","172.30.1.205","172.30.1.104","TCP","54","46412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42899","20.475119","172.30.1.205","172.30.1.104","TCP","74","39050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923701 TSecr=0 WS=128" +"42900","20.475288","172.30.1.104","172.30.1.205","TCP","54","135 > 46412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42901","20.475309","172.30.1.104","172.30.1.205","TCP","54","135 > 46412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42902","20.475315","172.30.1.205","172.30.1.104","TCP","54","46412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42903","20.475419","172.30.1.104","172.30.1.205","TCP","66","49671 > 39050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42904","20.475427","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42905","20.475768","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42906","20.476842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42907","20.476850","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42908","20.478720","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42909","20.479117","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42910","20.479130","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42911","20.480585","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42912","20.483965","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42913","20.483974","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42914","20.484922","172.30.1.205","172.30.1.104","TCP","74","46416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923711 TSecr=0 WS=128" +"42915","20.485259","172.30.1.104","172.30.1.205","TCP","66","135 > 46416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42916","20.485270","172.30.1.205","172.30.1.104","TCP","54","46416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42917","20.485625","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42918","20.485920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42919","20.485929","172.30.1.205","172.30.1.104","TCP","54","46416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42920","20.488114","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42921","20.488602","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42922","20.488609","172.30.1.205","172.30.1.104","TCP","54","46416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42923","20.490422","172.30.1.205","172.30.1.104","TCP","54","46416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42924","20.490534","172.30.1.205","172.30.1.104","TCP","74","39054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923716 TSecr=0 WS=128" +"42925","20.490669","172.30.1.104","172.30.1.205","TCP","54","135 > 46416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42926","20.490682","172.30.1.104","172.30.1.205","TCP","54","135 > 46416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42927","20.490687","172.30.1.205","172.30.1.104","TCP","54","46416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42928","20.490803","172.30.1.104","172.30.1.205","TCP","66","49671 > 39054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42929","20.490814","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42930","20.491445","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42931","20.491769","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42932","20.491778","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42933","20.493686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42934","20.494048","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42935","20.494054","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42936","20.495397","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42937","20.498828","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42938","20.498837","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42939","20.499797","172.30.1.205","172.30.1.104","TCP","74","46420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923726 TSecr=0 WS=128" +"42940","20.500131","172.30.1.104","172.30.1.205","TCP","66","135 > 46420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42941","20.500142","172.30.1.205","172.30.1.104","TCP","54","46420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42942","20.500496","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42943","20.500824","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42944","20.500833","172.30.1.205","172.30.1.104","TCP","54","46420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42945","20.503058","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42946","20.503556","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42947","20.503562","172.30.1.205","172.30.1.104","TCP","54","46420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42948","20.505391","172.30.1.205","172.30.1.104","TCP","54","46420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42949","20.505500","172.30.1.205","172.30.1.104","TCP","74","39058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923731 TSecr=0 WS=128" +"42950","20.505649","172.30.1.104","172.30.1.205","TCP","54","135 > 46420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42951","20.505671","172.30.1.104","172.30.1.205","TCP","54","135 > 46420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42952","20.505677","172.30.1.205","172.30.1.104","TCP","54","46420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42953","20.505799","172.30.1.104","172.30.1.205","TCP","66","49671 > 39058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42954","20.505807","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42955","20.506152","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42956","20.507678","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42957","20.507685","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42958","20.509584","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42959","20.510013","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42960","20.510023","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42961","20.511475","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42962","20.514865","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42963","20.514876","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42964","20.515868","172.30.1.205","172.30.1.104","TCP","74","46424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923742 TSecr=0 WS=128" +"42965","20.516189","172.30.1.104","172.30.1.205","TCP","66","135 > 46424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42966","20.516204","172.30.1.205","172.30.1.104","TCP","54","46424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42967","20.516592","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42968","20.516884","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42969","20.516894","172.30.1.205","172.30.1.104","TCP","54","46424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42970","20.519113","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42971","20.519551","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42972","20.519558","172.30.1.205","172.30.1.104","TCP","54","46424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42973","20.521405","172.30.1.205","172.30.1.104","TCP","54","46424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42974","20.521527","172.30.1.205","172.30.1.104","TCP","74","39062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923747 TSecr=0 WS=128" +"42975","20.521668","172.30.1.104","172.30.1.205","TCP","54","135 > 46424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42976","20.521680","172.30.1.104","172.30.1.205","TCP","54","135 > 46424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"42977","20.521687","172.30.1.205","172.30.1.104","TCP","54","46424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"42978","20.521783","172.30.1.104","172.30.1.205","TCP","66","49671 > 39062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42979","20.521791","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42980","20.522139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"42981","20.522584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42982","20.522593","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42983","20.524491","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"42984","20.524877","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"42985","20.524884","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"42986","20.526256","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"42987","20.529764","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"42988","20.529774","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"42989","20.530734","172.30.1.205","172.30.1.104","TCP","74","46428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923757 TSecr=0 WS=128" +"42990","20.531030","172.30.1.104","172.30.1.205","TCP","66","135 > 46428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"42991","20.531041","172.30.1.205","172.30.1.104","TCP","54","46428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"42992","20.531395","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"42993","20.531749","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"42994","20.531758","172.30.1.205","172.30.1.104","TCP","54","46428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"42995","20.534000","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"42996","20.534400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"42997","20.534407","172.30.1.205","172.30.1.104","TCP","54","46428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42998","20.536237","172.30.1.205","172.30.1.104","TCP","54","46428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"42999","20.536355","172.30.1.205","172.30.1.104","TCP","74","39066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923762 TSecr=0 WS=128" +"43000","20.536537","172.30.1.104","172.30.1.205","TCP","54","135 > 46428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43001","20.536568","172.30.1.104","172.30.1.205","TCP","54","135 > 46428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43002","20.536574","172.30.1.205","172.30.1.104","TCP","54","46428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43003","20.536643","172.30.1.104","172.30.1.205","TCP","66","49671 > 39066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43004","20.536651","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43005","20.537030","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43006","20.537318","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43007","20.537329","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43008","20.539255","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43009","20.539611","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43010","20.539617","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43011","20.541017","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43012","20.544545","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43013","20.544557","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43014","20.545576","172.30.1.205","172.30.1.104","TCP","74","46432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923772 TSecr=0 WS=128" +"43015","20.545938","172.30.1.104","172.30.1.205","TCP","66","135 > 46432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43016","20.545949","172.30.1.205","172.30.1.104","TCP","54","46432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43017","20.546320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43018","20.546646","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43019","20.546656","172.30.1.205","172.30.1.104","TCP","54","46432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43020","20.548886","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43021","20.549369","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43022","20.549375","172.30.1.205","172.30.1.104","TCP","54","46432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43023","20.551207","172.30.1.205","172.30.1.104","TCP","54","46432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43024","20.551327","172.30.1.205","172.30.1.104","TCP","74","39070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923777 TSecr=0 WS=128" +"43025","20.551691","172.30.1.104","172.30.1.205","TCP","66","49671 > 39070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43026","20.551703","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43027","20.551724","172.30.1.104","172.30.1.205","TCP","54","135 > 46432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43028","20.551766","172.30.1.104","172.30.1.205","TCP","54","135 > 46432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43029","20.551773","172.30.1.205","172.30.1.104","TCP","54","46432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43030","20.552092","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43031","20.552434","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43032","20.552443","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43033","20.554382","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43034","20.554811","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43035","20.554818","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43036","20.556190","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43037","20.559477","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43038","20.559486","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43039","20.560462","172.30.1.205","172.30.1.104","TCP","74","46436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923786 TSecr=0 WS=128" +"43040","20.560773","172.30.1.104","172.30.1.205","TCP","66","135 > 46436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43041","20.560794","172.30.1.205","172.30.1.104","TCP","54","46436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43042","20.561161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43043","20.561464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43044","20.561473","172.30.1.205","172.30.1.104","TCP","54","46436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43045","20.563697","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43046","20.564101","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43047","20.564107","172.30.1.205","172.30.1.104","TCP","54","46436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43048","20.565949","172.30.1.205","172.30.1.104","TCP","54","46436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43049","20.566062","172.30.1.205","172.30.1.104","TCP","74","39074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923792 TSecr=0 WS=128" +"43050","20.566207","172.30.1.104","172.30.1.205","TCP","54","135 > 46436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43051","20.566219","172.30.1.104","172.30.1.205","TCP","54","135 > 46436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43052","20.566224","172.30.1.205","172.30.1.104","TCP","54","46436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43053","20.566334","172.30.1.104","172.30.1.205","TCP","66","49671 > 39074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43054","20.566342","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43055","20.566688","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43056","20.566957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43057","20.566966","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43058","20.568869","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43059","20.569234","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43060","20.569240","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43061","20.570598","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43062","20.573918","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43063","20.573929","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43064","20.574907","172.30.1.205","172.30.1.104","TCP","74","46440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923801 TSecr=0 WS=128" +"43065","20.575219","172.30.1.104","172.30.1.205","TCP","66","135 > 46440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43066","20.575230","172.30.1.205","172.30.1.104","TCP","54","46440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43067","20.575580","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43068","20.575872","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43069","20.575881","172.30.1.205","172.30.1.104","TCP","54","46440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43070","20.578114","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43071","20.578524","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43072","20.578530","172.30.1.205","172.30.1.104","TCP","54","46440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43073","20.580350","172.30.1.205","172.30.1.104","TCP","54","46440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43074","20.580469","172.30.1.205","172.30.1.104","TCP","74","39078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923806 TSecr=0 WS=128" +"43075","20.580636","172.30.1.104","172.30.1.205","TCP","54","135 > 46440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43076","20.580677","172.30.1.104","172.30.1.205","TCP","54","135 > 46440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43077","20.580684","172.30.1.205","172.30.1.104","TCP","54","46440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43078","20.580760","172.30.1.104","172.30.1.205","TCP","66","49671 > 39078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43079","20.580768","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43080","20.581127","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43081","20.581443","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43082","20.581450","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43083","20.583318","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43084","20.583681","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43085","20.583688","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43086","20.585103","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43087","20.588457","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43088","20.588468","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43089","20.589513","172.30.1.205","172.30.1.104","TCP","74","46444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923815 TSecr=0 WS=128" +"43090","20.589862","172.30.1.104","172.30.1.205","TCP","66","135 > 46444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43091","20.589874","172.30.1.205","172.30.1.104","TCP","54","46444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43092","20.590237","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43093","20.590512","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43094","20.590521","172.30.1.205","172.30.1.104","TCP","54","46444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43095","20.592742","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43096","20.593155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43097","20.593162","172.30.1.205","172.30.1.104","TCP","54","46444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43098","20.595050","172.30.1.205","172.30.1.104","TCP","54","46444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43099","20.595172","172.30.1.205","172.30.1.104","TCP","74","39082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923821 TSecr=0 WS=128" +"43100","20.595337","172.30.1.104","172.30.1.205","TCP","54","135 > 46444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43101","20.595381","172.30.1.104","172.30.1.205","TCP","54","135 > 46444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43102","20.595388","172.30.1.205","172.30.1.104","TCP","54","46444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43103","20.595454","172.30.1.104","172.30.1.205","TCP","66","49671 > 39082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43104","20.595462","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43105","20.595823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43106","20.597282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43107","20.597292","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43108","20.599198","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43109","20.599591","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43110","20.599597","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43111","20.601002","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43112","20.604365","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43113","20.604380","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43114","20.605411","172.30.1.205","172.30.1.104","TCP","74","46448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923831 TSecr=0 WS=128" +"43115","20.605864","172.30.1.104","172.30.1.205","TCP","66","135 > 46448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43116","20.605877","172.30.1.205","172.30.1.104","TCP","54","46448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43117","20.606246","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43118","20.606535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43119","20.606544","172.30.1.205","172.30.1.104","TCP","54","46448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43120","20.608767","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43121","20.609183","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43122","20.609190","172.30.1.205","172.30.1.104","TCP","54","46448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43123","20.611017","172.30.1.205","172.30.1.104","TCP","54","46448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43124","20.611147","172.30.1.205","172.30.1.104","TCP","74","39086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923837 TSecr=0 WS=128" +"43125","20.611242","172.30.1.104","172.30.1.205","TCP","54","135 > 46448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43126","20.611278","172.30.1.104","172.30.1.205","TCP","54","135 > 46448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43127","20.611284","172.30.1.205","172.30.1.104","TCP","54","46448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43128","20.611416","172.30.1.104","172.30.1.205","TCP","66","49671 > 39086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43129","20.611424","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43130","20.611773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43131","20.612066","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43132","20.612075","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43133","20.614013","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43134","20.614419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43135","20.614426","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43136","20.615779","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43137","20.619222","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43138","20.619233","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43139","20.620217","172.30.1.205","172.30.1.104","TCP","74","46452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923846 TSecr=0 WS=128" +"43140","20.620556","172.30.1.104","172.30.1.205","TCP","66","135 > 46452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43141","20.620566","172.30.1.205","172.30.1.104","TCP","54","46452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43142","20.620971","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43143","20.621311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43144","20.621320","172.30.1.205","172.30.1.104","TCP","54","46452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43145","20.623557","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43146","20.623960","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43147","20.623967","172.30.1.205","172.30.1.104","TCP","54","46452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43148","20.625807","172.30.1.205","172.30.1.104","TCP","54","46452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43149","20.625920","172.30.1.205","172.30.1.104","TCP","74","39090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923852 TSecr=0 WS=128" +"43150","20.626097","172.30.1.104","172.30.1.205","TCP","54","135 > 46452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43151","20.626123","172.30.1.104","172.30.1.205","TCP","54","135 > 46452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43152","20.626128","172.30.1.205","172.30.1.104","TCP","54","46452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43153","20.626263","172.30.1.104","172.30.1.205","TCP","66","49671 > 39090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43154","20.626271","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43155","20.626614","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43156","20.626881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43157","20.626898","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43158","20.629137","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43159","20.629501","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43160","20.629508","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43161","20.630850","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43162","20.634141","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43163","20.634151","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43164","20.635098","172.30.1.205","172.30.1.104","TCP","74","46456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923861 TSecr=0 WS=128" +"43165","20.635488","172.30.1.104","172.30.1.205","TCP","66","135 > 46456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43166","20.635499","172.30.1.205","172.30.1.104","TCP","54","46456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43167","20.635845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43168","20.636113","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43169","20.636122","172.30.1.205","172.30.1.104","TCP","54","46456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43170","20.638332","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43171","20.638716","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43172","20.638722","172.30.1.205","172.30.1.104","TCP","54","46456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43173","20.639585","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43174","20.639634","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43175","20.639671","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43176","20.639705","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43177","20.639737","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43178","20.639769","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43179","20.639800","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43180","20.639831","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43181","20.639857","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43182","20.639882","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43183","20.639910","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43184","20.639979","172.30.1.104","172.30.1.205","TCP","54","49671 > 39050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43185","20.639988","172.30.1.104","172.30.1.205","TCP","54","49671 > 39050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43186","20.639994","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43187","20.640021","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43188","20.640297","172.30.1.104","172.30.1.205","TCP","54","49671 > 39054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43189","20.640306","172.30.1.104","172.30.1.205","TCP","54","49671 > 39058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43190","20.640309","172.30.1.104","172.30.1.205","TCP","54","49671 > 39062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43191","20.640312","172.30.1.104","172.30.1.205","TCP","54","49671 > 39066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43192","20.640314","172.30.1.104","172.30.1.205","TCP","54","49671 > 39070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43193","20.640317","172.30.1.104","172.30.1.205","TCP","54","49671 > 39074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43194","20.640319","172.30.1.104","172.30.1.205","TCP","54","49671 > 39074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43195","20.640324","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43196","20.640331","172.30.1.104","172.30.1.205","TCP","54","49671 > 39070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43197","20.640333","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43198","20.640335","172.30.1.104","172.30.1.205","TCP","54","49671 > 39066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43199","20.640337","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43200","20.640484","172.30.1.104","172.30.1.205","TCP","54","49671 > 39054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43201","20.640489","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43202","20.640494","172.30.1.104","172.30.1.205","TCP","54","49671 > 39058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43203","20.640496","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43204","20.640498","172.30.1.104","172.30.1.205","TCP","54","49671 > 39062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43205","20.640499","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43206","20.640662","172.30.1.104","172.30.1.205","TCP","54","49671 > 39078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43207","20.640732","172.30.1.104","172.30.1.205","TCP","54","49671 > 39082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43208","20.640736","172.30.1.104","172.30.1.205","TCP","54","49671 > 39086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43209","20.640738","172.30.1.104","172.30.1.205","TCP","54","49671 > 39090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43210","20.640740","172.30.1.104","172.30.1.205","TCP","54","49671 > 39046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43211","20.640743","172.30.1.104","172.30.1.205","TCP","54","49671 > 39046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43212","20.640747","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43213","20.640754","172.30.1.104","172.30.1.205","TCP","54","49671 > 39090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43214","20.640755","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43215","20.640763","172.30.1.104","172.30.1.205","TCP","54","49671 > 39078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43216","20.640769","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43217","20.640771","172.30.1.104","172.30.1.205","TCP","54","49671 > 39082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43218","20.640772","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43219","20.640785","172.30.1.104","172.30.1.205","TCP","54","49671 > 39086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43220","20.640790","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43221","20.641494","172.30.1.205","172.30.1.104","TCP","54","46456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43222","20.641611","172.30.1.205","172.30.1.104","TCP","74","39094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923868 TSecr=0 WS=128" +"43223","20.641742","172.30.1.104","172.30.1.205","TCP","54","135 > 46456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43224","20.641782","172.30.1.104","172.30.1.205","TCP","54","135 > 46456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43225","20.641792","172.30.1.205","172.30.1.104","TCP","54","46456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43226","20.641908","172.30.1.104","172.30.1.205","TCP","66","49671 > 39094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43227","20.641920","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43228","20.642320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43229","20.642825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43230","20.642839","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43231","20.644828","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43232","20.645218","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43233","20.645228","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43234","20.646677","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43235","20.650119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43236","20.650140","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43237","20.651254","172.30.1.205","172.30.1.104","TCP","74","46460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923877 TSecr=0 WS=128" +"43238","20.651586","172.30.1.104","172.30.1.205","TCP","66","135 > 46460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43239","20.651598","172.30.1.205","172.30.1.104","TCP","54","46460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43240","20.651960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43241","20.652234","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43242","20.652244","172.30.1.205","172.30.1.104","TCP","54","46460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43243","20.654460","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43244","20.654878","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43245","20.654884","172.30.1.205","172.30.1.104","TCP","54","46460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43246","20.656698","172.30.1.205","172.30.1.104","TCP","54","46460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43247","20.656834","172.30.1.205","172.30.1.104","TCP","74","39098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923883 TSecr=0 WS=128" +"43248","20.656985","172.30.1.104","172.30.1.205","TCP","54","135 > 46460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43249","20.657020","172.30.1.104","172.30.1.205","TCP","54","135 > 46460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43250","20.657025","172.30.1.205","172.30.1.104","TCP","54","46460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43251","20.657115","172.30.1.104","172.30.1.205","TCP","66","49671 > 39098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43252","20.657123","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43253","20.657474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43254","20.657772","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43255","20.657781","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43256","20.659667","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43257","20.660010","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43258","20.660017","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43259","20.661414","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43260","20.664748","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43261","20.664758","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43262","20.665722","172.30.1.205","172.30.1.104","TCP","74","46464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923892 TSecr=0 WS=128" +"43263","20.666044","172.30.1.104","172.30.1.205","TCP","66","135 > 46464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43264","20.666056","172.30.1.205","172.30.1.104","TCP","54","46464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43265","20.666414","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43266","20.666732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43267","20.666741","172.30.1.205","172.30.1.104","TCP","54","46464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43268","20.668970","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43269","20.669430","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43270","20.669437","172.30.1.205","172.30.1.104","TCP","54","46464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43271","20.671257","172.30.1.205","172.30.1.104","TCP","54","46464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43272","20.671371","172.30.1.205","172.30.1.104","TCP","74","39102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923897 TSecr=0 WS=128" +"43273","20.671547","172.30.1.104","172.30.1.205","TCP","54","135 > 46464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43274","20.671559","172.30.1.104","172.30.1.205","TCP","54","135 > 46464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43275","20.671564","172.30.1.205","172.30.1.104","TCP","54","46464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43276","20.671662","172.30.1.104","172.30.1.205","TCP","66","49671 > 39102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43277","20.671670","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43278","20.672019","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43279","20.672291","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43280","20.672299","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43281","20.674208","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43282","20.674598","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43283","20.674605","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43284","20.675957","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43285","20.679390","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43286","20.679401","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43287","20.680384","172.30.1.205","172.30.1.104","TCP","74","46468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923906 TSecr=0 WS=128" +"43288","20.680770","172.30.1.104","172.30.1.205","TCP","66","135 > 46468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43289","20.680791","172.30.1.205","172.30.1.104","TCP","54","46468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43290","20.681175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43291","20.681505","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43292","20.681514","172.30.1.205","172.30.1.104","TCP","54","46468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43293","20.683750","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43294","20.684196","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43295","20.684203","172.30.1.205","172.30.1.104","TCP","54","46468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43296","20.686043","172.30.1.205","172.30.1.104","TCP","54","46468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43297","20.686154","172.30.1.205","172.30.1.104","TCP","74","39106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923912 TSecr=0 WS=128" +"43298","20.686319","172.30.1.104","172.30.1.205","TCP","54","135 > 46468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43299","20.686353","172.30.1.104","172.30.1.205","TCP","54","135 > 46468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43300","20.686359","172.30.1.205","172.30.1.104","TCP","54","46468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43301","20.686482","172.30.1.104","172.30.1.205","TCP","66","49671 > 39106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43302","20.686491","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43303","20.686853","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43304","20.687182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43305","20.687192","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43306","20.689257","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43307","20.689660","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43308","20.689667","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43309","20.691033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43310","20.694398","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43311","20.694408","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43312","20.695374","172.30.1.205","172.30.1.104","TCP","74","46472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923921 TSecr=0 WS=128" +"43313","20.695662","172.30.1.104","172.30.1.205","TCP","66","135 > 46472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43314","20.695673","172.30.1.205","172.30.1.104","TCP","54","46472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43315","20.696042","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43316","20.696357","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43317","20.696366","172.30.1.205","172.30.1.104","TCP","54","46472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43318","20.698571","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43319","20.698984","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43320","20.699002","172.30.1.205","172.30.1.104","TCP","54","46472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43321","20.700841","172.30.1.205","172.30.1.104","TCP","54","46472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43322","20.700952","172.30.1.205","172.30.1.104","TCP","74","39110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923927 TSecr=0 WS=128" +"43323","20.701115","172.30.1.104","172.30.1.205","TCP","54","135 > 46472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43324","20.701153","172.30.1.104","172.30.1.205","TCP","54","135 > 46472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43325","20.701159","172.30.1.205","172.30.1.104","TCP","54","46472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43326","20.701265","172.30.1.104","172.30.1.205","TCP","66","49671 > 39110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43327","20.701273","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43328","20.701621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43329","20.701930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43330","20.701939","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43331","20.703815","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43332","20.704203","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43333","20.704209","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43334","20.705585","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43335","20.708937","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43336","20.708947","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43337","20.709904","172.30.1.205","172.30.1.104","TCP","74","46476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923936 TSecr=0 WS=128" +"43338","20.710282","172.30.1.104","172.30.1.205","TCP","66","135 > 46476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43339","20.710292","172.30.1.205","172.30.1.104","TCP","54","46476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43340","20.710636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43341","20.710972","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43342","20.710981","172.30.1.205","172.30.1.104","TCP","54","46476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43343","20.713186","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43344","20.713555","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43345","20.713562","172.30.1.205","172.30.1.104","TCP","54","46476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43346","20.715386","172.30.1.205","172.30.1.104","TCP","54","46476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43347","20.715499","172.30.1.205","172.30.1.104","TCP","74","39114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923941 TSecr=0 WS=128" +"43348","20.715697","172.30.1.104","172.30.1.205","TCP","54","135 > 46476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43349","20.715722","172.30.1.104","172.30.1.205","TCP","54","135 > 46476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43350","20.715728","172.30.1.205","172.30.1.104","TCP","54","46476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43351","20.715844","172.30.1.104","172.30.1.205","TCP","66","49671 > 39114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43352","20.715852","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43353","20.716200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43354","20.716506","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43355","20.716514","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43356","20.718414","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43357","20.718793","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43358","20.718799","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43359","20.720138","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43360","20.723693","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43361","20.723702","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43362","20.724640","172.30.1.205","172.30.1.104","TCP","74","46480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923951 TSecr=0 WS=128" +"43363","20.724941","172.30.1.104","172.30.1.205","TCP","66","135 > 46480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43364","20.724951","172.30.1.205","172.30.1.104","TCP","54","46480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43365","20.725340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43366","20.725642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43367","20.725651","172.30.1.205","172.30.1.104","TCP","54","46480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43368","20.727918","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43369","20.728367","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43370","20.728374","172.30.1.205","172.30.1.104","TCP","54","46480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43371","20.730201","172.30.1.205","172.30.1.104","TCP","54","46480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43372","20.730313","172.30.1.205","172.30.1.104","TCP","74","39118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923956 TSecr=0 WS=128" +"43373","20.730490","172.30.1.104","172.30.1.205","TCP","54","135 > 46480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43374","20.730501","172.30.1.104","172.30.1.205","TCP","54","135 > 46480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43375","20.730506","172.30.1.205","172.30.1.104","TCP","54","46480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43376","20.730632","172.30.1.104","172.30.1.205","TCP","66","49671 > 39118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43377","20.730640","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43378","20.730987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43379","20.731285","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43380","20.731294","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43381","20.733208","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43382","20.733597","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43383","20.733604","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43384","20.734973","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43385","20.738315","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43386","20.738326","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43387","20.739280","172.30.1.205","172.30.1.104","TCP","74","46484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923965 TSecr=0 WS=128" +"43388","20.739570","172.30.1.104","172.30.1.205","TCP","66","135 > 46484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43389","20.739581","172.30.1.205","172.30.1.104","TCP","54","46484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43390","20.739927","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43391","20.740215","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43392","20.740225","172.30.1.205","172.30.1.104","TCP","54","46484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43393","20.742439","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43394","20.742826","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43395","20.742833","172.30.1.205","172.30.1.104","TCP","54","46484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43396","20.744629","172.30.1.205","172.30.1.104","TCP","54","46484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43397","20.744737","172.30.1.205","172.30.1.104","TCP","74","39122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923971 TSecr=0 WS=128" +"43398","20.744907","172.30.1.104","172.30.1.205","TCP","54","135 > 46484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43399","20.744930","172.30.1.104","172.30.1.205","TCP","54","135 > 46484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43400","20.744937","172.30.1.205","172.30.1.104","TCP","54","46484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43401","20.745082","172.30.1.104","172.30.1.205","TCP","66","49671 > 39122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43402","20.745090","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43403","20.745442","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43404","20.746556","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43405","20.746563","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43406","20.748426","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43407","20.748773","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43408","20.748788","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43409","20.750188","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43410","20.753674","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43411","20.753684","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43412","20.754639","172.30.1.205","172.30.1.104","TCP","74","46488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923981 TSecr=0 WS=128" +"43413","20.754985","172.30.1.104","172.30.1.205","TCP","66","135 > 46488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43414","20.754997","172.30.1.205","172.30.1.104","TCP","54","46488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43415","20.755356","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43416","20.755676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43417","20.755690","172.30.1.205","172.30.1.104","TCP","54","46488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43418","20.758004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43419","20.758454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43420","20.758462","172.30.1.205","172.30.1.104","TCP","54","46488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43421","20.760299","172.30.1.205","172.30.1.104","TCP","54","46488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43422","20.760417","172.30.1.205","172.30.1.104","TCP","74","39126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923986 TSecr=0 WS=128" +"43423","20.760596","172.30.1.104","172.30.1.205","TCP","54","135 > 46488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43424","20.760609","172.30.1.104","172.30.1.205","TCP","54","135 > 46488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43425","20.760615","172.30.1.205","172.30.1.104","TCP","54","46488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43426","20.760699","172.30.1.104","172.30.1.205","TCP","66","49671 > 39126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43427","20.760708","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43428","20.761083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43429","20.762186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43430","20.762203","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43431","20.764331","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43432","20.764703","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43433","20.764710","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43434","20.766076","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43435","20.769319","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43436","20.769330","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43437","20.770290","172.30.1.205","172.30.1.104","TCP","74","46492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923996 TSecr=0 WS=128" +"43438","20.770619","172.30.1.104","172.30.1.205","TCP","66","135 > 46492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43439","20.770631","172.30.1.205","172.30.1.104","TCP","54","46492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43440","20.770995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43441","20.771328","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43442","20.771337","172.30.1.205","172.30.1.104","TCP","54","46492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43443","20.773530","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43444","20.773979","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43445","20.773985","172.30.1.205","172.30.1.104","TCP","54","46492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43446","20.775787","172.30.1.205","172.30.1.104","TCP","54","46492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43447","20.775897","172.30.1.205","172.30.1.104","TCP","74","39130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924002 TSecr=0 WS=128" +"43448","20.776067","172.30.1.104","172.30.1.205","TCP","54","135 > 46492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43449","20.776077","172.30.1.104","172.30.1.205","TCP","54","135 > 46492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43450","20.776082","172.30.1.205","172.30.1.104","TCP","54","46492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43451","20.776195","172.30.1.104","172.30.1.205","TCP","66","49671 > 39130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43452","20.776204","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43453","20.776545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43454","20.776844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43455","20.776853","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43456","20.778723","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43457","20.779087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43458","20.779094","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43459","20.780428","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43460","20.783616","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43461","20.783626","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43462","20.784584","172.30.1.205","172.30.1.104","TCP","74","46496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924011 TSecr=0 WS=128" +"43463","20.784879","172.30.1.104","172.30.1.205","TCP","66","135 > 46496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43464","20.784890","172.30.1.205","172.30.1.104","TCP","54","46496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43465","20.785261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43466","20.785575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43467","20.785584","172.30.1.205","172.30.1.104","TCP","54","46496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43468","20.787756","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43469","20.788181","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43470","20.788188","172.30.1.205","172.30.1.104","TCP","54","46496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43471","20.789999","172.30.1.205","172.30.1.104","TCP","54","46496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43472","20.790113","172.30.1.205","172.30.1.104","TCP","74","39134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924016 TSecr=0 WS=128" +"43473","20.790287","172.30.1.104","172.30.1.205","TCP","54","135 > 46496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43474","20.790356","172.30.1.104","172.30.1.205","TCP","54","135 > 46496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43475","20.790362","172.30.1.205","172.30.1.104","TCP","54","46496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43476","20.790436","172.30.1.104","172.30.1.205","TCP","66","49671 > 39134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43477","20.790444","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43478","20.790794","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43479","20.791383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43480","20.791391","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43481","20.793318","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43482","20.793741","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43483","20.793747","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43484","20.795092","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43485","20.798508","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43486","20.798520","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43487","20.799492","172.30.1.205","172.30.1.104","TCP","74","46500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924025 TSecr=0 WS=128" +"43488","20.799878","172.30.1.104","172.30.1.205","TCP","66","135 > 46500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43489","20.799888","172.30.1.205","172.30.1.104","TCP","54","46500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43490","20.800238","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43491","20.800597","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43492","20.800606","172.30.1.205","172.30.1.104","TCP","54","46500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43493","20.802802","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43494","20.803231","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43495","20.803238","172.30.1.205","172.30.1.104","TCP","54","46500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43496","20.805065","172.30.1.205","172.30.1.104","TCP","54","46500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43497","20.805173","172.30.1.205","172.30.1.104","TCP","74","39138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924031 TSecr=0 WS=128" +"43498","20.805425","172.30.1.104","172.30.1.205","TCP","54","135 > 46500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43499","20.805433","172.30.1.104","172.30.1.205","TCP","54","135 > 46500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43500","20.805438","172.30.1.205","172.30.1.104","TCP","54","46500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43501","20.805469","172.30.1.104","172.30.1.205","TCP","66","49671 > 39138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43502","20.805477","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43503","20.805815","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43504","20.806134","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43505","20.806143","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43506","20.808000","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43507","20.808423","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43508","20.808429","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43509","20.809787","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43510","20.813191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43511","20.813200","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43512","20.814134","172.30.1.205","172.30.1.104","TCP","74","46504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924040 TSecr=0 WS=128" +"43513","20.814478","172.30.1.104","172.30.1.205","TCP","66","135 > 46504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43514","20.814498","172.30.1.205","172.30.1.104","TCP","54","46504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43515","20.815052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43516","20.815372","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43517","20.815381","172.30.1.205","172.30.1.104","TCP","54","46504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43518","20.817571","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43519","20.818000","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43520","20.818007","172.30.1.205","172.30.1.104","TCP","54","46504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43521","20.818854","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43522","20.818902","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43523","20.818939","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43524","20.818972","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43525","20.818999","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43526","20.819031","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43527","20.819057","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43528","20.819091","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43529","20.819117","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43530","20.819148","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43531","20.819175","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43532","20.819242","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43533","20.819509","172.30.1.104","172.30.1.205","TCP","54","49671 > 39098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43534","20.819525","172.30.1.104","172.30.1.205","TCP","54","49671 > 39102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43535","20.819557","172.30.1.104","172.30.1.205","TCP","54","49671 > 39098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43536","20.819563","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43537","20.819576","172.30.1.104","172.30.1.205","TCP","54","49671 > 39106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43538","20.819632","172.30.1.104","172.30.1.205","TCP","54","49671 > 39110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43539","20.819652","172.30.1.104","172.30.1.205","TCP","54","49671 > 39110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43540","20.819656","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43541","20.819672","172.30.1.104","172.30.1.205","TCP","54","49671 > 39114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43542","20.819695","172.30.1.104","172.30.1.205","TCP","54","49671 > 39118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43543","20.819742","172.30.1.104","172.30.1.205","TCP","54","49671 > 39118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43544","20.819744","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43545","20.819762","172.30.1.104","172.30.1.205","TCP","54","49671 > 39122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43546","20.819785","172.30.1.104","172.30.1.205","TCP","54","49671 > 39114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43547","20.819789","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43548","20.819808","172.30.1.104","172.30.1.205","TCP","54","49671 > 39126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43549","20.819837","172.30.1.104","172.30.1.205","TCP","54","49671 > 39126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43550","20.819841","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43551","20.819858","172.30.1.104","172.30.1.205","TCP","54","49671 > 39130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43552","20.819881","172.30.1.104","172.30.1.205","TCP","54","49671 > 39122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43553","20.819885","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43554","20.819973","172.30.1.104","172.30.1.205","TCP","54","49671 > 39130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43555","20.819977","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43556","20.819994","172.30.1.104","172.30.1.205","TCP","54","49671 > 39134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43557","20.820015","172.30.1.104","172.30.1.205","TCP","54","49671 > 39102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43558","20.820018","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43559","20.820035","172.30.1.104","172.30.1.205","TCP","54","49671 > 39138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43560","20.820064","172.30.1.104","172.30.1.205","TCP","54","49671 > 39138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43561","20.820068","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43562","20.820397","172.30.1.104","172.30.1.205","TCP","54","49671 > 39094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43563","20.820419","172.30.1.104","172.30.1.205","TCP","54","49671 > 39094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43564","20.820424","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43565","20.820441","172.30.1.104","172.30.1.205","TCP","54","49671 > 39106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43566","20.820443","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43567","20.820497","172.30.1.104","172.30.1.205","TCP","54","49671 > 39134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43568","20.820501","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43569","20.820855","172.30.1.205","172.30.1.104","TCP","54","46504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43570","20.820963","172.30.1.205","172.30.1.104","TCP","74","39142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924047 TSecr=0 WS=128" +"43571","20.821143","172.30.1.104","172.30.1.205","TCP","54","135 > 46504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43572","20.821171","172.30.1.104","172.30.1.205","TCP","54","135 > 46504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43573","20.821176","172.30.1.205","172.30.1.104","TCP","54","46504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43574","20.821247","172.30.1.104","172.30.1.205","TCP","66","49671 > 39142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43575","20.821255","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43576","20.821611","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43577","20.821967","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43578","20.821974","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43579","20.823837","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43580","20.824240","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43581","20.824247","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43582","20.825630","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43583","20.829185","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43584","20.829195","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43585","20.830168","172.30.1.205","172.30.1.104","TCP","74","46508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924056 TSecr=0 WS=128" +"43586","20.830503","172.30.1.104","172.30.1.205","TCP","66","135 > 46508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43587","20.830514","172.30.1.205","172.30.1.104","TCP","54","46508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43588","20.830871","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43589","20.831183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43590","20.831192","172.30.1.205","172.30.1.104","TCP","54","46508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43591","20.833378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43592","20.833820","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43593","20.833826","172.30.1.205","172.30.1.104","TCP","54","46508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43594","20.835648","172.30.1.205","172.30.1.104","TCP","54","46508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43595","20.835761","172.30.1.205","172.30.1.104","TCP","74","39146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924062 TSecr=0 WS=128" +"43596","20.835935","172.30.1.104","172.30.1.205","TCP","54","135 > 46508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43597","20.835967","172.30.1.104","172.30.1.205","TCP","54","135 > 46508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43598","20.835973","172.30.1.205","172.30.1.104","TCP","54","46508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43599","20.836072","172.30.1.104","172.30.1.205","TCP","66","49671 > 39146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43600","20.836080","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43601","20.836431","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43602","20.836754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43603","20.836763","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43604","20.838701","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43605","20.839214","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43606","20.839227","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43607","20.840681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43608","20.844135","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43609","20.844146","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43610","20.845113","172.30.1.205","172.30.1.104","TCP","74","46512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924071 TSecr=0 WS=128" +"43611","20.845454","172.30.1.104","172.30.1.205","TCP","66","135 > 46512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43612","20.845466","172.30.1.205","172.30.1.104","TCP","54","46512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43613","20.845829","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43614","20.846146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43615","20.846155","172.30.1.205","172.30.1.104","TCP","54","46512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43616","20.848361","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43617","20.848789","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43618","20.848796","172.30.1.205","172.30.1.104","TCP","54","46512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43619","20.850597","172.30.1.205","172.30.1.104","TCP","54","46512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43620","20.850707","172.30.1.205","172.30.1.104","TCP","74","39150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924077 TSecr=0 WS=128" +"43621","20.850886","172.30.1.104","172.30.1.205","TCP","54","135 > 46512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43622","20.850906","172.30.1.104","172.30.1.205","TCP","54","135 > 46512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43623","20.850912","172.30.1.205","172.30.1.104","TCP","54","46512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43624","20.851013","172.30.1.104","172.30.1.205","TCP","66","49671 > 39150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43625","20.851021","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43626","20.851364","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43627","20.851646","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43628","20.851655","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43629","20.853549","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43630","20.854340","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43631","20.854346","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43632","20.855688","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43633","20.859149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43634","20.859159","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43635","20.860101","172.30.1.205","172.30.1.104","TCP","74","46516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924086 TSecr=0 WS=128" +"43636","20.860403","172.30.1.104","172.30.1.205","TCP","66","135 > 46516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43637","20.860413","172.30.1.205","172.30.1.104","TCP","54","46516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43638","20.860760","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43639","20.861864","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43640","20.861882","172.30.1.205","172.30.1.104","TCP","54","46516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43641","20.864203","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43642","20.864634","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43643","20.864641","172.30.1.205","172.30.1.104","TCP","54","46516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43644","20.866464","172.30.1.205","172.30.1.104","TCP","54","46516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43645","20.866585","172.30.1.205","172.30.1.104","TCP","74","39154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924093 TSecr=0 WS=128" +"43646","20.866732","172.30.1.104","172.30.1.205","TCP","54","135 > 46516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43647","20.866752","172.30.1.104","172.30.1.205","TCP","54","135 > 46516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43648","20.866757","172.30.1.205","172.30.1.104","TCP","54","46516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43649","20.866903","172.30.1.104","172.30.1.205","TCP","66","49671 > 39154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43650","20.866911","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43651","20.867254","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43652","20.867543","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43653","20.867551","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43654","20.869442","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43655","20.869799","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43656","20.869805","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43657","20.871145","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43658","20.874629","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43659","20.874639","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43660","20.875577","172.30.1.205","172.30.1.104","TCP","74","46520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924102 TSecr=0 WS=128" +"43661","20.875919","172.30.1.104","172.30.1.205","TCP","66","135 > 46520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43662","20.875929","172.30.1.205","172.30.1.104","TCP","54","46520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43663","20.876281","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43664","20.876582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43665","20.876591","172.30.1.205","172.30.1.104","TCP","54","46520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43666","20.878775","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43667","20.879222","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43668","20.879229","172.30.1.205","172.30.1.104","TCP","54","46520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43669","20.881052","172.30.1.205","172.30.1.104","TCP","54","46520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43670","20.881161","172.30.1.205","172.30.1.104","TCP","74","39158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924107 TSecr=0 WS=128" +"43671","20.881320","172.30.1.104","172.30.1.205","TCP","54","135 > 46520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43672","20.881374","172.30.1.104","172.30.1.205","TCP","54","135 > 46520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43673","20.881380","172.30.1.205","172.30.1.104","TCP","54","46520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43674","20.881452","172.30.1.104","172.30.1.205","TCP","66","49671 > 39158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43675","20.881460","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43676","20.881800","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43677","20.882109","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43678","20.882118","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43679","20.883969","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43680","20.884297","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43681","20.884302","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43682","20.885684","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43683","20.888892","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43684","20.888902","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43685","20.889840","172.30.1.205","172.30.1.104","TCP","74","46524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924116 TSecr=0 WS=128" +"43686","20.890148","172.30.1.104","172.30.1.205","TCP","66","135 > 46524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43687","20.890158","172.30.1.205","172.30.1.104","TCP","54","46524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43688","20.890502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43689","20.890794","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43690","20.890803","172.30.1.205","172.30.1.104","TCP","54","46524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43691","20.892996","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43692","20.893399","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43693","20.893405","172.30.1.205","172.30.1.104","TCP","54","46524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43694","20.895206","172.30.1.205","172.30.1.104","TCP","54","46524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43695","20.895314","172.30.1.205","172.30.1.104","TCP","74","39162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924121 TSecr=0 WS=128" +"43696","20.895482","172.30.1.104","172.30.1.205","TCP","54","135 > 46524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43697","20.895491","172.30.1.104","172.30.1.205","TCP","54","135 > 46524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43698","20.895497","172.30.1.205","172.30.1.104","TCP","54","46524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43699","20.895582","172.30.1.104","172.30.1.205","TCP","66","49671 > 39162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43700","20.895591","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43701","20.895940","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43702","20.896214","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43703","20.896222","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43704","20.898140","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43705","20.898497","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43706","20.898503","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43707","20.899857","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43708","20.903275","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43709","20.903284","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43710","20.904228","172.30.1.205","172.30.1.104","TCP","74","46528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924130 TSecr=0 WS=128" +"43711","20.904541","172.30.1.104","172.30.1.205","TCP","66","135 > 46528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43712","20.904553","172.30.1.205","172.30.1.104","TCP","54","46528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43713","20.904933","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43714","20.905251","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43715","20.905260","172.30.1.205","172.30.1.104","TCP","54","46528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43716","20.907440","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43717","20.907876","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43718","20.907888","172.30.1.205","172.30.1.104","TCP","54","46528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43719","20.909924","172.30.1.205","172.30.1.104","TCP","54","46528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43720","20.910033","172.30.1.205","172.30.1.104","TCP","74","39166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924136 TSecr=0 WS=128" +"43721","20.910203","172.30.1.104","172.30.1.205","TCP","54","135 > 46528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43722","20.910211","172.30.1.104","172.30.1.205","TCP","54","135 > 46528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43723","20.910216","172.30.1.205","172.30.1.104","TCP","54","46528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43724","20.910294","172.30.1.104","172.30.1.205","TCP","66","49671 > 39166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43725","20.910302","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43726","20.910646","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43727","20.910910","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43728","20.910919","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43729","20.912819","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43730","20.913195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43731","20.913201","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43732","20.914550","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43733","20.917935","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43734","20.917945","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43735","20.918884","172.30.1.205","172.30.1.104","TCP","74","46532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924145 TSecr=0 WS=128" +"43736","20.919174","172.30.1.104","172.30.1.205","TCP","66","135 > 46532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43737","20.919185","172.30.1.205","172.30.1.104","TCP","54","46532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43738","20.919531","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43739","20.919825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43740","20.919842","172.30.1.205","172.30.1.104","TCP","54","46532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43741","20.922313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43742","20.922696","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43743","20.922703","172.30.1.205","172.30.1.104","TCP","54","46532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43744","20.924546","172.30.1.205","172.30.1.104","TCP","54","46532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43745","20.924655","172.30.1.205","172.30.1.104","TCP","74","39170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924151 TSecr=0 WS=128" +"43746","20.924850","172.30.1.104","172.30.1.205","TCP","54","135 > 46532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43747","20.924859","172.30.1.104","172.30.1.205","TCP","54","135 > 46532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43748","20.924864","172.30.1.205","172.30.1.104","TCP","54","46532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43749","20.924941","172.30.1.104","172.30.1.205","TCP","66","49671 > 39170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43750","20.924949","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43751","20.925300","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43752","20.925586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43753","20.925595","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43754","20.927509","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43755","20.927874","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43756","20.927880","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43757","20.929299","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43758","20.932587","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43759","20.932596","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43760","20.933554","172.30.1.205","172.30.1.104","TCP","74","46536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924159 TSecr=0 WS=128" +"43761","20.933877","172.30.1.104","172.30.1.205","TCP","66","135 > 46536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43762","20.933888","172.30.1.205","172.30.1.104","TCP","54","46536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43763","20.934241","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43764","20.934567","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43765","20.934575","172.30.1.205","172.30.1.104","TCP","54","46536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43766","20.936751","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43767","20.937148","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43768","20.937155","172.30.1.205","172.30.1.104","TCP","54","46536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43769","20.938961","172.30.1.205","172.30.1.104","TCP","54","46536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43770","20.939071","172.30.1.205","172.30.1.104","TCP","74","39174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924165 TSecr=0 WS=128" +"43771","20.939281","172.30.1.104","172.30.1.205","TCP","54","135 > 46536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43772","20.939289","172.30.1.104","172.30.1.205","TCP","54","135 > 46536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43773","20.939294","172.30.1.205","172.30.1.104","TCP","54","46536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43774","20.939370","172.30.1.104","172.30.1.205","TCP","66","49671 > 39174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43775","20.939378","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43776","20.939722","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43777","20.940044","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43778","20.940054","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43779","20.941955","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43780","20.942343","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43781","20.942349","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43782","20.943682","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43783","20.947039","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43784","20.947049","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43785","20.947993","172.30.1.205","172.30.1.104","TCP","74","46540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924174 TSecr=0 WS=128" +"43786","20.948317","172.30.1.104","172.30.1.205","TCP","66","135 > 46540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43787","20.948328","172.30.1.205","172.30.1.104","TCP","54","46540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43788","20.948688","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43789","20.949006","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43790","20.949015","172.30.1.205","172.30.1.104","TCP","54","46540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43791","20.951221","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43792","20.951653","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43793","20.951659","172.30.1.205","172.30.1.104","TCP","54","46540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43794","20.953486","172.30.1.205","172.30.1.104","TCP","54","46540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43795","20.953595","172.30.1.205","172.30.1.104","TCP","74","39178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924180 TSecr=0 WS=128" +"43796","20.953768","172.30.1.104","172.30.1.205","TCP","54","135 > 46540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43797","20.953799","172.30.1.104","172.30.1.205","TCP","54","135 > 46540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43798","20.953805","172.30.1.205","172.30.1.104","TCP","54","46540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43799","20.953888","172.30.1.104","172.30.1.205","TCP","66","49671 > 39178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43800","20.953896","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43801","20.954239","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43802","20.954544","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43803","20.954552","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43804","20.956440","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43805","20.956811","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43806","20.956817","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43807","20.958175","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43808","20.961559","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43809","20.961569","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43810","20.962549","172.30.1.205","172.30.1.104","TCP","74","46544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924188 TSecr=0 WS=128" +"43811","20.962844","172.30.1.104","172.30.1.205","TCP","66","135 > 46544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43812","20.962861","172.30.1.205","172.30.1.104","TCP","54","46544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43813","20.963218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43814","20.963513","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43815","20.963521","172.30.1.205","172.30.1.104","TCP","54","46544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43816","20.965757","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43817","20.966190","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43818","20.966196","172.30.1.205","172.30.1.104","TCP","54","46544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43819","20.968006","172.30.1.205","172.30.1.104","TCP","54","46544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43820","20.968124","172.30.1.205","172.30.1.104","TCP","74","39182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924194 TSecr=0 WS=128" +"43821","20.968277","172.30.1.104","172.30.1.205","TCP","54","135 > 46544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43822","20.968298","172.30.1.104","172.30.1.205","TCP","54","135 > 46544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43823","20.968304","172.30.1.205","172.30.1.104","TCP","54","46544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43824","20.968452","172.30.1.104","172.30.1.205","TCP","66","49671 > 39182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43825","20.968461","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43826","20.968828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43827","20.969119","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43828","20.969133","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43829","20.971114","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43830","20.971494","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43831","20.971501","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43832","20.972944","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43833","20.976346","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43834","20.976358","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43835","20.977362","172.30.1.205","172.30.1.104","TCP","74","46548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924203 TSecr=0 WS=128" +"43836","20.977731","172.30.1.104","172.30.1.205","TCP","66","135 > 46548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43837","20.977743","172.30.1.205","172.30.1.104","TCP","54","46548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43838","20.978104","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43839","20.978413","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43840","20.978422","172.30.1.205","172.30.1.104","TCP","54","46548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43841","20.980614","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43842","20.981029","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43843","20.981037","172.30.1.205","172.30.1.104","TCP","54","46548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43844","20.982865","172.30.1.205","172.30.1.104","TCP","54","46548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43845","20.982980","172.30.1.205","172.30.1.104","TCP","74","39186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924209 TSecr=0 WS=128" +"43846","20.983142","172.30.1.104","172.30.1.205","TCP","54","135 > 46548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43847","20.983154","172.30.1.104","172.30.1.205","TCP","54","135 > 46548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43848","20.983160","172.30.1.205","172.30.1.104","TCP","54","46548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43849","20.983274","172.30.1.104","172.30.1.205","TCP","66","49671 > 39186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43850","20.983291","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43851","20.983632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43852","20.983912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43853","20.983921","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43854","20.985836","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43855","20.986213","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43856","20.986220","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43857","20.987567","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43858","20.992277","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43859","20.992286","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43860","20.993264","172.30.1.205","172.30.1.104","TCP","74","46552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924219 TSecr=0 WS=128" +"43861","20.993581","172.30.1.104","172.30.1.205","TCP","66","135 > 46552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43862","20.993592","172.30.1.205","172.30.1.104","TCP","54","46552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43863","20.993956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43864","20.994237","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43865","20.994245","172.30.1.205","172.30.1.104","TCP","54","46552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43866","20.996417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43867","20.996810","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43868","20.996817","172.30.1.205","172.30.1.104","TCP","54","46552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43869","20.997673","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43870","20.997722","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43871","20.997760","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43872","20.997788","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43873","20.997822","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43874","20.997854","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43875","20.997889","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43876","20.997915","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43877","20.997948","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43878","20.997973","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43879","20.997986","172.30.1.104","172.30.1.205","TCP","54","49671 > 39146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43880","20.998001","172.30.1.104","172.30.1.205","TCP","54","49671 > 39150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43881","20.998029","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43882","20.998068","172.30.1.104","172.30.1.205","TCP","54","49671 > 39154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43883","20.998116","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43884","20.998275","172.30.1.104","172.30.1.205","TCP","54","49671 > 39146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43885","20.998283","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43886","20.998291","172.30.1.104","172.30.1.205","TCP","54","49671 > 39158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43887","20.998318","172.30.1.104","172.30.1.205","TCP","54","49671 > 39158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43888","20.998322","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43889","20.998337","172.30.1.104","172.30.1.205","TCP","54","49671 > 39150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43890","20.998340","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43891","20.998356","172.30.1.104","172.30.1.205","TCP","54","49671 > 39154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43892","20.998359","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43893","20.998377","172.30.1.104","172.30.1.205","TCP","54","49671 > 39162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43894","20.998397","172.30.1.104","172.30.1.205","TCP","54","49671 > 39166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43895","20.998417","172.30.1.104","172.30.1.205","TCP","54","49671 > 39166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43896","20.998421","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43897","20.998436","172.30.1.104","172.30.1.205","TCP","54","49671 > 39170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43898","20.998455","172.30.1.104","172.30.1.205","TCP","54","49671 > 39174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43899","20.998475","172.30.1.104","172.30.1.205","TCP","54","49671 > 39162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43900","20.998480","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43901","20.998494","172.30.1.104","172.30.1.205","TCP","54","49671 > 39178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43902","20.998514","172.30.1.104","172.30.1.205","TCP","54","49671 > 39178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43903","20.998518","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43904","20.998534","172.30.1.104","172.30.1.205","TCP","54","49671 > 39182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43905","20.998571","172.30.1.104","172.30.1.205","TCP","54","49671 > 39174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43906","20.998575","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43907","20.998750","172.30.1.104","172.30.1.205","TCP","54","49671 > 39186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43908","20.998765","172.30.1.104","172.30.1.205","TCP","54","49671 > 39186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43909","20.998769","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43910","20.998783","172.30.1.104","172.30.1.205","TCP","54","49671 > 39182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43911","20.998785","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43912","20.998802","172.30.1.104","172.30.1.205","TCP","54","49671 > 39170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43913","20.998804","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43914","20.998820","172.30.1.104","172.30.1.205","TCP","54","49671 > 39142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43915","20.998840","172.30.1.104","172.30.1.205","TCP","54","49671 > 39142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"43916","20.998843","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"43917","20.999656","172.30.1.205","172.30.1.104","TCP","54","46552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43918","20.999771","172.30.1.205","172.30.1.104","TCP","74","39190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924226 TSecr=0 WS=128" +"43919","20.999894","172.30.1.104","172.30.1.205","TCP","54","135 > 46552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43920","20.999928","172.30.1.104","172.30.1.205","TCP","54","135 > 46552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43921","20.999933","172.30.1.205","172.30.1.104","TCP","54","46552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43922","21.000038","172.30.1.104","172.30.1.205","TCP","66","49671 > 39190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43923","21.000046","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43924","21.000422","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43925","21.000703","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43926","21.000711","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43927","21.002614","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43928","21.002984","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43929","21.002990","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43930","21.004350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43931","21.007847","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43932","21.007860","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43933","21.008907","172.30.1.205","172.30.1.104","TCP","74","46556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924235 TSecr=0 WS=128" +"43934","21.009267","172.30.1.104","172.30.1.205","TCP","66","135 > 46556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43935","21.009278","172.30.1.205","172.30.1.104","TCP","54","46556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43936","21.009638","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43937","21.009919","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43938","21.009928","172.30.1.205","172.30.1.104","TCP","54","46556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43939","21.012175","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43940","21.012661","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43941","21.012669","172.30.1.205","172.30.1.104","TCP","54","46556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43942","21.014548","172.30.1.205","172.30.1.104","TCP","54","46556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43943","21.014703","172.30.1.205","172.30.1.104","TCP","74","39194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924241 TSecr=0 WS=128" +"43944","21.014813","172.30.1.104","172.30.1.205","TCP","54","135 > 46556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43945","21.014857","172.30.1.104","172.30.1.205","TCP","54","135 > 46556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43946","21.014866","172.30.1.205","172.30.1.104","TCP","54","46556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43947","21.014979","172.30.1.104","172.30.1.205","TCP","66","49671 > 39194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43948","21.014988","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43949","21.015349","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43950","21.016175","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43951","21.016185","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43952","21.018149","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43953","21.018613","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43954","21.018619","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43955","21.019981","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43956","21.023431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43957","21.023446","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43958","21.024552","172.30.1.205","172.30.1.104","TCP","74","46560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924250 TSecr=0 WS=128" +"43959","21.024875","172.30.1.104","172.30.1.205","TCP","66","135 > 46560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43960","21.024888","172.30.1.205","172.30.1.104","TCP","54","46560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43961","21.025265","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43962","21.025554","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43963","21.025564","172.30.1.205","172.30.1.104","TCP","54","46560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43964","21.027816","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43965","21.028238","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43966","21.028245","172.30.1.205","172.30.1.104","TCP","54","46560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43967","21.030110","172.30.1.205","172.30.1.104","TCP","54","46560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43968","21.030237","172.30.1.205","172.30.1.104","TCP","74","39198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924256 TSecr=0 WS=128" +"43969","21.030394","172.30.1.104","172.30.1.205","TCP","54","135 > 46560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43970","21.030408","172.30.1.104","172.30.1.205","TCP","54","135 > 46560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43971","21.030415","172.30.1.205","172.30.1.104","TCP","54","46560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43972","21.030569","172.30.1.104","172.30.1.205","TCP","66","49671 > 39198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43973","21.030579","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43974","21.030933","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"43975","21.031588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43976","21.031595","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43977","21.033522","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"43978","21.033878","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"43979","21.033885","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"43980","21.035253","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"43981","21.038612","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"43982","21.038623","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"43983","21.039668","172.30.1.205","172.30.1.104","TCP","74","46564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924266 TSecr=0 WS=128" +"43984","21.040011","172.30.1.104","172.30.1.205","TCP","66","135 > 46564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43985","21.040024","172.30.1.205","172.30.1.104","TCP","54","46564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43986","21.040398","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"43987","21.040718","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"43988","21.040730","172.30.1.205","172.30.1.104","TCP","54","46564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"43989","21.042992","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"43990","21.043480","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"43991","21.043487","172.30.1.205","172.30.1.104","TCP","54","46564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43992","21.045344","172.30.1.205","172.30.1.104","TCP","54","46564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"43993","21.045472","172.30.1.205","172.30.1.104","TCP","74","39202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924271 TSecr=0 WS=128" +"43994","21.045671","172.30.1.104","172.30.1.205","TCP","54","135 > 46564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43995","21.045682","172.30.1.104","172.30.1.205","TCP","54","135 > 46564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"43996","21.045689","172.30.1.205","172.30.1.104","TCP","54","46564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"43997","21.045840","172.30.1.104","172.30.1.205","TCP","66","49671 > 39202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"43998","21.045855","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"43999","21.046207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44000","21.046542","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44001","21.046551","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44002","21.048453","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44003","21.048855","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44004","21.048862","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44005","21.050242","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44006","21.053619","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44007","21.053629","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44008","21.054608","172.30.1.205","172.30.1.104","TCP","74","46568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924281 TSecr=0 WS=128" +"44009","21.054935","172.30.1.104","172.30.1.205","TCP","66","135 > 46568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44010","21.054946","172.30.1.205","172.30.1.104","TCP","54","46568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44011","21.055299","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44012","21.055633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44013","21.055641","172.30.1.205","172.30.1.104","TCP","54","46568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44014","21.057882","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44015","21.058312","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44016","21.058319","172.30.1.205","172.30.1.104","TCP","54","46568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44017","21.060169","172.30.1.205","172.30.1.104","TCP","54","46568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44018","21.060293","172.30.1.205","172.30.1.104","TCP","74","39206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924286 TSecr=0 WS=128" +"44019","21.060473","172.30.1.104","172.30.1.205","TCP","54","135 > 46568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44020","21.060516","172.30.1.104","172.30.1.205","TCP","54","135 > 46568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44021","21.060523","172.30.1.205","172.30.1.104","TCP","54","46568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44022","21.060628","172.30.1.104","172.30.1.205","TCP","66","49671 > 39206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44023","21.060636","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44024","21.061015","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44025","21.061356","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44026","21.061365","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44027","21.063266","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44028","21.063651","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44029","21.063658","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44030","21.065050","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44031","21.068459","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44032","21.068470","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44033","21.069490","172.30.1.205","172.30.1.104","TCP","74","46572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924295 TSecr=0 WS=128" +"44034","21.069824","172.30.1.104","172.30.1.205","TCP","66","135 > 46572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44035","21.069836","172.30.1.205","172.30.1.104","TCP","54","46572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44036","21.070208","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44037","21.070504","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44038","21.070514","172.30.1.205","172.30.1.104","TCP","54","46572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44039","21.072738","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44040","21.073164","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44041","21.073171","172.30.1.205","172.30.1.104","TCP","54","46572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44042","21.075018","172.30.1.205","172.30.1.104","TCP","54","46572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44043","21.075142","172.30.1.205","172.30.1.104","TCP","74","39210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924301 TSecr=0 WS=128" +"44044","21.075349","172.30.1.104","172.30.1.205","TCP","54","135 > 46572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44045","21.075362","172.30.1.104","172.30.1.205","TCP","54","135 > 46572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44046","21.075369","172.30.1.205","172.30.1.104","TCP","54","46572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44047","21.075479","172.30.1.104","172.30.1.205","TCP","66","49671 > 39210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44048","21.075488","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44049","21.075845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44050","21.076136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44051","21.076144","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44052","21.078067","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44053","21.078449","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44054","21.078456","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44055","21.079818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44056","21.083253","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44057","21.083268","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44058","21.084373","172.30.1.205","172.30.1.104","TCP","74","46576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924310 TSecr=0 WS=128" +"44059","21.084743","172.30.1.104","172.30.1.205","TCP","66","135 > 46576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44060","21.084755","172.30.1.205","172.30.1.104","TCP","54","46576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44061","21.085138","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44062","21.085460","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44063","21.085470","172.30.1.205","172.30.1.104","TCP","54","46576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44064","21.087750","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44065","21.088215","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44066","21.088222","172.30.1.205","172.30.1.104","TCP","54","46576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44067","21.090090","172.30.1.205","172.30.1.104","TCP","54","46576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44068","21.090224","172.30.1.205","172.30.1.104","TCP","74","39214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924316 TSecr=0 WS=128" +"44069","21.090387","172.30.1.104","172.30.1.205","TCP","54","135 > 46576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44070","21.090416","172.30.1.104","172.30.1.205","TCP","54","135 > 46576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44071","21.090424","172.30.1.205","172.30.1.104","TCP","54","46576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44072","21.090555","172.30.1.104","172.30.1.205","TCP","66","49671 > 39214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44073","21.090563","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44074","21.090916","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44075","21.091212","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44076","21.091221","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44077","21.093175","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44078","21.093554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44079","21.093560","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44080","21.094937","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44081","21.098338","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44082","21.098352","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44083","21.099451","172.30.1.205","172.30.1.104","TCP","74","46580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924325 TSecr=0 WS=128" +"44084","21.099784","172.30.1.104","172.30.1.205","TCP","66","135 > 46580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44085","21.099797","172.30.1.205","172.30.1.104","TCP","54","46580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44086","21.100169","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44087","21.100472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44088","21.100481","172.30.1.205","172.30.1.104","TCP","54","46580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44089","21.102776","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44090","21.103177","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44091","21.103183","172.30.1.205","172.30.1.104","TCP","54","46580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44092","21.105050","172.30.1.205","172.30.1.104","TCP","54","46580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44093","21.105206","172.30.1.205","172.30.1.104","TCP","74","39218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924331 TSecr=0 WS=128" +"44094","21.105353","172.30.1.104","172.30.1.205","TCP","54","135 > 46580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44095","21.105367","172.30.1.104","172.30.1.205","TCP","54","135 > 46580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44096","21.105375","172.30.1.205","172.30.1.104","TCP","54","46580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44097","21.105498","172.30.1.104","172.30.1.205","TCP","66","49671 > 39218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44098","21.105507","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44099","21.105867","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44100","21.106163","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44101","21.106172","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44102","21.108092","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44103","21.108455","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44104","21.108461","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44105","21.109876","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44106","21.113269","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44107","21.113283","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44108","21.114407","172.30.1.205","172.30.1.104","TCP","74","46584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924340 TSecr=0 WS=128" +"44109","21.114708","172.30.1.104","172.30.1.205","TCP","66","135 > 46584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44110","21.114722","172.30.1.205","172.30.1.104","TCP","54","46584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44111","21.115083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44112","21.115381","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44113","21.115390","172.30.1.205","172.30.1.104","TCP","54","46584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44114","21.117668","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44115","21.118095","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44116","21.118105","172.30.1.205","172.30.1.104","TCP","54","46584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44117","21.120013","172.30.1.205","172.30.1.104","TCP","54","46584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44118","21.120170","172.30.1.205","172.30.1.104","TCP","74","39222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924346 TSecr=0 WS=128" +"44119","21.120331","172.30.1.104","172.30.1.205","TCP","54","135 > 46584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44120","21.120343","172.30.1.104","172.30.1.205","TCP","54","135 > 46584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44121","21.120354","172.30.1.205","172.30.1.104","TCP","54","46584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44122","21.120494","172.30.1.104","172.30.1.205","TCP","66","49671 > 39222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44123","21.120503","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44124","21.120886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44125","21.121188","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44126","21.121197","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44127","21.123084","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44128","21.123477","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44129","21.123483","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44130","21.124864","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44131","21.128313","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44132","21.128325","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44133","21.129374","172.30.1.205","172.30.1.104","TCP","74","46588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924355 TSecr=0 WS=128" +"44134","21.129693","172.30.1.104","172.30.1.205","TCP","66","135 > 46588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44135","21.129706","172.30.1.205","172.30.1.104","TCP","54","46588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44136","21.130071","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44137","21.130368","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44138","21.130378","172.30.1.205","172.30.1.104","TCP","54","46588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44139","21.132593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44140","21.133015","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44141","21.133022","172.30.1.205","172.30.1.104","TCP","54","46588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44142","21.134864","172.30.1.205","172.30.1.104","TCP","54","46588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44143","21.134994","172.30.1.205","172.30.1.104","TCP","74","39226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924361 TSecr=0 WS=128" +"44144","21.135133","172.30.1.104","172.30.1.205","TCP","54","135 > 46588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44145","21.135157","172.30.1.104","172.30.1.205","TCP","54","135 > 46588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44146","21.135165","172.30.1.205","172.30.1.104","TCP","54","46588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44147","21.135350","172.30.1.104","172.30.1.205","TCP","66","49671 > 39226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44148","21.135358","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44149","21.135705","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44150","21.136017","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44151","21.136026","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44152","21.137943","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44153","21.138303","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44154","21.138310","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44155","21.139666","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44156","21.143027","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44157","21.143045","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44158","21.144220","172.30.1.205","172.30.1.104","TCP","74","46592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924370 TSecr=0 WS=128" +"44159","21.144530","172.30.1.104","172.30.1.205","TCP","66","135 > 46592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44160","21.144546","172.30.1.205","172.30.1.104","TCP","54","46592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44161","21.144966","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44162","21.145323","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44163","21.145333","172.30.1.205","172.30.1.104","TCP","54","46592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44164","21.147595","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44165","21.148009","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44166","21.148016","172.30.1.205","172.30.1.104","TCP","54","46592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44167","21.149877","172.30.1.205","172.30.1.104","TCP","54","46592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44168","21.150022","172.30.1.205","172.30.1.104","TCP","74","39230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924376 TSecr=0 WS=128" +"44169","21.150161","172.30.1.104","172.30.1.205","TCP","54","135 > 46592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44170","21.150173","172.30.1.104","172.30.1.205","TCP","54","135 > 46592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44171","21.150181","172.30.1.205","172.30.1.104","TCP","54","46592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44172","21.150295","172.30.1.104","172.30.1.205","TCP","66","49671 > 39230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44173","21.150304","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44174","21.150653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44175","21.150933","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44176","21.150943","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44177","21.152899","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44178","21.153277","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44179","21.153283","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44180","21.154665","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44181","21.158830","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44182","21.158842","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44183","21.159864","172.30.1.205","172.30.1.104","TCP","74","46596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924386 TSecr=0 WS=128" +"44184","21.160160","172.30.1.104","172.30.1.205","TCP","66","135 > 46596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44185","21.160172","172.30.1.205","172.30.1.104","TCP","54","46596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44186","21.160520","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44187","21.160817","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44188","21.160826","172.30.1.205","172.30.1.104","TCP","54","46596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44189","21.163042","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44190","21.163451","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44191","21.163458","172.30.1.205","172.30.1.104","TCP","54","46596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44192","21.165321","172.30.1.205","172.30.1.104","TCP","54","46596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44193","21.165445","172.30.1.205","172.30.1.104","TCP","74","39234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924391 TSecr=0 WS=128" +"44194","21.165616","172.30.1.104","172.30.1.205","TCP","54","135 > 46596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44195","21.165626","172.30.1.104","172.30.1.205","TCP","54","135 > 46596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44196","21.165633","172.30.1.205","172.30.1.104","TCP","54","46596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44197","21.165733","172.30.1.104","172.30.1.205","TCP","66","49671 > 39234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44198","21.165742","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44199","21.166086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44200","21.166861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44201","21.166870","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44202","21.168744","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44203","21.169161","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44204","21.169167","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44205","21.170511","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44206","21.173961","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44207","21.173971","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44208","21.174986","172.30.1.205","172.30.1.104","TCP","74","46600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924401 TSecr=0 WS=128" +"44209","21.175316","172.30.1.104","172.30.1.205","TCP","66","135 > 46600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44210","21.175328","172.30.1.205","172.30.1.104","TCP","54","46600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44211","21.175687","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44212","21.175995","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44213","21.176004","172.30.1.205","172.30.1.104","TCP","54","46600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44214","21.178232","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44215","21.178668","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44216","21.178675","172.30.1.205","172.30.1.104","TCP","54","46600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44217","21.179528","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44218","21.179579","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44219","21.179615","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44220","21.179645","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44221","21.179673","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44222","21.179707","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44223","21.179734","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44224","21.179761","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44225","21.179787","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44226","21.179818","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44227","21.179845","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44228","21.179916","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44229","21.179937","172.30.1.104","172.30.1.205","TCP","54","49671 > 39194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44230","21.179964","172.30.1.104","172.30.1.205","TCP","54","49671 > 39198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44231","21.180001","172.30.1.104","172.30.1.205","TCP","54","49671 > 39202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44232","21.180041","172.30.1.104","172.30.1.205","TCP","54","49671 > 39194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44233","21.180050","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44234","21.180064","172.30.1.104","172.30.1.205","TCP","54","49671 > 39206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44235","21.180090","172.30.1.104","172.30.1.205","TCP","54","49671 > 39210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44236","21.180115","172.30.1.104","172.30.1.205","TCP","54","49671 > 39214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44237","21.180198","172.30.1.104","172.30.1.205","TCP","54","49671 > 39218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44238","21.180224","172.30.1.104","172.30.1.205","TCP","54","49671 > 39218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44239","21.180238","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44240","21.180263","172.30.1.104","172.30.1.205","TCP","54","49671 > 39214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44241","21.180267","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44242","21.180293","172.30.1.104","172.30.1.205","TCP","54","49671 > 39210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44243","21.180297","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44244","21.180320","172.30.1.104","172.30.1.205","TCP","54","49671 > 39206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44245","21.180323","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44246","21.180346","172.30.1.104","172.30.1.205","TCP","54","49671 > 39198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44247","21.180350","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44248","21.180373","172.30.1.104","172.30.1.205","TCP","54","49671 > 39202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44249","21.180377","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44250","21.180399","172.30.1.104","172.30.1.205","TCP","54","49671 > 39222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44251","21.180426","172.30.1.104","172.30.1.205","TCP","54","49671 > 39226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44252","21.180453","172.30.1.104","172.30.1.205","TCP","54","49671 > 39230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44253","21.180479","172.30.1.104","172.30.1.205","TCP","54","49671 > 39234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44254","21.180506","172.30.1.104","172.30.1.205","TCP","54","49671 > 39234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44255","21.180510","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44256","21.180531","172.30.1.104","172.30.1.205","TCP","54","49671 > 39230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44257","21.180534","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44258","21.180556","172.30.1.104","172.30.1.205","TCP","54","49671 > 39222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44259","21.180559","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44260","21.180594","172.30.1.104","172.30.1.205","TCP","54","49671 > 39226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44261","21.180597","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44262","21.180619","172.30.1.104","172.30.1.205","TCP","54","49671 > 39190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44263","21.180645","172.30.1.104","172.30.1.205","TCP","54","49671 > 39190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44264","21.180648","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44265","21.181582","172.30.1.205","172.30.1.104","TCP","54","46600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44266","21.181702","172.30.1.205","172.30.1.104","TCP","74","39238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924408 TSecr=0 WS=128" +"44267","21.181849","172.30.1.104","172.30.1.205","TCP","54","135 > 46600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44268","21.181872","172.30.1.104","172.30.1.205","TCP","54","135 > 46600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44269","21.181877","172.30.1.205","172.30.1.104","TCP","54","46600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44270","21.181996","172.30.1.104","172.30.1.205","TCP","66","49671 > 39238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44271","21.182004","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44272","21.182358","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44273","21.182654","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44274","21.182662","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44275","21.184552","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44276","21.184958","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44277","21.184965","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44278","21.186364","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44279","21.189914","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44280","21.189924","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44281","21.190916","172.30.1.205","172.30.1.104","TCP","74","46604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924417 TSecr=0 WS=128" +"44282","21.191298","172.30.1.104","172.30.1.205","TCP","66","135 > 46604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44283","21.191310","172.30.1.205","172.30.1.104","TCP","54","46604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44284","21.191670","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44285","21.192003","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44286","21.192012","172.30.1.205","172.30.1.104","TCP","54","46604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44287","21.194220","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44288","21.194618","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44289","21.194625","172.30.1.205","172.30.1.104","TCP","54","46604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44290","21.196426","172.30.1.205","172.30.1.104","TCP","54","46604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44291","21.196535","172.30.1.205","172.30.1.104","TCP","74","39242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924422 TSecr=0 WS=128" +"44292","21.196715","172.30.1.104","172.30.1.205","TCP","54","135 > 46604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44293","21.196726","172.30.1.104","172.30.1.205","TCP","54","135 > 46604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44294","21.196732","172.30.1.205","172.30.1.104","TCP","54","46604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44295","21.196848","172.30.1.104","172.30.1.205","TCP","66","49671 > 39242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44296","21.196857","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44297","21.197223","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44298","21.197541","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44299","21.197550","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44300","21.199431","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44301","21.199807","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44302","21.199813","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44303","21.201193","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44304","21.204532","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44305","21.204541","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44306","21.205503","172.30.1.205","172.30.1.104","TCP","74","46608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924431 TSecr=0 WS=128" +"44307","21.205826","172.30.1.104","172.30.1.205","TCP","66","135 > 46608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44308","21.205839","172.30.1.205","172.30.1.104","TCP","54","46608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44309","21.206203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44310","21.206488","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44311","21.206497","172.30.1.205","172.30.1.104","TCP","54","46608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44312","21.208685","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44313","21.209147","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44314","21.209153","172.30.1.205","172.30.1.104","TCP","54","46608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44315","21.210960","172.30.1.205","172.30.1.104","TCP","54","46608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44316","21.211075","172.30.1.205","172.30.1.104","TCP","74","39246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924437 TSecr=0 WS=128" +"44317","21.211250","172.30.1.104","172.30.1.205","TCP","54","135 > 46608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44318","21.211294","172.30.1.104","172.30.1.205","TCP","54","135 > 46608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44319","21.211301","172.30.1.205","172.30.1.104","TCP","54","46608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44320","21.211380","172.30.1.104","172.30.1.205","TCP","66","49671 > 39246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44321","21.211388","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44322","21.211743","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44323","21.212070","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44324","21.212078","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44325","21.213965","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44326","21.214356","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44327","21.214362","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44328","21.215704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44329","21.219261","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44330","21.219270","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44331","21.220254","172.30.1.205","172.30.1.104","TCP","74","46612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924446 TSecr=0 WS=128" +"44332","21.220616","172.30.1.104","172.30.1.205","TCP","66","135 > 46612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44333","21.220628","172.30.1.205","172.30.1.104","TCP","54","46612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44334","21.221012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44335","21.221314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44336","21.221323","172.30.1.205","172.30.1.104","TCP","54","46612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44337","21.223537","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44338","21.223929","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44339","21.223941","172.30.1.205","172.30.1.104","TCP","54","46612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44340","21.225780","172.30.1.205","172.30.1.104","TCP","54","46612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44341","21.225890","172.30.1.205","172.30.1.104","TCP","74","39250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924452 TSecr=0 WS=128" +"44342","21.226040","172.30.1.104","172.30.1.205","TCP","54","135 > 46612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44343","21.226090","172.30.1.104","172.30.1.205","TCP","54","135 > 46612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44344","21.226096","172.30.1.205","172.30.1.104","TCP","54","46612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44345","21.226186","172.30.1.104","172.30.1.205","TCP","66","49671 > 39250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44346","21.226193","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44347","21.226548","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44348","21.226841","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44349","21.226850","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44350","21.228729","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44351","21.229085","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44352","21.229092","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44353","21.230461","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44354","21.233886","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44355","21.233895","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44356","21.234841","172.30.1.205","172.30.1.104","TCP","74","46616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924461 TSecr=0 WS=128" +"44357","21.235192","172.30.1.104","172.30.1.205","TCP","66","135 > 46616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44358","21.235203","172.30.1.205","172.30.1.104","TCP","54","46616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44359","21.235549","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44360","21.235874","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44361","21.235882","172.30.1.205","172.30.1.104","TCP","54","46616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44362","21.238086","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44363","21.238478","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44364","21.238485","172.30.1.205","172.30.1.104","TCP","54","46616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44365","21.240292","172.30.1.205","172.30.1.104","TCP","54","46616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44366","21.240401","172.30.1.205","172.30.1.104","TCP","74","39254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924466 TSecr=0 WS=128" +"44367","21.240544","172.30.1.104","172.30.1.205","TCP","54","135 > 46616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44368","21.240555","172.30.1.104","172.30.1.205","TCP","54","135 > 46616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44369","21.240561","172.30.1.205","172.30.1.104","TCP","54","46616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44370","21.240669","172.30.1.104","172.30.1.205","TCP","66","49671 > 39254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44371","21.240677","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44372","21.241056","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44373","21.241346","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44374","21.241355","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44375","21.243247","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44376","21.243651","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44377","21.243657","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44378","21.245029","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44379","21.248592","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44380","21.248601","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44381","21.249561","172.30.1.205","172.30.1.104","TCP","74","46620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924475 TSecr=0 WS=128" +"44382","21.249882","172.30.1.104","172.30.1.205","TCP","66","135 > 46620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44383","21.249893","172.30.1.205","172.30.1.104","TCP","54","46620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44384","21.250254","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44385","21.250557","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44386","21.250574","172.30.1.205","172.30.1.104","TCP","54","46620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44387","21.252798","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44388","21.253208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44389","21.253215","172.30.1.205","172.30.1.104","TCP","54","46620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44390","21.255030","172.30.1.205","172.30.1.104","TCP","54","46620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44391","21.255140","172.30.1.205","172.30.1.104","TCP","74","39258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924481 TSecr=0 WS=128" +"44392","21.255292","172.30.1.104","172.30.1.205","TCP","54","135 > 46620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44393","21.255330","172.30.1.104","172.30.1.205","TCP","54","135 > 46620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44394","21.255335","172.30.1.205","172.30.1.104","TCP","54","46620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44395","21.255421","172.30.1.104","172.30.1.205","TCP","66","49671 > 39258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44396","21.255429","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44397","21.255773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44398","21.256063","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44399","21.256074","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44400","21.258253","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44401","21.258636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44402","21.258640","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44403","21.259999","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44404","21.263653","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44405","21.263662","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44406","21.264601","172.30.1.205","172.30.1.104","TCP","74","46624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924491 TSecr=0 WS=128" +"44407","21.264889","172.30.1.104","172.30.1.205","TCP","66","135 > 46624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44408","21.264900","172.30.1.205","172.30.1.104","TCP","54","46624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44409","21.265257","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44410","21.265545","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44411","21.265554","172.30.1.205","172.30.1.104","TCP","54","46624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44412","21.267750","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44413","21.268143","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44414","21.268150","172.30.1.205","172.30.1.104","TCP","54","46624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44415","21.269975","172.30.1.205","172.30.1.104","TCP","54","46624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44416","21.270087","172.30.1.205","172.30.1.104","TCP","74","39262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924496 TSecr=0 WS=128" +"44417","21.270269","172.30.1.104","172.30.1.205","TCP","54","135 > 46624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44418","21.270291","172.30.1.104","172.30.1.205","TCP","54","135 > 46624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44419","21.270296","172.30.1.205","172.30.1.104","TCP","54","46624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44420","21.270400","172.30.1.104","172.30.1.205","TCP","66","49671 > 39262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44421","21.270407","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44422","21.270756","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44423","21.271053","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44424","21.271062","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44425","21.272979","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44426","21.273338","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44427","21.273344","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44428","21.274693","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44429","21.278161","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44430","21.278171","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44431","21.279142","172.30.1.205","172.30.1.104","TCP","74","46628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924505 TSecr=0 WS=128" +"44432","21.279439","172.30.1.104","172.30.1.205","TCP","66","135 > 46628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44433","21.279449","172.30.1.205","172.30.1.104","TCP","54","46628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44434","21.279806","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44435","21.280092","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44436","21.280100","172.30.1.205","172.30.1.104","TCP","54","46628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44437","21.282318","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44438","21.282705","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44439","21.282712","172.30.1.205","172.30.1.104","TCP","54","46628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44440","21.284522","172.30.1.205","172.30.1.104","TCP","54","46628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44441","21.284633","172.30.1.205","172.30.1.104","TCP","74","39266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924511 TSecr=0 WS=128" +"44442","21.284789","172.30.1.104","172.30.1.205","TCP","54","135 > 46628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44443","21.284808","172.30.1.104","172.30.1.205","TCP","54","135 > 46628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44444","21.284814","172.30.1.205","172.30.1.104","TCP","54","46628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44445","21.284897","172.30.1.104","172.30.1.205","TCP","66","49671 > 39266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44446","21.284905","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44447","21.285248","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44448","21.285534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44449","21.285542","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44450","21.287407","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44451","21.287769","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44452","21.287775","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44453","21.289171","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44454","21.292518","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44455","21.292528","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44456","21.293501","172.30.1.205","172.30.1.104","TCP","74","46632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924519 TSecr=0 WS=128" +"44457","21.293808","172.30.1.104","172.30.1.205","TCP","66","135 > 46632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44458","21.293819","172.30.1.205","172.30.1.104","TCP","54","46632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44459","21.294168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44460","21.294445","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44461","21.294453","172.30.1.205","172.30.1.104","TCP","54","46632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44462","21.296631","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44463","21.297043","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44464","21.297049","172.30.1.205","172.30.1.104","TCP","54","46632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44465","21.298861","172.30.1.205","172.30.1.104","TCP","54","46632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44466","21.298972","172.30.1.205","172.30.1.104","TCP","74","39270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924525 TSecr=0 WS=128" +"44467","21.299129","172.30.1.104","172.30.1.205","TCP","54","135 > 46632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44468","21.299175","172.30.1.104","172.30.1.205","TCP","54","135 > 46632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44469","21.299180","172.30.1.205","172.30.1.104","TCP","54","46632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44470","21.299260","172.30.1.104","172.30.1.205","TCP","66","49671 > 39270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44471","21.299268","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44472","21.299609","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44473","21.299895","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44474","21.299904","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44475","21.301809","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44476","21.302191","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44477","21.302198","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44478","21.303534","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44479","21.306963","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44480","21.306972","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44481","21.307909","172.30.1.205","172.30.1.104","TCP","74","46636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924534 TSecr=0 WS=128" +"44482","21.308208","172.30.1.104","172.30.1.205","TCP","66","135 > 46636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44483","21.308218","172.30.1.205","172.30.1.104","TCP","54","46636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44484","21.308566","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44485","21.308871","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44486","21.308880","172.30.1.205","172.30.1.104","TCP","54","46636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44487","21.311063","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44488","21.311477","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44489","21.311484","172.30.1.205","172.30.1.104","TCP","54","46636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44490","21.313316","172.30.1.205","172.30.1.104","TCP","54","46636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44491","21.313428","172.30.1.205","172.30.1.104","TCP","74","39274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924539 TSecr=0 WS=128" +"44492","21.313625","172.30.1.104","172.30.1.205","TCP","54","135 > 46636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44493","21.313648","172.30.1.104","172.30.1.205","TCP","54","135 > 46636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44494","21.313653","172.30.1.205","172.30.1.104","TCP","54","46636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44495","21.313689","172.30.1.104","172.30.1.205","TCP","66","49671 > 39274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44496","21.313697","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44497","21.314037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44498","21.314335","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44499","21.314343","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44500","21.316210","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44501","21.316593","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44502","21.316599","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44503","21.317966","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44504","21.322090","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44505","21.322099","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44506","21.323033","172.30.1.205","172.30.1.104","TCP","74","46640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924549 TSecr=0 WS=128" +"44507","21.323357","172.30.1.104","172.30.1.205","TCP","66","135 > 46640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44508","21.323368","172.30.1.205","172.30.1.104","TCP","54","46640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44509","21.323720","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44510","21.324023","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44511","21.324032","172.30.1.205","172.30.1.104","TCP","54","46640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44512","21.326247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44513","21.326637","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44514","21.326649","172.30.1.205","172.30.1.104","TCP","54","46640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44515","21.328449","172.30.1.205","172.30.1.104","TCP","54","46640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44516","21.328559","172.30.1.205","172.30.1.104","TCP","74","39278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924554 TSecr=0 WS=128" +"44517","21.328716","172.30.1.104","172.30.1.205","TCP","54","135 > 46640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44518","21.328749","172.30.1.104","172.30.1.205","TCP","54","135 > 46640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44519","21.328755","172.30.1.205","172.30.1.104","TCP","54","46640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44520","21.328834","172.30.1.104","172.30.1.205","TCP","66","49671 > 39278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44521","21.328843","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44522","21.329187","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44523","21.329508","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44524","21.329517","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44525","21.331392","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44526","21.332707","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44527","21.332714","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44528","21.334076","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44529","21.337568","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44530","21.337579","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44531","21.338559","172.30.1.205","172.30.1.104","TCP","74","46644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924564 TSecr=0 WS=128" +"44532","21.338860","172.30.1.104","172.30.1.205","TCP","66","135 > 46644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44533","21.338870","172.30.1.205","172.30.1.104","TCP","54","46644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44534","21.339224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44535","21.339522","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44536","21.339531","172.30.1.205","172.30.1.104","TCP","54","46644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44537","21.341743","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44538","21.342188","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44539","21.342194","172.30.1.205","172.30.1.104","TCP","54","46644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44540","21.344032","172.30.1.205","172.30.1.104","TCP","54","46644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44541","21.344142","172.30.1.205","172.30.1.104","TCP","74","39282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924570 TSecr=0 WS=128" +"44542","21.344308","172.30.1.104","172.30.1.205","TCP","54","135 > 46644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44543","21.344330","172.30.1.104","172.30.1.205","TCP","54","135 > 46644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44544","21.344336","172.30.1.205","172.30.1.104","TCP","54","46644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44545","21.344490","172.30.1.104","172.30.1.205","TCP","66","49671 > 39282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44546","21.344498","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44547","21.344866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44548","21.345166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44549","21.345173","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44550","21.347040","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44551","21.347394","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44552","21.347401","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44553","21.348748","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44554","21.352036","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44555","21.352045","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44556","21.353025","172.30.1.205","172.30.1.104","TCP","74","46648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924579 TSecr=0 WS=128" +"44557","21.353457","172.30.1.104","172.30.1.205","TCP","66","135 > 46648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44558","21.353468","172.30.1.205","172.30.1.104","TCP","54","46648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44559","21.353823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44560","21.354135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44561","21.354144","172.30.1.205","172.30.1.104","TCP","54","46648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44562","21.356326","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44563","21.356826","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44564","21.356832","172.30.1.205","172.30.1.104","TCP","54","46648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44565","21.357694","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44566","21.357742","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44567","21.357779","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44568","21.357813","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44569","21.357841","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44570","21.357869","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44571","21.357896","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44572","21.357923","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44573","21.357950","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44574","21.357963","172.30.1.104","172.30.1.205","TCP","54","49671 > 39242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44575","21.357999","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44576","21.358031","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44577","21.358106","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44578","21.358305","172.30.1.104","172.30.1.205","TCP","54","49671 > 39246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44579","21.358324","172.30.1.104","172.30.1.205","TCP","54","49671 > 39242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44580","21.358330","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44581","21.358344","172.30.1.104","172.30.1.205","TCP","54","49671 > 39250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44582","21.358383","172.30.1.104","172.30.1.205","TCP","54","49671 > 39246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44583","21.358388","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44584","21.358412","172.30.1.104","172.30.1.205","TCP","54","49671 > 39254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44585","21.358437","172.30.1.104","172.30.1.205","TCP","54","49671 > 39250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44586","21.358441","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44587","21.358456","172.30.1.104","172.30.1.205","TCP","54","49671 > 39258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44588","21.358477","172.30.1.104","172.30.1.205","TCP","54","49671 > 39262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44589","21.358498","172.30.1.104","172.30.1.205","TCP","54","49671 > 39262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44590","21.358502","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44591","21.358517","172.30.1.104","172.30.1.205","TCP","54","49671 > 39266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44592","21.358537","172.30.1.104","172.30.1.205","TCP","54","49671 > 39266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44593","21.358541","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44594","21.358558","172.30.1.104","172.30.1.205","TCP","54","49671 > 39270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44595","21.358578","172.30.1.104","172.30.1.205","TCP","54","49671 > 39270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44596","21.358582","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44597","21.358599","172.30.1.104","172.30.1.205","TCP","54","49671 > 39274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44598","21.358618","172.30.1.104","172.30.1.205","TCP","54","49671 > 39274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44599","21.358622","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44600","21.358639","172.30.1.104","172.30.1.205","TCP","54","49671 > 39278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44601","21.358659","172.30.1.104","172.30.1.205","TCP","54","49671 > 39278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44602","21.358667","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44603","21.358678","172.30.1.104","172.30.1.205","TCP","54","49671 > 39282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44604","21.358699","172.30.1.104","172.30.1.205","TCP","54","49671 > 39282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44605","21.358702","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44606","21.358719","172.30.1.104","172.30.1.205","TCP","54","49671 > 39254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44607","21.358722","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44608","21.358740","172.30.1.104","172.30.1.205","TCP","54","49671 > 39258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44609","21.358742","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44610","21.359005","172.30.1.104","172.30.1.205","TCP","54","49671 > 39238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44611","21.359025","172.30.1.104","172.30.1.205","TCP","54","49671 > 39238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44612","21.359029","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44613","21.359685","172.30.1.205","172.30.1.104","TCP","54","46648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44614","21.359797","172.30.1.205","172.30.1.104","TCP","74","39286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924586 TSecr=0 WS=128" +"44615","21.359927","172.30.1.104","172.30.1.205","TCP","54","135 > 46648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44616","21.359946","172.30.1.104","172.30.1.205","TCP","54","135 > 46648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44617","21.359951","172.30.1.205","172.30.1.104","TCP","54","46648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44618","21.360101","172.30.1.104","172.30.1.205","TCP","66","49671 > 39286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44619","21.360109","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44620","21.360460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44621","21.360749","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44622","21.360758","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44623","21.362640","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44624","21.363033","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44625","21.363039","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44626","21.364391","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44627","21.367879","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44628","21.367889","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44629","21.368864","172.30.1.205","172.30.1.104","TCP","74","46652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924595 TSecr=0 WS=128" +"44630","21.369188","172.30.1.104","172.30.1.205","TCP","66","135 > 46652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44631","21.369200","172.30.1.205","172.30.1.104","TCP","54","46652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44632","21.369559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44633","21.369849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44634","21.369861","172.30.1.205","172.30.1.104","TCP","54","46652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44635","21.372031","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44636","21.372479","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44637","21.372485","172.30.1.205","172.30.1.104","TCP","54","46652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44638","21.374303","172.30.1.205","172.30.1.104","TCP","54","46652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44639","21.374413","172.30.1.205","172.30.1.104","TCP","74","39290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924600 TSecr=0 WS=128" +"44640","21.374566","172.30.1.104","172.30.1.205","TCP","54","135 > 46652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44641","21.374593","172.30.1.104","172.30.1.205","TCP","54","135 > 46652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44642","21.374599","172.30.1.205","172.30.1.104","TCP","54","46652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44643","21.374721","172.30.1.104","172.30.1.205","TCP","66","49671 > 39290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44644","21.374730","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44645","21.375070","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44646","21.375338","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44647","21.375347","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44648","21.377256","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44649","21.377637","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44650","21.377644","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44651","21.378985","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44652","21.382365","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44653","21.382374","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44654","21.383333","172.30.1.205","172.30.1.104","TCP","74","46656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924609 TSecr=0 WS=128" +"44655","21.383656","172.30.1.104","172.30.1.205","TCP","66","135 > 46656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44656","21.383666","172.30.1.205","172.30.1.104","TCP","54","46656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44657","21.384019","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44658","21.384313","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44659","21.384324","172.30.1.205","172.30.1.104","TCP","54","46656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44660","21.386558","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44661","21.386945","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44662","21.386951","172.30.1.205","172.30.1.104","TCP","54","46656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44663","21.388769","172.30.1.205","172.30.1.104","TCP","54","46656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44664","21.388891","172.30.1.205","172.30.1.104","TCP","74","39294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924615 TSecr=0 WS=128" +"44665","21.389105","172.30.1.104","172.30.1.205","TCP","54","135 > 46656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44666","21.389114","172.30.1.104","172.30.1.205","TCP","54","135 > 46656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44667","21.389119","172.30.1.205","172.30.1.104","TCP","54","46656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44668","21.389196","172.30.1.104","172.30.1.205","TCP","66","49671 > 39294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44669","21.389204","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44670","21.389551","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44671","21.389860","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44672","21.389866","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44673","21.391731","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44674","21.392107","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44675","21.392113","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44676","21.393486","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44677","21.396731","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44678","21.396740","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44679","21.397696","172.30.1.205","172.30.1.104","TCP","74","46660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924624 TSecr=0 WS=128" +"44680","21.397991","172.30.1.104","172.30.1.205","TCP","66","135 > 46660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44681","21.398001","172.30.1.205","172.30.1.104","TCP","54","46660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44682","21.398350","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44683","21.398627","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44684","21.398636","172.30.1.205","172.30.1.104","TCP","54","46660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44685","21.400846","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44686","21.401216","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44687","21.401223","172.30.1.205","172.30.1.104","TCP","54","46660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44688","21.403037","172.30.1.205","172.30.1.104","TCP","54","46660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44689","21.403144","172.30.1.205","172.30.1.104","TCP","74","39298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924629 TSecr=0 WS=128" +"44690","21.403317","172.30.1.104","172.30.1.205","TCP","54","135 > 46660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44691","21.403325","172.30.1.104","172.30.1.205","TCP","54","135 > 46660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44692","21.403330","172.30.1.205","172.30.1.104","TCP","54","46660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44693","21.403427","172.30.1.104","172.30.1.205","TCP","66","49671 > 39298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44694","21.403435","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44695","21.403794","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44696","21.404083","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44697","21.404091","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44698","21.405980","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44699","21.406340","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44700","21.406346","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44701","21.407694","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44702","21.411035","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44703","21.411044","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44704","21.411983","172.30.1.205","172.30.1.104","TCP","74","46664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924638 TSecr=0 WS=128" +"44705","21.412293","172.30.1.104","172.30.1.205","TCP","66","135 > 46664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44706","21.412304","172.30.1.205","172.30.1.104","TCP","54","46664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44707","21.412653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44708","21.412947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44709","21.412956","172.30.1.205","172.30.1.104","TCP","54","46664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44710","21.415147","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44711","21.415574","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44712","21.415580","172.30.1.205","172.30.1.104","TCP","54","46664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44713","21.417406","172.30.1.205","172.30.1.104","TCP","54","46664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44714","21.417520","172.30.1.205","172.30.1.104","TCP","74","39302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924643 TSecr=0 WS=128" +"44715","21.417682","172.30.1.104","172.30.1.205","TCP","54","135 > 46664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44716","21.417716","172.30.1.104","172.30.1.205","TCP","54","135 > 46664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44717","21.417721","172.30.1.205","172.30.1.104","TCP","54","46664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44718","21.417821","172.30.1.104","172.30.1.205","TCP","66","49671 > 39302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44719","21.417829","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44720","21.418171","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44721","21.418473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44722","21.418482","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44723","21.420349","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44724","21.420792","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44725","21.420798","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44726","21.422158","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44727","21.425573","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44728","21.425582","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44729","21.426525","172.30.1.205","172.30.1.104","TCP","74","46668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924652 TSecr=0 WS=128" +"44730","21.426810","172.30.1.104","172.30.1.205","TCP","66","135 > 46668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44731","21.426820","172.30.1.205","172.30.1.104","TCP","54","46668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44732","21.427173","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44733","21.427543","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44734","21.427551","172.30.1.205","172.30.1.104","TCP","54","46668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44735","21.429764","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44736","21.430189","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44737","21.430195","172.30.1.205","172.30.1.104","TCP","54","46668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44738","21.432002","172.30.1.205","172.30.1.104","TCP","54","46668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44739","21.432111","172.30.1.205","172.30.1.104","TCP","74","39306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924658 TSecr=0 WS=128" +"44740","21.432301","172.30.1.104","172.30.1.205","TCP","54","135 > 46668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44741","21.432322","172.30.1.104","172.30.1.205","TCP","54","135 > 46668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44742","21.432327","172.30.1.205","172.30.1.104","TCP","54","46668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44743","21.432398","172.30.1.104","172.30.1.205","TCP","66","49671 > 39306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44744","21.432406","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44745","21.432747","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44746","21.433044","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44747","21.433050","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44748","21.434913","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44749","21.435273","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44750","21.435279","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44751","21.436624","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44752","21.440044","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44753","21.440053","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44754","21.441012","172.30.1.205","172.30.1.104","TCP","74","46672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924667 TSecr=0 WS=128" +"44755","21.441308","172.30.1.104","172.30.1.205","TCP","66","135 > 46672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44756","21.441318","172.30.1.205","172.30.1.104","TCP","54","46672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44757","21.441664","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44758","21.441980","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44759","21.441988","172.30.1.205","172.30.1.104","TCP","54","46672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44760","21.444164","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44761","21.444568","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44762","21.444574","172.30.1.205","172.30.1.104","TCP","54","46672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44763","21.446382","172.30.1.205","172.30.1.104","TCP","54","46672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44764","21.446494","172.30.1.205","172.30.1.104","TCP","74","39310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924672 TSecr=0 WS=128" +"44765","21.446646","172.30.1.104","172.30.1.205","TCP","54","135 > 46672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44766","21.446656","172.30.1.104","172.30.1.205","TCP","54","135 > 46672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44767","21.446661","172.30.1.205","172.30.1.104","TCP","54","46672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44768","21.446785","172.30.1.104","172.30.1.205","TCP","66","49671 > 39310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44769","21.446793","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44770","21.447139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44771","21.447424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44772","21.447432","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44773","21.449338","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44774","21.449723","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44775","21.449729","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44776","21.451070","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44777","21.454556","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44778","21.454566","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44779","21.455505","172.30.1.205","172.30.1.104","TCP","74","46676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924681 TSecr=0 WS=128" +"44780","21.455844","172.30.1.104","172.30.1.205","TCP","66","135 > 46676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44781","21.455854","172.30.1.205","172.30.1.104","TCP","54","46676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44782","21.456203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44783","21.456555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44784","21.456564","172.30.1.205","172.30.1.104","TCP","54","46676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44785","21.458769","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44786","21.459209","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44787","21.459215","172.30.1.205","172.30.1.104","TCP","54","46676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44788","21.461038","172.30.1.205","172.30.1.104","TCP","54","46676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44789","21.461151","172.30.1.205","172.30.1.104","TCP","74","39314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924687 TSecr=0 WS=128" +"44790","21.461308","172.30.1.104","172.30.1.205","TCP","54","135 > 46676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44791","21.461357","172.30.1.104","172.30.1.205","TCP","54","135 > 46676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44792","21.461362","172.30.1.205","172.30.1.104","TCP","54","46676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44793","21.461433","172.30.1.104","172.30.1.205","TCP","66","49671 > 39314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44794","21.461441","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44795","21.461791","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44796","21.462071","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44797","21.462077","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44798","21.463932","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44799","21.464314","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44800","21.464321","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44801","21.465723","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44802","21.469126","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44803","21.469136","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44804","21.470146","172.30.1.205","172.30.1.104","TCP","74","46680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924696 TSecr=0 WS=128" +"44805","21.470473","172.30.1.104","172.30.1.205","TCP","66","135 > 46680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44806","21.470484","172.30.1.205","172.30.1.104","TCP","54","46680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44807","21.470837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44808","21.471153","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44809","21.471162","172.30.1.205","172.30.1.104","TCP","54","46680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44810","21.473387","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44811","21.473805","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44812","21.473811","172.30.1.205","172.30.1.104","TCP","54","46680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44813","21.475626","172.30.1.205","172.30.1.104","TCP","54","46680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44814","21.475745","172.30.1.205","172.30.1.104","TCP","74","39318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924702 TSecr=0 WS=128" +"44815","21.475902","172.30.1.104","172.30.1.205","TCP","54","135 > 46680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44816","21.475914","172.30.1.104","172.30.1.205","TCP","54","135 > 46680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44817","21.475921","172.30.1.205","172.30.1.104","TCP","54","46680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44818","21.476056","172.30.1.104","172.30.1.205","TCP","66","49671 > 39318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44819","21.476064","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44820","21.476405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44821","21.476732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44822","21.476740","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44823","21.478636","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44824","21.479005","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44825","21.479011","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44826","21.480356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44827","21.483740","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44828","21.483750","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44829","21.484719","172.30.1.205","172.30.1.104","TCP","74","46684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924711 TSecr=0 WS=128" +"44830","21.485071","172.30.1.104","172.30.1.205","TCP","66","135 > 46684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44831","21.485082","172.30.1.205","172.30.1.104","TCP","54","46684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44832","21.485449","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44833","21.485730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44834","21.485739","172.30.1.205","172.30.1.104","TCP","54","46684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44835","21.487903","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44836","21.488296","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44837","21.488302","172.30.1.205","172.30.1.104","TCP","54","46684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44838","21.490122","172.30.1.205","172.30.1.104","TCP","54","46684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44839","21.490232","172.30.1.205","172.30.1.104","TCP","74","39322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924716 TSecr=0 WS=128" +"44840","21.490401","172.30.1.104","172.30.1.205","TCP","54","135 > 46684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44841","21.490435","172.30.1.104","172.30.1.205","TCP","54","135 > 46684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44842","21.490440","172.30.1.205","172.30.1.104","TCP","54","46684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44843","21.490521","172.30.1.104","172.30.1.205","TCP","66","49671 > 39322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44844","21.490529","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44845","21.490875","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44846","21.491173","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44847","21.491182","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44848","21.493075","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44849","21.493490","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44850","21.493497","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44851","21.494835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44852","21.498311","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44853","21.498322","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44854","21.499291","172.30.1.205","172.30.1.104","TCP","74","46688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924725 TSecr=0 WS=128" +"44855","21.499595","172.30.1.104","172.30.1.205","TCP","66","135 > 46688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44856","21.499606","172.30.1.205","172.30.1.104","TCP","54","46688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44857","21.499958","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44858","21.500238","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44859","21.500246","172.30.1.205","172.30.1.104","TCP","54","46688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44860","21.502471","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44861","21.502900","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44862","21.502906","172.30.1.205","172.30.1.104","TCP","54","46688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44863","21.504719","172.30.1.205","172.30.1.104","TCP","54","46688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44864","21.504854","172.30.1.205","172.30.1.104","TCP","74","39326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924731 TSecr=0 WS=128" +"44865","21.505050","172.30.1.104","172.30.1.205","TCP","54","135 > 46688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44866","21.505080","172.30.1.104","172.30.1.205","TCP","54","135 > 46688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44867","21.505086","172.30.1.205","172.30.1.104","TCP","54","46688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44868","21.505185","172.30.1.104","172.30.1.205","TCP","66","49671 > 39326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44869","21.505193","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44870","21.505545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44871","21.505845","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44872","21.505854","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44873","21.507748","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44874","21.508110","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44875","21.508116","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44876","21.509501","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44877","21.513025","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44878","21.513036","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44879","21.514035","172.30.1.205","172.30.1.104","TCP","74","46692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924740 TSecr=0 WS=128" +"44880","21.514332","172.30.1.104","172.30.1.205","TCP","66","135 > 46692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44881","21.514343","172.30.1.205","172.30.1.104","TCP","54","46692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44882","21.514709","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44883","21.515004","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44884","21.515022","172.30.1.205","172.30.1.104","TCP","54","46692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44885","21.517345","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44886","21.517853","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44887","21.517862","172.30.1.205","172.30.1.104","TCP","54","46692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44888","21.519757","172.30.1.205","172.30.1.104","TCP","54","46692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44889","21.519890","172.30.1.205","172.30.1.104","TCP","74","39330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924746 TSecr=0 WS=128" +"44890","21.520021","172.30.1.104","172.30.1.205","TCP","54","135 > 46692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44891","21.520034","172.30.1.104","172.30.1.205","TCP","54","135 > 46692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44892","21.520041","172.30.1.205","172.30.1.104","TCP","54","46692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44893","21.520184","172.30.1.104","172.30.1.205","TCP","66","49671 > 39330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44894","21.520192","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44895","21.520541","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44896","21.520851","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44897","21.520860","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44898","21.522769","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44899","21.523129","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44900","21.523136","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44901","21.524490","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44902","21.528034","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44903","21.528045","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44904","21.529039","172.30.1.205","172.30.1.104","TCP","74","46696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924755 TSecr=0 WS=128" +"44905","21.529358","172.30.1.104","172.30.1.205","TCP","66","135 > 46696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44906","21.529368","172.30.1.205","172.30.1.104","TCP","54","46696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44907","21.529725","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44908","21.530024","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44909","21.530039","172.30.1.205","172.30.1.104","TCP","54","46696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44910","21.532225","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44911","21.532666","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44912","21.532672","172.30.1.205","172.30.1.104","TCP","54","46696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44913","21.533556","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44914","21.533606","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44915","21.533642","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44916","21.533676","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44917","21.533709","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44918","21.533738","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44919","21.533771","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44920","21.533798","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44921","21.533820","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44922","21.533838","172.30.1.104","172.30.1.205","TCP","54","49671 > 39286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44923","21.533854","172.30.1.104","172.30.1.205","TCP","54","49671 > 39290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44924","21.533874","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44925","21.533903","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44926","21.533928","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44927","21.534198","172.30.1.104","172.30.1.205","TCP","54","49671 > 39294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44928","21.534215","172.30.1.104","172.30.1.205","TCP","54","49671 > 39286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44929","21.534222","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44930","21.534237","172.30.1.104","172.30.1.205","TCP","54","49671 > 39290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44931","21.534239","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44932","21.534257","172.30.1.104","172.30.1.205","TCP","54","49671 > 39294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44933","21.534260","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44934","21.534278","172.30.1.104","172.30.1.205","TCP","54","49671 > 39298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44935","21.534298","172.30.1.104","172.30.1.205","TCP","54","49671 > 39302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44936","21.534322","172.30.1.104","172.30.1.205","TCP","54","49671 > 39298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44937","21.534326","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44938","21.534329","172.30.1.104","172.30.1.205","TCP","54","49671 > 39306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44939","21.534367","172.30.1.104","172.30.1.205","TCP","54","49671 > 39302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44940","21.534371","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44941","21.534377","172.30.1.104","172.30.1.205","TCP","54","49671 > 39310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44942","21.534407","172.30.1.104","172.30.1.205","TCP","54","49671 > 39314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44943","21.534416","172.30.1.104","172.30.1.205","TCP","54","49671 > 39314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44944","21.534420","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44945","21.534443","172.30.1.104","172.30.1.205","TCP","54","49671 > 39318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44946","21.534462","172.30.1.104","172.30.1.205","TCP","54","49671 > 39306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44947","21.534466","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44948","21.534484","172.30.1.104","172.30.1.205","TCP","54","49671 > 39322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44949","21.534505","172.30.1.104","172.30.1.205","TCP","54","49671 > 39322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44950","21.534508","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44951","21.534525","172.30.1.104","172.30.1.205","TCP","54","49671 > 39326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44952","21.534545","172.30.1.104","172.30.1.205","TCP","54","49671 > 39326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44953","21.534548","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44954","21.534565","172.30.1.104","172.30.1.205","TCP","54","49671 > 39330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44955","21.534587","172.30.1.104","172.30.1.205","TCP","54","49671 > 39330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44956","21.534590","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44957","21.534608","172.30.1.104","172.30.1.205","TCP","54","49671 > 39310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44958","21.534610","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44959","21.534629","172.30.1.104","172.30.1.205","TCP","54","49671 > 39318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"44960","21.534631","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"44961","21.535490","172.30.1.205","172.30.1.104","TCP","54","46696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44962","21.535606","172.30.1.205","172.30.1.104","TCP","74","39334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924762 TSecr=0 WS=128" +"44963","21.535752","172.30.1.104","172.30.1.205","TCP","54","135 > 46696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44964","21.535789","172.30.1.104","172.30.1.205","TCP","54","135 > 46696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44965","21.535794","172.30.1.205","172.30.1.104","TCP","54","46696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44966","21.535935","172.30.1.104","172.30.1.205","TCP","66","49671 > 39334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44967","21.535943","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44968","21.536296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44969","21.537844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44970","21.537854","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44971","21.539741","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44972","21.540132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44973","21.540139","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44974","21.541534","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"44975","21.545202","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"44976","21.545211","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"44977","21.546223","172.30.1.205","172.30.1.104","TCP","74","46700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924772 TSecr=0 WS=128" +"44978","21.546535","172.30.1.104","172.30.1.205","TCP","66","135 > 46700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44979","21.546546","172.30.1.205","172.30.1.104","TCP","54","46700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44980","21.546909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"44981","21.548253","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44982","21.548264","172.30.1.205","172.30.1.104","TCP","54","46700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44983","21.550520","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"44984","21.551461","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"44985","21.551467","172.30.1.205","172.30.1.104","TCP","54","46700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44986","21.553331","172.30.1.205","172.30.1.104","TCP","54","46700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"44987","21.553467","172.30.1.205","172.30.1.104","TCP","74","39338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924779 TSecr=0 WS=128" +"44988","21.553599","172.30.1.104","172.30.1.205","TCP","54","135 > 46700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44989","21.553612","172.30.1.104","172.30.1.205","TCP","54","135 > 46700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"44990","21.553620","172.30.1.205","172.30.1.104","TCP","54","46700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"44991","21.553764","172.30.1.104","172.30.1.205","TCP","66","49671 > 39338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"44992","21.553773","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"44993","21.554116","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"44994","21.554406","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"44995","21.554415","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"44996","21.556268","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"44997","21.556656","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"44998","21.556662","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"44999","21.558034","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45000","21.561546","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45001","21.561556","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45002","21.562509","172.30.1.205","172.30.1.104","TCP","74","46704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924788 TSecr=0 WS=128" +"45003","21.562876","172.30.1.104","172.30.1.205","TCP","66","135 > 46704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45004","21.562887","172.30.1.205","172.30.1.104","TCP","54","46704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45005","21.563235","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45006","21.563519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45007","21.563528","172.30.1.205","172.30.1.104","TCP","54","46704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45008","21.565741","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45009","21.566145","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45010","21.566152","172.30.1.205","172.30.1.104","TCP","54","46704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45011","21.567950","172.30.1.205","172.30.1.104","TCP","54","46704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45012","21.568058","172.30.1.205","172.30.1.104","TCP","74","39342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924794 TSecr=0 WS=128" +"45013","21.568241","172.30.1.104","172.30.1.205","TCP","54","135 > 46704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45014","21.568249","172.30.1.104","172.30.1.205","TCP","54","135 > 46704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45015","21.568255","172.30.1.205","172.30.1.104","TCP","54","46704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45016","21.568346","172.30.1.104","172.30.1.205","TCP","66","49671 > 39342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45017","21.568354","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45018","21.568695","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45019","21.568983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45020","21.568992","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45021","21.570882","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45022","21.571232","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45023","21.571238","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45024","21.572578","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45025","21.576083","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45026","21.576093","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45027","21.577060","172.30.1.205","172.30.1.104","TCP","74","46708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924803 TSecr=0 WS=128" +"45028","21.577372","172.30.1.104","172.30.1.205","TCP","66","135 > 46708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45029","21.577383","172.30.1.205","172.30.1.104","TCP","54","46708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45030","21.577733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45031","21.578056","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45032","21.578070","172.30.1.205","172.30.1.104","TCP","54","46708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45033","21.580354","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45034","21.580732","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45035","21.580740","172.30.1.205","172.30.1.104","TCP","54","46708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45036","21.582596","172.30.1.205","172.30.1.104","TCP","54","46708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45037","21.582722","172.30.1.205","172.30.1.104","TCP","74","39346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924809 TSecr=0 WS=128" +"45038","21.582892","172.30.1.104","172.30.1.205","TCP","54","135 > 46708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45039","21.582951","172.30.1.104","172.30.1.205","TCP","54","135 > 46708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45040","21.582959","172.30.1.205","172.30.1.104","TCP","54","46708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45041","21.582988","172.30.1.104","172.30.1.205","TCP","66","49671 > 39346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45042","21.582997","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45043","21.583352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45044","21.583621","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45045","21.583630","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45046","21.585579","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45047","21.585920","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45048","21.585927","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45049","21.587289","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45050","21.590681","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45051","21.590692","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45052","21.591648","172.30.1.205","172.30.1.104","TCP","74","46712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924818 TSecr=0 WS=128" +"45053","21.591959","172.30.1.104","172.30.1.205","TCP","66","135 > 46712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45054","21.591969","172.30.1.205","172.30.1.104","TCP","54","46712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45055","21.592317","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45056","21.592667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45057","21.592676","172.30.1.205","172.30.1.104","TCP","54","46712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45058","21.594882","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45059","21.595285","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45060","21.595292","172.30.1.205","172.30.1.104","TCP","54","46712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45061","21.597144","172.30.1.205","172.30.1.104","TCP","54","46712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45062","21.597264","172.30.1.205","172.30.1.104","TCP","74","39350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924823 TSecr=0 WS=128" +"45063","21.597442","172.30.1.104","172.30.1.205","TCP","54","135 > 46712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45064","21.597451","172.30.1.104","172.30.1.205","TCP","54","135 > 46712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45065","21.597456","172.30.1.205","172.30.1.104","TCP","54","46712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45066","21.597545","172.30.1.104","172.30.1.205","TCP","66","49671 > 39350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45067","21.597553","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45068","21.597898","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45069","21.598159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45070","21.598168","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45071","21.600068","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45072","21.600455","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45073","21.600461","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45074","21.601840","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45075","21.605385","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45076","21.605394","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45077","21.606336","172.30.1.205","172.30.1.104","TCP","74","46716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924832 TSecr=0 WS=128" +"45078","21.606651","172.30.1.104","172.30.1.205","TCP","66","135 > 46716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45079","21.606662","172.30.1.205","172.30.1.104","TCP","54","46716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45080","21.607013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45081","21.607310","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45082","21.607319","172.30.1.205","172.30.1.104","TCP","54","46716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45083","21.609540","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45084","21.609937","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45085","21.609944","172.30.1.205","172.30.1.104","TCP","54","46716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45086","21.611768","172.30.1.205","172.30.1.104","TCP","54","46716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45087","21.611880","172.30.1.205","172.30.1.104","TCP","74","39354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924838 TSecr=0 WS=128" +"45088","21.612044","172.30.1.104","172.30.1.205","TCP","54","135 > 46716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45089","21.612111","172.30.1.104","172.30.1.205","TCP","54","135 > 46716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45090","21.612117","172.30.1.205","172.30.1.104","TCP","54","46716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45091","21.612185","172.30.1.104","172.30.1.205","TCP","66","49671 > 39354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45092","21.612193","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45093","21.612540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45094","21.612908","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45095","21.612917","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45096","21.614819","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45097","21.615183","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45098","21.615189","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45099","21.616547","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45100","21.619958","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45101","21.619969","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45102","21.620956","172.30.1.205","172.30.1.104","TCP","74","46720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924847 TSecr=0 WS=128" +"45103","21.621261","172.30.1.104","172.30.1.205","TCP","66","135 > 46720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45104","21.621273","172.30.1.205","172.30.1.104","TCP","54","46720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45105","21.621630","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45106","21.621914","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45107","21.621924","172.30.1.205","172.30.1.104","TCP","54","46720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45108","21.624154","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45109","21.624616","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45110","21.624626","172.30.1.205","172.30.1.104","TCP","54","46720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45111","21.626581","172.30.1.205","172.30.1.104","TCP","54","46720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45112","21.626731","172.30.1.205","172.30.1.104","TCP","74","39358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924853 TSecr=0 WS=128" +"45113","21.626863","172.30.1.104","172.30.1.205","TCP","54","135 > 46720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45114","21.626876","172.30.1.104","172.30.1.205","TCP","54","135 > 46720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45115","21.626883","172.30.1.205","172.30.1.104","TCP","54","46720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45116","21.627029","172.30.1.104","172.30.1.205","TCP","66","49671 > 39358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45117","21.627039","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45118","21.627393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45119","21.628641","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45120","21.628654","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45121","21.630645","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45122","21.630995","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45123","21.631001","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45124","21.632377","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45125","21.635851","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45126","21.635865","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45127","21.636966","172.30.1.205","172.30.1.104","TCP","74","46724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924863 TSecr=0 WS=128" +"45128","21.637278","172.30.1.104","172.30.1.205","TCP","66","135 > 46724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45129","21.637291","172.30.1.205","172.30.1.104","TCP","54","46724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45130","21.637662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45131","21.637965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45132","21.637975","172.30.1.205","172.30.1.104","TCP","54","46724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45133","21.640212","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45134","21.640605","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45135","21.640612","172.30.1.205","172.30.1.104","TCP","54","46724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45136","21.642456","172.30.1.205","172.30.1.104","TCP","54","46724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45137","21.642573","172.30.1.205","172.30.1.104","TCP","74","39362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924868 TSecr=0 WS=128" +"45138","21.642714","172.30.1.104","172.30.1.205","TCP","54","135 > 46724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45139","21.642727","172.30.1.104","172.30.1.205","TCP","54","135 > 46724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45140","21.642734","172.30.1.205","172.30.1.104","TCP","54","46724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45141","21.642853","172.30.1.104","172.30.1.205","TCP","66","49671 > 39362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45142","21.642862","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45143","21.643210","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45144","21.643592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45145","21.643601","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45146","21.645513","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45147","21.645868","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45148","21.645873","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45149","21.647240","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45150","21.650736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45151","21.650748","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45152","21.651715","172.30.1.205","172.30.1.104","TCP","74","46728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924878 TSecr=0 WS=128" +"45153","21.652036","172.30.1.104","172.30.1.205","TCP","66","135 > 46728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45154","21.652047","172.30.1.205","172.30.1.104","TCP","54","46728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45155","21.652397","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45156","21.652770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45157","21.652789","172.30.1.205","172.30.1.104","TCP","54","46728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45158","21.654984","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45159","21.655400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45160","21.655407","172.30.1.205","172.30.1.104","TCP","54","46728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45161","21.657287","172.30.1.205","172.30.1.104","TCP","54","46728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45162","21.657396","172.30.1.205","172.30.1.104","TCP","74","39366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924883 TSecr=0 WS=128" +"45163","21.657550","172.30.1.104","172.30.1.205","TCP","54","135 > 46728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45164","21.657561","172.30.1.104","172.30.1.205","TCP","54","135 > 46728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45165","21.657567","172.30.1.205","172.30.1.104","TCP","54","46728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45166","21.657663","172.30.1.104","172.30.1.205","TCP","66","49671 > 39366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45167","21.657672","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45168","21.658036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45169","21.658308","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45170","21.658317","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45171","21.660201","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45172","21.660591","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45173","21.660598","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45174","21.661979","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45175","21.665387","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45176","21.665397","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45177","21.666340","172.30.1.205","172.30.1.104","TCP","74","46732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924892 TSecr=0 WS=128" +"45178","21.666637","172.30.1.104","172.30.1.205","TCP","66","135 > 46732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45179","21.666648","172.30.1.205","172.30.1.104","TCP","54","46732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45180","21.666995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45181","21.667277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45182","21.667286","172.30.1.205","172.30.1.104","TCP","54","46732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45183","21.669511","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45184","21.669956","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45185","21.669963","172.30.1.205","172.30.1.104","TCP","54","46732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45186","21.671775","172.30.1.205","172.30.1.104","TCP","54","46732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45187","21.671886","172.30.1.205","172.30.1.104","TCP","74","39370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924898 TSecr=0 WS=128" +"45188","21.672087","172.30.1.104","172.30.1.205","TCP","54","135 > 46732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45189","21.672124","172.30.1.104","172.30.1.205","TCP","54","135 > 46732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45190","21.672130","172.30.1.205","172.30.1.104","TCP","54","46732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45191","21.672197","172.30.1.104","172.30.1.205","TCP","66","49671 > 39370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45192","21.672205","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45193","21.672551","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45194","21.672844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45195","21.672853","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45196","21.674759","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45197","21.675150","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45198","21.675157","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45199","21.676514","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45200","21.679974","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45201","21.679984","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45202","21.680943","172.30.1.205","172.30.1.104","TCP","74","46736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924907 TSecr=0 WS=128" +"45203","21.681258","172.30.1.104","172.30.1.205","TCP","66","135 > 46736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45204","21.681269","172.30.1.205","172.30.1.104","TCP","54","46736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45205","21.681629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45206","21.681924","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45207","21.681933","172.30.1.205","172.30.1.104","TCP","54","46736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45208","21.684146","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45209","21.684605","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45210","21.684612","172.30.1.205","172.30.1.104","TCP","54","46736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45211","21.686451","172.30.1.205","172.30.1.104","TCP","54","46736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45212","21.686574","172.30.1.205","172.30.1.104","TCP","74","39374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924912 TSecr=0 WS=128" +"45213","21.686745","172.30.1.104","172.30.1.205","TCP","54","135 > 46736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45214","21.686756","172.30.1.104","172.30.1.205","TCP","54","135 > 46736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45215","21.686762","172.30.1.205","172.30.1.104","TCP","54","46736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45216","21.686857","172.30.1.104","172.30.1.205","TCP","66","49671 > 39374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45217","21.686865","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45218","21.687228","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45219","21.687570","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45220","21.687578","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45221","21.689494","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45222","21.689901","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45223","21.689908","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45224","21.691262","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45225","21.694750","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45226","21.694761","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45227","21.695716","172.30.1.205","172.30.1.104","TCP","74","46740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924922 TSecr=0 WS=128" +"45228","21.696021","172.30.1.104","172.30.1.205","TCP","66","135 > 46740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45229","21.696031","172.30.1.205","172.30.1.104","TCP","54","46740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45230","21.696383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45231","21.696662","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45232","21.696671","172.30.1.205","172.30.1.104","TCP","54","46740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45233","21.698893","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45234","21.699310","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45235","21.699317","172.30.1.205","172.30.1.104","TCP","54","46740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45236","21.701168","172.30.1.205","172.30.1.104","TCP","54","46740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45237","21.701294","172.30.1.205","172.30.1.104","TCP","74","39378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924927 TSecr=0 WS=128" +"45238","21.701442","172.30.1.104","172.30.1.205","TCP","54","135 > 46740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45239","21.701455","172.30.1.104","172.30.1.205","TCP","54","135 > 46740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45240","21.701461","172.30.1.205","172.30.1.104","TCP","54","46740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45241","21.701558","172.30.1.104","172.30.1.205","TCP","66","49671 > 39378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45242","21.701566","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45243","21.701911","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45244","21.702188","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45245","21.702197","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45246","21.704089","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45247","21.704458","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45248","21.704465","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45249","21.705868","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45250","21.709431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45251","21.709441","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45252","21.710447","172.30.1.205","172.30.1.104","TCP","74","46744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924936 TSecr=0 WS=128" +"45253","21.710805","172.30.1.104","172.30.1.205","TCP","66","135 > 46744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45254","21.710816","172.30.1.205","172.30.1.104","TCP","54","46744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45255","21.711168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45256","21.711515","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45257","21.711524","172.30.1.205","172.30.1.104","TCP","54","46744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45258","21.713761","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45259","21.714153","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45260","21.714160","172.30.1.205","172.30.1.104","TCP","54","46744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45261","21.715023","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45262","21.715072","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45263","21.715105","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45264","21.715139","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45265","21.715168","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45266","21.715194","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45267","21.715221","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45268","21.715248","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45269","21.715281","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45270","21.715308","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45271","21.715340","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45272","21.715378","172.30.1.104","172.30.1.205","TCP","54","49671 > 39338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45273","21.715398","172.30.1.104","172.30.1.205","TCP","54","49671 > 39342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45274","21.715416","172.30.1.104","172.30.1.205","TCP","54","49671 > 39346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45275","21.715437","172.30.1.104","172.30.1.205","TCP","54","49671 > 39350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45276","21.715459","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45277","21.715757","172.30.1.104","172.30.1.205","TCP","54","49671 > 39338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45278","21.715766","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45279","21.715783","172.30.1.104","172.30.1.205","TCP","54","49671 > 39354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45280","21.715810","172.30.1.104","172.30.1.205","TCP","54","49671 > 39354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45281","21.715815","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45282","21.715828","172.30.1.104","172.30.1.205","TCP","54","49671 > 39350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45283","21.715831","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45284","21.715848","172.30.1.104","172.30.1.205","TCP","54","49671 > 39342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45285","21.715851","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45286","21.715869","172.30.1.104","172.30.1.205","TCP","54","49671 > 39346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45287","21.715872","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45288","21.715887","172.30.1.104","172.30.1.205","TCP","54","49671 > 39358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45289","21.715921","172.30.1.104","172.30.1.205","TCP","54","49671 > 39362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45290","21.715926","172.30.1.104","172.30.1.205","TCP","54","49671 > 39358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45291","21.715929","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45292","21.715944","172.30.1.104","172.30.1.205","TCP","54","49671 > 39366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45293","21.715964","172.30.1.104","172.30.1.205","TCP","54","49671 > 39362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45294","21.715968","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45295","21.715984","172.30.1.104","172.30.1.205","TCP","54","49671 > 39366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45296","21.715986","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45297","21.716036","172.30.1.104","172.30.1.205","TCP","54","49671 > 39370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45298","21.716047","172.30.1.104","172.30.1.205","TCP","54","49671 > 39374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45299","21.716073","172.30.1.104","172.30.1.205","TCP","54","49671 > 39370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45300","21.716075","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45301","21.716092","172.30.1.104","172.30.1.205","TCP","54","49671 > 39374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45302","21.716095","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45303","21.716112","172.30.1.104","172.30.1.205","TCP","54","49671 > 39378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45304","21.716132","172.30.1.104","172.30.1.205","TCP","54","49671 > 39334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45305","21.716152","172.30.1.104","172.30.1.205","TCP","54","49671 > 39378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45306","21.716156","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45307","21.716171","172.30.1.104","172.30.1.205","TCP","54","49671 > 39334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45308","21.716174","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45309","21.717070","172.30.1.205","172.30.1.104","TCP","54","46744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45310","21.717187","172.30.1.205","172.30.1.104","TCP","74","39382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924943 TSecr=0 WS=128" +"45311","21.717330","172.30.1.104","172.30.1.205","TCP","54","135 > 46744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45312","21.717359","172.30.1.104","172.30.1.205","TCP","54","135 > 46744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45313","21.717364","172.30.1.205","172.30.1.104","TCP","54","46744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45314","21.717463","172.30.1.104","172.30.1.205","TCP","66","49671 > 39382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45315","21.717471","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45316","21.717824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45317","21.718118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45318","21.718127","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45319","21.720006","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45320","21.720360","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45321","21.720367","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45322","21.721756","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45323","21.725249","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45324","21.725259","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45325","21.726222","172.30.1.205","172.30.1.104","TCP","74","46748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924952 TSecr=0 WS=128" +"45326","21.726528","172.30.1.104","172.30.1.205","TCP","66","135 > 46748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45327","21.726538","172.30.1.205","172.30.1.104","TCP","54","46748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45328","21.726893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45329","21.727183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45330","21.727193","172.30.1.205","172.30.1.104","TCP","54","46748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45331","21.729413","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45332","21.729862","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45333","21.729869","172.30.1.205","172.30.1.104","TCP","54","46748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45334","21.731687","172.30.1.205","172.30.1.104","TCP","54","46748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45335","21.731802","172.30.1.205","172.30.1.104","TCP","74","39386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924958 TSecr=0 WS=128" +"45336","21.732056","172.30.1.104","172.30.1.205","TCP","54","135 > 46748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45337","21.732066","172.30.1.104","172.30.1.205","TCP","54","135 > 46748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45338","21.732071","172.30.1.205","172.30.1.104","TCP","54","46748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45339","21.732149","172.30.1.104","172.30.1.205","TCP","66","49671 > 39386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45340","21.732157","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45341","21.732502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45342","21.732792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45343","21.732802","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45344","21.734718","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45345","21.735101","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45346","21.735108","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45347","21.736473","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45348","21.739882","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45349","21.739892","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45350","21.740869","172.30.1.205","172.30.1.104","TCP","74","46752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924967 TSecr=0 WS=128" +"45351","21.741218","172.30.1.104","172.30.1.205","TCP","66","135 > 46752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45352","21.741230","172.30.1.205","172.30.1.104","TCP","54","46752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45353","21.741601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45354","21.741912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45355","21.741921","172.30.1.205","172.30.1.104","TCP","54","46752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45356","21.744131","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45357","21.744585","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45358","21.744592","172.30.1.205","172.30.1.104","TCP","54","46752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45359","21.746423","172.30.1.205","172.30.1.104","TCP","54","46752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45360","21.746536","172.30.1.205","172.30.1.104","TCP","74","39390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924972 TSecr=0 WS=128" +"45361","21.746699","172.30.1.104","172.30.1.205","TCP","54","135 > 46752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45362","21.746737","172.30.1.104","172.30.1.205","TCP","54","135 > 46752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45363","21.746743","172.30.1.205","172.30.1.104","TCP","54","46752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45364","21.746870","172.30.1.104","172.30.1.205","TCP","66","49671 > 39390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45365","21.746887","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45366","21.747296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45367","21.747659","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45368","21.747667","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45369","21.749603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45370","21.750011","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45371","21.750018","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45372","21.751384","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45373","21.754804","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45374","21.754814","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45375","21.755790","172.30.1.205","172.30.1.104","TCP","74","46756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924982 TSecr=0 WS=128" +"45376","21.756093","172.30.1.104","172.30.1.205","TCP","66","135 > 46756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45377","21.756105","172.30.1.205","172.30.1.104","TCP","54","46756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45378","21.756464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45379","21.756737","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45380","21.756746","172.30.1.205","172.30.1.104","TCP","54","46756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45381","21.758984","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45382","21.759364","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45383","21.759371","172.30.1.205","172.30.1.104","TCP","54","46756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45384","21.761229","172.30.1.205","172.30.1.104","TCP","54","46756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45385","21.761344","172.30.1.205","172.30.1.104","TCP","74","39394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924987 TSecr=0 WS=128" +"45386","21.761496","172.30.1.104","172.30.1.205","TCP","54","135 > 46756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45387","21.761524","172.30.1.104","172.30.1.205","TCP","54","135 > 46756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45388","21.761530","172.30.1.205","172.30.1.104","TCP","54","46756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45389","21.761623","172.30.1.104","172.30.1.205","TCP","66","49671 > 39394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45390","21.761631","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45391","21.761978","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45392","21.765399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45393","21.765409","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45394","21.767302","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45395","21.767707","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45396","21.767714","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45397","21.769112","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45398","21.773817","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45399","21.773827","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45400","21.774806","172.30.1.205","172.30.1.104","TCP","74","46760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925001 TSecr=0 WS=128" +"45401","21.775157","172.30.1.104","172.30.1.205","TCP","66","135 > 46760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45402","21.775168","172.30.1.205","172.30.1.104","TCP","54","46760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45403","21.775520","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45404","21.775803","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45405","21.775812","172.30.1.205","172.30.1.104","TCP","54","46760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45406","21.778032","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45407","21.778519","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45408","21.778526","172.30.1.205","172.30.1.104","TCP","54","46760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45409","21.780365","172.30.1.205","172.30.1.104","TCP","54","46760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45410","21.780479","172.30.1.205","172.30.1.104","TCP","74","39398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925006 TSecr=0 WS=128" +"45411","21.780693","172.30.1.104","172.30.1.205","TCP","54","135 > 46760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45412","21.780708","172.30.1.104","172.30.1.205","TCP","54","135 > 46760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45413","21.780714","172.30.1.205","172.30.1.104","TCP","54","46760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45414","21.780791","172.30.1.104","172.30.1.205","TCP","66","49671 > 39398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45415","21.780801","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45416","21.781159","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45417","21.782104","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45418","21.782111","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45419","21.783990","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45420","21.784409","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45421","21.784416","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45422","21.785836","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45423","21.789420","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45424","21.789430","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45425","21.790456","172.30.1.205","172.30.1.104","TCP","74","46764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925016 TSecr=0 WS=128" +"45426","21.790790","172.30.1.104","172.30.1.205","TCP","66","135 > 46764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45427","21.790801","172.30.1.205","172.30.1.104","TCP","54","46764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45428","21.791161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45429","21.791614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45430","21.791623","172.30.1.205","172.30.1.104","TCP","54","46764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45431","21.793888","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45432","21.794395","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45433","21.794401","172.30.1.205","172.30.1.104","TCP","54","46764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45434","21.796258","172.30.1.205","172.30.1.104","TCP","54","46764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45435","21.796377","172.30.1.205","172.30.1.104","TCP","74","39402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925022 TSecr=0 WS=128" +"45436","21.796561","172.30.1.104","172.30.1.205","TCP","54","135 > 46764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45437","21.796614","172.30.1.104","172.30.1.205","TCP","54","135 > 46764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45438","21.796621","172.30.1.205","172.30.1.104","TCP","54","46764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45439","21.796698","172.30.1.104","172.30.1.205","TCP","66","49671 > 39402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45440","21.796706","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45441","21.797081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45442","21.797423","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45443","21.797432","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45444","21.799324","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45445","21.799714","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45446","21.799721","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45447","21.801120","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45448","21.804837","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45449","21.804847","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45450","21.805830","172.30.1.205","172.30.1.104","TCP","74","46768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925032 TSecr=0 WS=128" +"45451","21.806189","172.30.1.104","172.30.1.205","TCP","66","135 > 46768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45452","21.806200","172.30.1.205","172.30.1.104","TCP","54","46768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45453","21.806555","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45454","21.806882","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45455","21.806892","172.30.1.205","172.30.1.104","TCP","54","46768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45456","21.809114","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45457","21.809547","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45458","21.809553","172.30.1.205","172.30.1.104","TCP","54","46768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45459","21.811375","172.30.1.205","172.30.1.104","TCP","54","46768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45460","21.811486","172.30.1.205","172.30.1.104","TCP","74","39406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925037 TSecr=0 WS=128" +"45461","21.811830","172.30.1.104","172.30.1.205","TCP","66","49671 > 39406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45462","21.811840","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45463","21.811858","172.30.1.104","172.30.1.205","TCP","54","135 > 46768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45464","21.811918","172.30.1.104","172.30.1.205","TCP","54","135 > 46768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45465","21.811925","172.30.1.205","172.30.1.104","TCP","54","46768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45466","21.812225","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45467","21.812535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45468","21.812543","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45469","21.814434","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45470","21.814830","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45471","21.814837","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45472","21.816197","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45473","21.819709","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45474","21.819719","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45475","21.820671","172.30.1.205","172.30.1.104","TCP","74","46772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925047 TSecr=0 WS=128" +"45476","21.821007","172.30.1.104","172.30.1.205","TCP","66","135 > 46772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45477","21.821018","172.30.1.205","172.30.1.104","TCP","54","46772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45478","21.821384","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45479","21.821714","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45480","21.821724","172.30.1.205","172.30.1.104","TCP","54","46772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45481","21.823927","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45482","21.824359","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45483","21.824366","172.30.1.205","172.30.1.104","TCP","54","46772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45484","21.826195","172.30.1.205","172.30.1.104","TCP","54","46772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45485","21.826311","172.30.1.205","172.30.1.104","TCP","74","39410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925052 TSecr=0 WS=128" +"45486","21.826471","172.30.1.104","172.30.1.205","TCP","54","135 > 46772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45487","21.826502","172.30.1.104","172.30.1.205","TCP","54","135 > 46772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45488","21.826508","172.30.1.205","172.30.1.104","TCP","54","46772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45489","21.826591","172.30.1.104","172.30.1.205","TCP","66","49671 > 39410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45490","21.826599","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45491","21.826945","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45492","21.827258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45493","21.827269","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45494","21.829197","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45495","21.829599","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45496","21.829609","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45497","21.831058","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45498","21.834625","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45499","21.834637","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45500","21.835628","172.30.1.205","172.30.1.104","TCP","74","46776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925062 TSecr=0 WS=128" +"45501","21.835966","172.30.1.104","172.30.1.205","TCP","66","135 > 46776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45502","21.835978","172.30.1.205","172.30.1.104","TCP","54","46776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45503","21.836331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45504","21.836632","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45505","21.836641","172.30.1.205","172.30.1.104","TCP","54","46776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45506","21.838859","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45507","21.839305","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45508","21.839312","172.30.1.205","172.30.1.104","TCP","54","46776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45509","21.841171","172.30.1.205","172.30.1.104","TCP","54","46776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45510","21.841288","172.30.1.205","172.30.1.104","TCP","74","39414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925067 TSecr=0 WS=128" +"45511","21.841476","172.30.1.104","172.30.1.205","TCP","54","135 > 46776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45512","21.841522","172.30.1.104","172.30.1.205","TCP","54","135 > 46776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45513","21.841528","172.30.1.205","172.30.1.104","TCP","54","46776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45514","21.841638","172.30.1.104","172.30.1.205","TCP","66","49671 > 39414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45515","21.841647","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45516","21.841994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45517","21.842292","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45518","21.842301","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45519","21.844189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45520","21.844869","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45521","21.844877","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45522","21.846237","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45523","21.849844","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45524","21.849855","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45525","21.850830","172.30.1.205","172.30.1.104","TCP","74","46780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925077 TSecr=0 WS=128" +"45526","21.851417","172.30.1.104","172.30.1.205","TCP","66","135 > 46780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45527","21.851428","172.30.1.205","172.30.1.104","TCP","54","46780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45528","21.851781","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45529","21.852119","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45530","21.852128","172.30.1.205","172.30.1.104","TCP","54","46780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45531","21.854358","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45532","21.854812","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45533","21.854819","172.30.1.205","172.30.1.104","TCP","54","46780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45534","21.856668","172.30.1.205","172.30.1.104","TCP","54","46780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45535","21.856806","172.30.1.205","172.30.1.104","TCP","74","39418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925083 TSecr=0 WS=128" +"45536","21.856959","172.30.1.104","172.30.1.205","TCP","54","135 > 46780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45537","21.857002","172.30.1.104","172.30.1.205","TCP","54","135 > 46780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45538","21.857008","172.30.1.205","172.30.1.104","TCP","54","46780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45539","21.857112","172.30.1.104","172.30.1.205","TCP","66","49671 > 39418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45540","21.857121","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45541","21.857469","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45542","21.857789","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45543","21.857798","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45544","21.859663","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45545","21.860180","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45546","21.860187","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45547","21.861572","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45548","21.865164","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45549","21.865174","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45550","21.866130","172.30.1.205","172.30.1.104","TCP","74","46784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925092 TSecr=0 WS=128" +"45551","21.866475","172.30.1.104","172.30.1.205","TCP","66","135 > 46784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45552","21.866486","172.30.1.205","172.30.1.104","TCP","54","46784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45553","21.866842","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45554","21.867212","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45555","21.867221","172.30.1.205","172.30.1.104","TCP","54","46784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45556","21.869454","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45557","21.869905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45558","21.869911","172.30.1.205","172.30.1.104","TCP","54","46784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45559","21.871726","172.30.1.205","172.30.1.104","TCP","54","46784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45560","21.871840","172.30.1.205","172.30.1.104","TCP","74","39422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925098 TSecr=0 WS=128" +"45561","21.872005","172.30.1.104","172.30.1.205","TCP","54","135 > 46784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45562","21.872043","172.30.1.104","172.30.1.205","TCP","54","135 > 46784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45563","21.872048","172.30.1.205","172.30.1.104","TCP","54","46784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45564","21.872136","172.30.1.104","172.30.1.205","TCP","66","49671 > 39422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45565","21.872144","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45566","21.872495","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45567","21.872801","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45568","21.872811","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45569","21.874723","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45570","21.875146","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45571","21.875152","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45572","21.876502","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45573","21.880140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45574","21.880154","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45575","21.881152","172.30.1.205","172.30.1.104","TCP","74","46788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925107 TSecr=0 WS=128" +"45576","21.881478","172.30.1.104","172.30.1.205","TCP","66","135 > 46788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45577","21.881489","172.30.1.205","172.30.1.104","TCP","54","46788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45578","21.881844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45579","21.882204","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45580","21.882214","172.30.1.205","172.30.1.104","TCP","54","46788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45581","21.884417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45582","21.884885","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45583","21.884892","172.30.1.205","172.30.1.104","TCP","54","46788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45584","21.886726","172.30.1.205","172.30.1.104","TCP","54","46788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45585","21.886839","172.30.1.205","172.30.1.104","TCP","74","39426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925113 TSecr=0 WS=128" +"45586","21.887013","172.30.1.104","172.30.1.205","TCP","54","135 > 46788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45587","21.887093","172.30.1.104","172.30.1.205","TCP","54","135 > 46788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45588","21.887099","172.30.1.205","172.30.1.104","TCP","54","46788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45589","21.887196","172.30.1.104","172.30.1.205","TCP","66","49671 > 39426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45590","21.887204","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45591","21.887565","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45592","21.887905","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45593","21.887913","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45594","21.889803","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45595","21.891175","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45596","21.891182","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45597","21.892536","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45598","21.896102","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45599","21.896112","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45600","21.897092","172.30.1.205","172.30.1.104","TCP","74","46792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925123 TSecr=0 WS=128" +"45601","21.897458","172.30.1.104","172.30.1.205","TCP","66","135 > 46792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45602","21.897471","172.30.1.205","172.30.1.104","TCP","54","46792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45603","21.897852","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45604","21.898195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45605","21.898204","172.30.1.205","172.30.1.104","TCP","54","46792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45606","21.900411","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45607","21.900924","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45608","21.900931","172.30.1.205","172.30.1.104","TCP","54","46792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45609","21.901789","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45610","21.901837","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45611","21.901869","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45612","21.901906","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45613","21.901949","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45614","21.901977","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45615","21.902003","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45616","21.902043","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45617","21.902065","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45618","21.902081","172.30.1.104","172.30.1.205","TCP","54","49671 > 39386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45619","21.902117","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45620","21.902141","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45621","21.902165","172.30.1.104","172.30.1.205","TCP","54","49671 > 39390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45622","21.902232","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45623","21.902549","172.30.1.104","172.30.1.205","TCP","54","49671 > 39394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45624","21.902574","172.30.1.104","172.30.1.205","TCP","54","49671 > 39398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45625","21.902601","172.30.1.104","172.30.1.205","TCP","54","49671 > 39402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45626","21.902628","172.30.1.104","172.30.1.205","TCP","54","49671 > 39406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45627","21.902671","172.30.1.104","172.30.1.205","TCP","54","49671 > 39410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45628","21.902677","172.30.1.104","172.30.1.205","TCP","54","49671 > 39414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45629","21.902718","172.30.1.104","172.30.1.205","TCP","54","49671 > 39418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45630","21.902744","172.30.1.104","172.30.1.205","TCP","54","49671 > 39422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45631","21.902776","172.30.1.104","172.30.1.205","TCP","54","49671 > 39426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45632","21.902804","172.30.1.104","172.30.1.205","TCP","54","49671 > 39382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45633","21.902832","172.30.1.104","172.30.1.205","TCP","54","49671 > 39382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45634","21.902839","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45635","21.902866","172.30.1.104","172.30.1.205","TCP","54","49671 > 39426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45636","21.902870","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45637","21.902898","172.30.1.104","172.30.1.205","TCP","54","49671 > 39422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45638","21.902902","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45639","21.902923","172.30.1.104","172.30.1.205","TCP","54","49671 > 39418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45640","21.902927","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45641","21.902951","172.30.1.104","172.30.1.205","TCP","54","49671 > 39414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45642","21.902954","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45643","21.902986","172.30.1.104","172.30.1.205","TCP","54","49671 > 39410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45644","21.902989","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45645","21.903010","172.30.1.104","172.30.1.205","TCP","54","49671 > 39406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45646","21.903013","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45647","21.903168","172.30.1.104","172.30.1.205","TCP","54","49671 > 39402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45648","21.903171","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45649","21.903194","172.30.1.104","172.30.1.205","TCP","54","49671 > 39398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45650","21.903197","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45651","21.903229","172.30.1.104","172.30.1.205","TCP","54","49671 > 39386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45652","21.903232","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45653","21.903254","172.30.1.104","172.30.1.205","TCP","54","49671 > 39390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45654","21.903257","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45655","21.903281","172.30.1.104","172.30.1.205","TCP","54","49671 > 39394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45656","21.903293","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45657","21.903900","172.30.1.205","172.30.1.104","TCP","54","46792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45658","21.904015","172.30.1.205","172.30.1.104","TCP","74","39430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925130 TSecr=0 WS=128" +"45659","21.904167","172.30.1.104","172.30.1.205","TCP","54","135 > 46792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45660","21.904190","172.30.1.104","172.30.1.205","TCP","54","135 > 46792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45661","21.904195","172.30.1.205","172.30.1.104","TCP","54","46792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45662","21.904304","172.30.1.104","172.30.1.205","TCP","66","49671 > 39430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45663","21.904312","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45664","21.904671","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45665","21.904991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45666","21.905001","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45667","21.906896","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45668","21.907277","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45669","21.907285","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45670","21.908678","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45671","21.912168","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45672","21.912178","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45673","21.913177","172.30.1.205","172.30.1.104","TCP","74","46796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925139 TSecr=0 WS=128" +"45674","21.913508","172.30.1.104","172.30.1.205","TCP","66","135 > 46796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45675","21.913519","172.30.1.205","172.30.1.104","TCP","54","46796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45676","21.913877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45677","21.914189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45678","21.914199","172.30.1.205","172.30.1.104","TCP","54","46796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45679","21.916393","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45680","21.916810","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45681","21.916818","172.30.1.205","172.30.1.104","TCP","54","46796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45682","21.918665","172.30.1.205","172.30.1.104","TCP","54","46796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45683","21.918783","172.30.1.205","172.30.1.104","TCP","74","39434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925145 TSecr=0 WS=128" +"45684","21.919011","172.30.1.104","172.30.1.205","TCP","54","135 > 46796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45685","21.919067","172.30.1.104","172.30.1.205","TCP","54","135 > 46796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45686","21.919074","172.30.1.205","172.30.1.104","TCP","54","46796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45687","21.919184","172.30.1.104","172.30.1.205","TCP","66","49671 > 39434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45688","21.919193","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45689","21.919537","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45690","21.919850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45691","21.919859","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45692","21.921772","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45693","21.922140","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45694","21.922147","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45695","21.923494","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45696","21.926942","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45697","21.926955","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45698","21.927971","172.30.1.205","172.30.1.104","TCP","74","46800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925154 TSecr=0 WS=128" +"45699","21.928286","172.30.1.104","172.30.1.205","TCP","66","135 > 46800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45700","21.928307","172.30.1.205","172.30.1.104","TCP","54","46800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45701","21.928661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45702","21.929030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45703","21.929040","172.30.1.205","172.30.1.104","TCP","54","46800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45704","21.931280","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45705","21.931675","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45706","21.931682","172.30.1.205","172.30.1.104","TCP","54","46800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45707","21.933533","172.30.1.205","172.30.1.104","TCP","54","46800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45708","21.933665","172.30.1.205","172.30.1.104","TCP","74","39438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925160 TSecr=0 WS=128" +"45709","21.933852","172.30.1.104","172.30.1.205","TCP","54","135 > 46800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45710","21.933903","172.30.1.104","172.30.1.205","TCP","54","135 > 46800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45711","21.933910","172.30.1.205","172.30.1.104","TCP","54","46800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45712","21.934049","172.30.1.104","172.30.1.205","TCP","66","49671 > 39438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45713","21.934058","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45714","21.934406","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45715","21.934715","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45716","21.934724","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45717","21.936623","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45718","21.936977","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45719","21.936984","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45720","21.938359","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45721","21.941737","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45722","21.941748","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45723","21.942783","172.30.1.205","172.30.1.104","TCP","74","46804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925169 TSecr=0 WS=128" +"45724","21.943078","172.30.1.104","172.30.1.205","TCP","66","135 > 46804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45725","21.943090","172.30.1.205","172.30.1.104","TCP","54","46804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45726","21.943443","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45727","21.943744","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45728","21.943752","172.30.1.205","172.30.1.104","TCP","54","46804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45729","21.946013","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45730","21.946420","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45731","21.946427","172.30.1.205","172.30.1.104","TCP","54","46804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45732","21.948265","172.30.1.205","172.30.1.104","TCP","54","46804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45733","21.948380","172.30.1.205","172.30.1.104","TCP","74","39442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925174 TSecr=0 WS=128" +"45734","21.948537","172.30.1.104","172.30.1.205","TCP","54","135 > 46804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45735","21.948619","172.30.1.104","172.30.1.205","TCP","54","135 > 46804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45736","21.948626","172.30.1.205","172.30.1.104","TCP","54","46804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45737","21.948696","172.30.1.104","172.30.1.205","TCP","66","49671 > 39442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45738","21.948704","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45739","21.949077","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45740","21.949394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45741","21.949404","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45742","21.951284","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45743","21.951674","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45744","21.951680","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45745","21.953072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45746","21.956557","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45747","21.956571","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45748","21.957611","172.30.1.205","172.30.1.104","TCP","74","46808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925184 TSecr=0 WS=128" +"45749","21.957947","172.30.1.104","172.30.1.205","TCP","66","135 > 46808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45750","21.957958","172.30.1.205","172.30.1.104","TCP","54","46808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45751","21.958313","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45752","21.958609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45753","21.958619","172.30.1.205","172.30.1.104","TCP","54","46808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45754","21.960835","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45755","21.961265","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45756","21.961274","172.30.1.205","172.30.1.104","TCP","54","46808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45757","21.963156","172.30.1.205","172.30.1.104","TCP","54","46808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45758","21.963273","172.30.1.205","172.30.1.104","TCP","74","39446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925189 TSecr=0 WS=128" +"45759","21.963431","172.30.1.104","172.30.1.205","TCP","54","135 > 46808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45760","21.963492","172.30.1.104","172.30.1.205","TCP","54","135 > 46808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45761","21.963499","172.30.1.205","172.30.1.104","TCP","54","46808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45762","21.963585","172.30.1.104","172.30.1.205","TCP","66","49671 > 39446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45763","21.963594","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45764","21.963946","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45765","21.964258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45766","21.964267","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45767","21.966161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45768","21.966556","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45769","21.966563","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45770","21.967915","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45771","21.971480","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45772","21.971490","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45773","21.972442","172.30.1.205","172.30.1.104","TCP","74","46812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925198 TSecr=0 WS=128" +"45774","21.972743","172.30.1.104","172.30.1.205","TCP","66","135 > 46812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45775","21.972754","172.30.1.205","172.30.1.104","TCP","54","46812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45776","21.973124","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45777","21.973434","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45778","21.973444","172.30.1.205","172.30.1.104","TCP","54","46812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45779","21.975640","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45780","21.976134","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45781","21.976141","172.30.1.205","172.30.1.104","TCP","54","46812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45782","21.977995","172.30.1.205","172.30.1.104","TCP","54","46812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45783","21.978109","172.30.1.205","172.30.1.104","TCP","74","39450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925204 TSecr=0 WS=128" +"45784","21.978269","172.30.1.104","172.30.1.205","TCP","54","135 > 46812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45785","21.978303","172.30.1.104","172.30.1.205","TCP","54","135 > 46812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45786","21.978309","172.30.1.205","172.30.1.104","TCP","54","46812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45787","21.978409","172.30.1.104","172.30.1.205","TCP","66","49671 > 39450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45788","21.978418","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45789","21.978765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45790","21.979092","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45791","21.979104","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45792","21.981017","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45793","21.981374","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45794","21.981380","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45795","21.982741","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45796","21.986224","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45797","21.986233","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45798","21.987202","172.30.1.205","172.30.1.104","TCP","74","46816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925213 TSecr=0 WS=128" +"45799","21.987533","172.30.1.104","172.30.1.205","TCP","66","135 > 46816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45800","21.987544","172.30.1.205","172.30.1.104","TCP","54","46816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45801","21.987903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45802","21.988200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45803","21.988210","172.30.1.205","172.30.1.104","TCP","54","46816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45804","21.990445","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45805","21.990841","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45806","21.990848","172.30.1.205","172.30.1.104","TCP","54","46816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45807","21.992663","172.30.1.205","172.30.1.104","TCP","54","46816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45808","21.992791","172.30.1.205","172.30.1.104","TCP","74","39454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925219 TSecr=0 WS=128" +"45809","21.992943","172.30.1.104","172.30.1.205","TCP","54","135 > 46816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45810","21.992987","172.30.1.104","172.30.1.205","TCP","54","135 > 46816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45811","21.992992","172.30.1.205","172.30.1.104","TCP","54","46816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45812","21.993083","172.30.1.104","172.30.1.205","TCP","66","49671 > 39454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45813","21.993091","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45814","21.993436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45815","21.993744","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45816","21.993753","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45817","21.995623","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45818","21.995990","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45819","21.995997","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45820","21.997394","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45821","22.000896","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45822","22.000905","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45823","22.001868","172.30.1.205","172.30.1.104","TCP","74","46820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925228 TSecr=0 WS=128" +"45824","22.002193","172.30.1.104","172.30.1.205","TCP","66","135 > 46820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45825","22.002204","172.30.1.205","172.30.1.104","TCP","54","46820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45826","22.002562","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45827","22.002910","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45828","22.002919","172.30.1.205","172.30.1.104","TCP","54","46820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45829","22.005166","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45830","22.005554","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45831","22.005561","172.30.1.205","172.30.1.104","TCP","54","46820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45832","22.007390","172.30.1.205","172.30.1.104","TCP","54","46820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45833","22.007509","172.30.1.205","172.30.1.104","TCP","74","39458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925233 TSecr=0 WS=128" +"45834","22.007660","172.30.1.104","172.30.1.205","TCP","54","135 > 46820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45835","22.007698","172.30.1.104","172.30.1.205","TCP","54","135 > 46820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45836","22.007704","172.30.1.205","172.30.1.104","TCP","54","46820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45837","22.007797","172.30.1.104","172.30.1.205","TCP","66","49671 > 39458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45838","22.007805","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45839","22.008169","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45840","22.009440","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45841","22.009448","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45842","22.011333","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45843","22.011708","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45844","22.011719","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45845","22.013244","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45846","22.016792","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45847","22.016804","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45848","22.017842","172.30.1.205","172.30.1.104","TCP","74","46824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925244 TSecr=0 WS=128" +"45849","22.018181","172.30.1.104","172.30.1.205","TCP","66","135 > 46824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45850","22.018196","172.30.1.205","172.30.1.104","TCP","54","46824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45851","22.018570","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45852","22.018930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45853","22.018944","172.30.1.205","172.30.1.104","TCP","54","46824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45854","22.021293","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45855","22.021735","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45856","22.021743","172.30.1.205","172.30.1.104","TCP","54","46824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45857","22.023572","172.30.1.205","172.30.1.104","TCP","54","46824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45858","22.023689","172.30.1.205","172.30.1.104","TCP","74","39462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925250 TSecr=0 WS=128" +"45859","22.023855","172.30.1.104","172.30.1.205","TCP","54","135 > 46824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45860","22.023893","172.30.1.104","172.30.1.205","TCP","54","135 > 46824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45861","22.023900","172.30.1.205","172.30.1.104","TCP","54","46824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45862","22.024009","172.30.1.104","172.30.1.205","TCP","66","49671 > 39462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45863","22.024017","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45864","22.024366","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45865","22.024659","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45866","22.024668","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45867","22.026578","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45868","22.026957","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45869","22.026968","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45870","22.028616","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45871","22.032120","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45872","22.032132","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45873","22.033152","172.30.1.205","172.30.1.104","TCP","74","46828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925259 TSecr=0 WS=128" +"45874","22.033485","172.30.1.104","172.30.1.205","TCP","66","135 > 46828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45875","22.033496","172.30.1.205","172.30.1.104","TCP","54","46828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45876","22.033854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45877","22.034226","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45878","22.034237","172.30.1.205","172.30.1.104","TCP","54","46828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45879","22.036469","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45880","22.036883","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45881","22.036889","172.30.1.205","172.30.1.104","TCP","54","46828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45882","22.038731","172.30.1.205","172.30.1.104","TCP","54","46828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45883","22.038856","172.30.1.205","172.30.1.104","TCP","74","39466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925265 TSecr=0 WS=128" +"45884","22.039029","172.30.1.104","172.30.1.205","TCP","54","135 > 46828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45885","22.039054","172.30.1.104","172.30.1.205","TCP","54","135 > 46828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45886","22.039060","172.30.1.205","172.30.1.104","TCP","54","46828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45887","22.039157","172.30.1.104","172.30.1.205","TCP","66","49671 > 39466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45888","22.039165","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45889","22.039512","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45890","22.039816","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45891","22.039823","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45892","22.041725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45893","22.042106","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45894","22.042113","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45895","22.043471","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45896","22.046960","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45897","22.046971","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45898","22.047936","172.30.1.205","172.30.1.104","TCP","74","46832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925274 TSecr=0 WS=128" +"45899","22.048285","172.30.1.104","172.30.1.205","TCP","66","135 > 46832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45900","22.048296","172.30.1.205","172.30.1.104","TCP","54","46832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45901","22.048649","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45902","22.048971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45903","22.048984","172.30.1.205","172.30.1.104","TCP","54","46832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45904","22.051273","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45905","22.051750","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45906","22.051757","172.30.1.205","172.30.1.104","TCP","54","46832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45907","22.053615","172.30.1.205","172.30.1.104","TCP","54","46832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45908","22.053736","172.30.1.205","172.30.1.104","TCP","74","39470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925280 TSecr=0 WS=128" +"45909","22.053939","172.30.1.104","172.30.1.205","TCP","54","135 > 46832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45910","22.053983","172.30.1.104","172.30.1.205","TCP","54","135 > 46832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45911","22.053989","172.30.1.205","172.30.1.104","TCP","54","46832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45912","22.054090","172.30.1.104","172.30.1.205","TCP","66","49671 > 39470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45913","22.054098","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45914","22.054450","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45915","22.055715","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45916","22.055722","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45917","22.057626","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45918","22.058066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45919","22.058073","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45920","22.059414","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45921","22.063025","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45922","22.063034","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45923","22.063992","172.30.1.205","172.30.1.104","TCP","74","46836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925290 TSecr=0 WS=128" +"45924","22.064331","172.30.1.104","172.30.1.205","TCP","66","135 > 46836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45925","22.064349","172.30.1.205","172.30.1.104","TCP","54","46836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45926","22.064693","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45927","22.065062","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45928","22.065072","172.30.1.205","172.30.1.104","TCP","54","46836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45929","22.067255","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45930","22.067716","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45931","22.067722","172.30.1.205","172.30.1.104","TCP","54","46836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45932","22.069562","172.30.1.205","172.30.1.104","TCP","54","46836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45933","22.069672","172.30.1.205","172.30.1.104","TCP","74","39474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925296 TSecr=0 WS=128" +"45934","22.069827","172.30.1.104","172.30.1.205","TCP","54","135 > 46836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45935","22.069865","172.30.1.104","172.30.1.205","TCP","54","135 > 46836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"45936","22.069871","172.30.1.205","172.30.1.104","TCP","54","46836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"45937","22.069979","172.30.1.104","172.30.1.205","TCP","66","49671 > 39474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45938","22.069987","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45939","22.070328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"45940","22.070635","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45941","22.070643","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45942","22.072520","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"45943","22.072913","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"45944","22.072920","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"45945","22.074278","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"45946","22.077937","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"45947","22.077947","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45948","22.078937","172.30.1.205","172.30.1.104","TCP","74","46840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925305 TSecr=0 WS=128" +"45949","22.079263","172.30.1.104","172.30.1.205","TCP","66","135 > 46840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"45950","22.079275","172.30.1.205","172.30.1.104","TCP","54","46840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"45951","22.079621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"45952","22.079914","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"45953","22.079924","172.30.1.205","172.30.1.104","TCP","54","46840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"45954","22.082174","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"45955","22.082598","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"45956","22.082604","172.30.1.205","172.30.1.104","TCP","54","46840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"45957","22.083452","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45958","22.083501","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45959","22.083537","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45960","22.083569","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45961","22.083600","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45962","22.083631","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45963","22.083661","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45964","22.083692","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45965","22.083723","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45966","22.083755","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45967","22.083792","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45968","22.083865","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"45969","22.084183","172.30.1.104","172.30.1.205","TCP","54","49671 > 39434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45970","22.084197","172.30.1.104","172.30.1.205","TCP","54","49671 > 39438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45971","22.084200","172.30.1.104","172.30.1.205","TCP","54","49671 > 39442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45972","22.084207","172.30.1.104","172.30.1.205","TCP","54","49671 > 39446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45973","22.084295","172.30.1.104","172.30.1.205","TCP","54","49671 > 39450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45974","22.084299","172.30.1.104","172.30.1.205","TCP","54","49671 > 39454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45975","22.084304","172.30.1.104","172.30.1.205","TCP","54","49671 > 39458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45976","22.084541","172.30.1.104","172.30.1.205","TCP","54","49671 > 39462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45977","22.084547","172.30.1.104","172.30.1.205","TCP","54","49671 > 39466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45978","22.084549","172.30.1.104","172.30.1.205","TCP","54","49671 > 39470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45979","22.084557","172.30.1.104","172.30.1.205","TCP","54","49671 > 39474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45980","22.084559","172.30.1.104","172.30.1.205","TCP","54","49671 > 39430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45981","22.084561","172.30.1.104","172.30.1.205","TCP","54","49671 > 39430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45982","22.084569","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45983","22.084575","172.30.1.104","172.30.1.205","TCP","54","49671 > 39474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45984","22.084577","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45985","22.084579","172.30.1.104","172.30.1.205","TCP","54","49671 > 39470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45986","22.084581","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45987","22.084582","172.30.1.104","172.30.1.205","TCP","54","49671 > 39466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45988","22.084583","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45989","22.084820","172.30.1.104","172.30.1.205","TCP","54","49671 > 39462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45990","22.084826","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45991","22.084832","172.30.1.104","172.30.1.205","TCP","54","49671 > 39458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45992","22.084834","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45993","22.084836","172.30.1.104","172.30.1.205","TCP","54","49671 > 39454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45994","22.084837","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45995","22.084838","172.30.1.104","172.30.1.205","TCP","54","49671 > 39450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45996","22.084840","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45997","22.084842","172.30.1.104","172.30.1.205","TCP","54","49671 > 39446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"45998","22.084843","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"45999","22.084845","172.30.1.104","172.30.1.205","TCP","54","49671 > 39434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46000","22.084851","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46001","22.084852","172.30.1.104","172.30.1.205","TCP","54","49671 > 39438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46002","22.084854","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46003","22.084855","172.30.1.104","172.30.1.205","TCP","54","49671 > 39442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46004","22.084857","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46005","22.085345","172.30.1.205","172.30.1.104","TCP","54","46840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46006","22.085455","172.30.1.205","172.30.1.104","TCP","74","39478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925311 TSecr=0 WS=128" +"46007","22.085610","172.30.1.104","172.30.1.205","TCP","54","135 > 46840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46008","22.085647","172.30.1.104","172.30.1.205","TCP","54","135 > 46840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46009","22.085652","172.30.1.205","172.30.1.104","TCP","54","46840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46010","22.085752","172.30.1.104","172.30.1.205","TCP","66","49671 > 39478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46011","22.085760","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46012","22.086109","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46013","22.086425","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46014","22.086433","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46015","22.088301","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46016","22.088669","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46017","22.088676","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46018","22.090052","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46019","22.093504","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46020","22.093514","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46021","22.094466","172.30.1.205","172.30.1.104","TCP","74","46844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925320 TSecr=0 WS=128" +"46022","22.094766","172.30.1.104","172.30.1.205","TCP","66","135 > 46844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46023","22.094776","172.30.1.205","172.30.1.104","TCP","54","46844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46024","22.095126","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46025","22.095418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46026","22.095426","172.30.1.205","172.30.1.104","TCP","54","46844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46027","22.097622","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46028","22.098119","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46029","22.098126","172.30.1.205","172.30.1.104","TCP","54","46844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46030","22.099946","172.30.1.205","172.30.1.104","TCP","54","46844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46031","22.100055","172.30.1.205","172.30.1.104","TCP","74","39482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925326 TSecr=0 WS=128" +"46032","22.100281","172.30.1.104","172.30.1.205","TCP","54","135 > 46844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46033","22.100351","172.30.1.104","172.30.1.205","TCP","54","135 > 46844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46034","22.100357","172.30.1.205","172.30.1.104","TCP","54","46844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46035","22.100476","172.30.1.104","172.30.1.205","TCP","66","49671 > 39482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46036","22.100484","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46037","22.100849","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46038","22.101180","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46039","22.101188","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46040","22.103110","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46041","22.103522","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46042","22.103527","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46043","22.104886","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46044","22.108416","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46045","22.108425","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46046","22.109397","172.30.1.205","172.30.1.104","TCP","74","46848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925335 TSecr=0 WS=128" +"46047","22.109698","172.30.1.104","172.30.1.205","TCP","66","135 > 46848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46048","22.109709","172.30.1.205","172.30.1.104","TCP","54","46848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46049","22.110082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46050","22.110369","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46051","22.110378","172.30.1.205","172.30.1.104","TCP","54","46848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46052","22.112566","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46053","22.113034","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46054","22.113040","172.30.1.205","172.30.1.104","TCP","54","46848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46055","22.114844","172.30.1.205","172.30.1.104","TCP","54","46848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46056","22.114952","172.30.1.205","172.30.1.104","TCP","74","39486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925341 TSecr=0 WS=128" +"46057","22.115214","172.30.1.104","172.30.1.205","TCP","54","135 > 46848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46058","22.115222","172.30.1.104","172.30.1.205","TCP","54","135 > 46848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46059","22.115227","172.30.1.205","172.30.1.104","TCP","54","46848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46060","22.115336","172.30.1.104","172.30.1.205","TCP","66","49671 > 39486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46061","22.115344","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46062","22.115687","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46063","22.115982","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46064","22.115991","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46065","22.117957","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46066","22.118356","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46067","22.118363","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46068","22.119709","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46069","22.123209","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46070","22.123218","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46071","22.124161","172.30.1.205","172.30.1.104","TCP","74","46852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925350 TSecr=0 WS=128" +"46072","22.124461","172.30.1.104","172.30.1.205","TCP","66","135 > 46852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46073","22.124474","172.30.1.205","172.30.1.104","TCP","54","46852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46074","22.124856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46075","22.125167","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46076","22.125176","172.30.1.205","172.30.1.104","TCP","54","46852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46077","22.127356","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46078","22.127780","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46079","22.127786","172.30.1.205","172.30.1.104","TCP","54","46852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46080","22.129605","172.30.1.205","172.30.1.104","TCP","54","46852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46081","22.129713","172.30.1.205","172.30.1.104","TCP","74","39490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925356 TSecr=0 WS=128" +"46082","22.129900","172.30.1.104","172.30.1.205","TCP","54","135 > 46852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46083","22.129978","172.30.1.104","172.30.1.205","TCP","54","135 > 46852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46084","22.129984","172.30.1.205","172.30.1.104","TCP","54","46852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46085","22.130089","172.30.1.104","172.30.1.205","TCP","66","49671 > 39490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46086","22.130097","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46087","22.130446","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46088","22.131197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46089","22.131206","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46090","22.133099","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46091","22.133460","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46092","22.133469","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46093","22.134921","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46094","22.138599","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46095","22.138614","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46096","22.139610","172.30.1.205","172.30.1.104","TCP","74","46856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925366 TSecr=0 WS=128" +"46097","22.139949","172.30.1.104","172.30.1.205","TCP","66","135 > 46856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46098","22.139961","172.30.1.205","172.30.1.104","TCP","54","46856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46099","22.140318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46100","22.140677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46101","22.140686","172.30.1.205","172.30.1.104","TCP","54","46856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46102","22.142890","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46103","22.143383","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46104","22.143389","172.30.1.205","172.30.1.104","TCP","54","46856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46105","22.145234","172.30.1.205","172.30.1.104","TCP","54","46856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46106","22.145344","172.30.1.205","172.30.1.104","TCP","74","39494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925371 TSecr=0 WS=128" +"46107","22.145550","172.30.1.104","172.30.1.205","TCP","54","135 > 46856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46108","22.145587","172.30.1.104","172.30.1.205","TCP","54","135 > 46856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46109","22.145593","172.30.1.205","172.30.1.104","TCP","54","46856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46110","22.145731","172.30.1.104","172.30.1.205","TCP","66","49671 > 39494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46111","22.145739","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46112","22.146089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46113","22.146399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46114","22.146408","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46115","22.148265","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46116","22.148654","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46117","22.148661","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46118","22.150026","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46119","22.153667","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46120","22.153677","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46121","22.154606","172.30.1.205","172.30.1.104","TCP","74","46860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925381 TSecr=0 WS=128" +"46122","22.154993","172.30.1.104","172.30.1.205","TCP","66","135 > 46860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46123","22.155004","172.30.1.205","172.30.1.104","TCP","54","46860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46124","22.155357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46125","22.155666","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46126","22.155675","172.30.1.205","172.30.1.104","TCP","54","46860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46127","22.157898","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46128","22.158310","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46129","22.158316","172.30.1.205","172.30.1.104","TCP","54","46860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46130","22.160149","172.30.1.205","172.30.1.104","TCP","54","46860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46131","22.160267","172.30.1.205","172.30.1.104","TCP","74","39498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925386 TSecr=0 WS=128" +"46132","22.160468","172.30.1.104","172.30.1.205","TCP","54","135 > 46860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46133","22.160499","172.30.1.104","172.30.1.205","TCP","54","135 > 46860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46134","22.160507","172.30.1.205","172.30.1.104","TCP","54","46860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46135","22.160602","172.30.1.104","172.30.1.205","TCP","66","49671 > 39498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46136","22.160610","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46137","22.160983","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46138","22.161280","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46139","22.161289","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46140","22.163163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46141","22.163572","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46142","22.163579","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46143","22.164949","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46144","22.168632","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46145","22.168643","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46146","22.169608","172.30.1.205","172.30.1.104","TCP","74","46864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925396 TSecr=0 WS=128" +"46147","22.169937","172.30.1.104","172.30.1.205","TCP","66","135 > 46864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46148","22.169947","172.30.1.205","172.30.1.104","TCP","54","46864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46149","22.170307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46150","22.170606","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46151","22.170615","172.30.1.205","172.30.1.104","TCP","54","46864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46152","22.172811","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46153","22.173227","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46154","22.173233","172.30.1.205","172.30.1.104","TCP","54","46864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46155","22.175043","172.30.1.205","172.30.1.104","TCP","54","46864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46156","22.175155","172.30.1.205","172.30.1.104","TCP","74","39502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925401 TSecr=0 WS=128" +"46157","22.175298","172.30.1.104","172.30.1.205","TCP","54","135 > 46864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46158","22.175339","172.30.1.104","172.30.1.205","TCP","54","135 > 46864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46159","22.175344","172.30.1.205","172.30.1.104","TCP","54","46864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46160","22.175428","172.30.1.104","172.30.1.205","TCP","66","49671 > 39502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46161","22.175436","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46162","22.175782","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46163","22.176091","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46164","22.176101","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46165","22.178001","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46166","22.178402","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46167","22.178408","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46168","22.179757","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46169","22.183311","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46170","22.183320","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46171","22.184262","172.30.1.205","172.30.1.104","TCP","74","46868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925410 TSecr=0 WS=128" +"46172","22.184558","172.30.1.104","172.30.1.205","TCP","66","135 > 46868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46173","22.184569","172.30.1.205","172.30.1.104","TCP","54","46868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46174","22.184943","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46175","22.185233","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46176","22.185242","172.30.1.205","172.30.1.104","TCP","54","46868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46177","22.187417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46178","22.187854","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46179","22.187861","172.30.1.205","172.30.1.104","TCP","54","46868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46180","22.189672","172.30.1.205","172.30.1.104","TCP","54","46868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46181","22.189782","172.30.1.205","172.30.1.104","TCP","74","39506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925416 TSecr=0 WS=128" +"46182","22.189958","172.30.1.104","172.30.1.205","TCP","54","135 > 46868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46183","22.189967","172.30.1.104","172.30.1.205","TCP","54","135 > 46868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46184","22.189973","172.30.1.205","172.30.1.104","TCP","54","46868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46185","22.190078","172.30.1.104","172.30.1.205","TCP","66","49671 > 39506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46186","22.190086","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46187","22.190445","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46188","22.190721","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46189","22.190730","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46190","22.192582","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46191","22.192929","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46192","22.192936","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46193","22.194291","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46194","22.197775","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46195","22.197784","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46196","22.198719","172.30.1.205","172.30.1.104","TCP","74","46872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925425 TSecr=0 WS=128" +"46197","22.199073","172.30.1.104","172.30.1.205","TCP","66","135 > 46872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46198","22.199084","172.30.1.205","172.30.1.104","TCP","54","46872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46199","22.199428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46200","22.199744","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46201","22.199753","172.30.1.205","172.30.1.104","TCP","54","46872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46202","22.201941","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46203","22.202359","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46204","22.202365","172.30.1.205","172.30.1.104","TCP","54","46872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46205","22.204170","172.30.1.205","172.30.1.104","TCP","54","46872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46206","22.204279","172.30.1.205","172.30.1.104","TCP","74","39510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925430 TSecr=0 WS=128" +"46207","22.204442","172.30.1.104","172.30.1.205","TCP","54","135 > 46872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46208","22.204452","172.30.1.104","172.30.1.205","TCP","54","135 > 46872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46209","22.204457","172.30.1.205","172.30.1.104","TCP","54","46872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46210","22.204588","172.30.1.104","172.30.1.205","TCP","66","49671 > 39510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46211","22.204598","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46212","22.204967","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46213","22.205276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46214","22.205285","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46215","22.207147","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46216","22.207524","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46217","22.207530","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46218","22.208883","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46219","22.212468","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46220","22.212477","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46221","22.213421","172.30.1.205","172.30.1.104","TCP","74","46876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925439 TSecr=0 WS=128" +"46222","22.213729","172.30.1.104","172.30.1.205","TCP","66","135 > 46876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46223","22.213740","172.30.1.205","172.30.1.104","TCP","54","46876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46224","22.214088","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46225","22.214381","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46226","22.214389","172.30.1.205","172.30.1.104","TCP","54","46876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46227","22.216563","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46228","22.216969","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46229","22.216975","172.30.1.205","172.30.1.104","TCP","54","46876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46230","22.218789","172.30.1.205","172.30.1.104","TCP","54","46876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46231","22.218899","172.30.1.205","172.30.1.104","TCP","74","39514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925445 TSecr=0 WS=128" +"46232","22.219041","172.30.1.104","172.30.1.205","TCP","54","135 > 46876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46233","22.219052","172.30.1.104","172.30.1.205","TCP","54","135 > 46876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46234","22.219057","172.30.1.205","172.30.1.104","TCP","54","46876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46235","22.219270","172.30.1.104","172.30.1.205","TCP","66","49671 > 39514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46236","22.219278","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46237","22.219619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46238","22.219923","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46239","22.219930","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46240","22.221805","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46241","22.222159","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46242","22.222165","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46243","22.223495","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46244","22.226990","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46245","22.226999","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46246","22.227926","172.30.1.205","172.30.1.104","TCP","74","46880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925454 TSecr=0 WS=128" +"46247","22.228255","172.30.1.104","172.30.1.205","TCP","66","135 > 46880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46248","22.228267","172.30.1.205","172.30.1.104","TCP","54","46880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46249","22.228618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46250","22.229002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46251","22.229011","172.30.1.205","172.30.1.104","TCP","54","46880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46252","22.231221","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46253","22.231673","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46254","22.231680","172.30.1.205","172.30.1.104","TCP","54","46880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46255","22.233504","172.30.1.205","172.30.1.104","TCP","54","46880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46256","22.233612","172.30.1.205","172.30.1.104","TCP","74","39518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925460 TSecr=0 WS=128" +"46257","22.233781","172.30.1.104","172.30.1.205","TCP","54","135 > 46880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46258","22.233813","172.30.1.104","172.30.1.205","TCP","54","135 > 46880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46259","22.233818","172.30.1.205","172.30.1.104","TCP","54","46880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46260","22.233942","172.30.1.104","172.30.1.205","TCP","66","49671 > 39518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46261","22.233950","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46262","22.234294","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46263","22.234630","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46264","22.234639","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46265","22.236536","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46266","22.236934","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46267","22.236940","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46268","22.238291","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46269","22.241885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46270","22.241898","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46271","22.242918","172.30.1.205","172.30.1.104","TCP","74","46884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925469 TSecr=0 WS=128" +"46272","22.243244","172.30.1.104","172.30.1.205","TCP","66","135 > 46884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46273","22.243256","172.30.1.205","172.30.1.104","TCP","54","46884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46274","22.243617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46275","22.243915","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46276","22.243925","172.30.1.205","172.30.1.104","TCP","54","46884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46277","22.246159","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46278","22.246671","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46279","22.246678","172.30.1.205","172.30.1.104","TCP","54","46884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46280","22.248505","172.30.1.205","172.30.1.104","TCP","54","46884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46281","22.248628","172.30.1.205","172.30.1.104","TCP","74","39522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925475 TSecr=0 WS=128" +"46282","22.248785","172.30.1.104","172.30.1.205","TCP","54","135 > 46884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46283","22.248809","172.30.1.104","172.30.1.205","TCP","54","135 > 46884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46284","22.248815","172.30.1.205","172.30.1.104","TCP","54","46884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46285","22.248896","172.30.1.104","172.30.1.205","TCP","66","49671 > 39522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46286","22.248904","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46287","22.249257","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46288","22.249549","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46289","22.249558","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46290","22.251443","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46291","22.251820","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46292","22.251827","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46293","22.253215","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46294","22.256919","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46295","22.256929","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46296","22.257886","172.30.1.205","172.30.1.104","TCP","74","46888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925484 TSecr=0 WS=128" +"46297","22.258221","172.30.1.104","172.30.1.205","TCP","66","135 > 46888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46298","22.258233","172.30.1.205","172.30.1.104","TCP","54","46888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46299","22.258605","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46300","22.258927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46301","22.258936","172.30.1.205","172.30.1.104","TCP","54","46888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46302","22.261146","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46303","22.261570","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46304","22.261576","172.30.1.205","172.30.1.104","TCP","54","46888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46305","22.262429","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46306","22.262477","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46307","22.262515","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46308","22.262548","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46309","22.262577","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46310","22.262604","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46311","22.262632","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46312","22.262654","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46313","22.262679","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46314","22.262702","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46315","22.262730","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46316","22.262769","172.30.1.104","172.30.1.205","TCP","54","49671 > 39482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46317","22.262789","172.30.1.104","172.30.1.205","TCP","54","49671 > 39486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46318","22.262834","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46319","22.262881","172.30.1.104","172.30.1.205","TCP","54","49671 > 39490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46320","22.262898","172.30.1.104","172.30.1.205","TCP","54","49671 > 39494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46321","22.262919","172.30.1.104","172.30.1.205","TCP","54","49671 > 39498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46322","22.262938","172.30.1.104","172.30.1.205","TCP","54","49671 > 39502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46323","22.263141","172.30.1.104","172.30.1.205","TCP","54","49671 > 39506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46324","22.263156","172.30.1.104","172.30.1.205","TCP","54","49671 > 39482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46325","22.263162","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46326","22.263176","172.30.1.104","172.30.1.205","TCP","54","49671 > 39510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46327","22.263244","172.30.1.104","172.30.1.205","TCP","54","49671 > 39510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46328","22.263250","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46329","22.263253","172.30.1.104","172.30.1.205","TCP","54","49671 > 39506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46330","22.263255","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46331","22.263256","172.30.1.104","172.30.1.205","TCP","54","49671 > 39502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46332","22.263258","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46333","22.263263","172.30.1.104","172.30.1.205","TCP","54","49671 > 39498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46334","22.263265","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46335","22.263279","172.30.1.104","172.30.1.205","TCP","54","49671 > 39486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46336","22.263281","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46337","22.263308","172.30.1.104","172.30.1.205","TCP","54","49671 > 39494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46338","22.263311","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46339","22.263335","172.30.1.104","172.30.1.205","TCP","54","49671 > 39490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46340","22.263338","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46341","22.263361","172.30.1.104","172.30.1.205","TCP","54","49671 > 39514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46342","22.263383","172.30.1.104","172.30.1.205","TCP","54","49671 > 39518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46343","22.263403","172.30.1.104","172.30.1.205","TCP","54","49671 > 39522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46344","22.263424","172.30.1.104","172.30.1.205","TCP","54","49671 > 39478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46345","22.263622","172.30.1.104","172.30.1.205","TCP","54","49671 > 39522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46346","22.263628","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46347","22.263642","172.30.1.104","172.30.1.205","TCP","54","49671 > 39478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46348","22.263644","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46349","22.263665","172.30.1.104","172.30.1.205","TCP","54","49671 > 39514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46350","22.263668","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46351","22.263684","172.30.1.104","172.30.1.205","TCP","54","49671 > 39518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46352","22.263687","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46353","22.264358","172.30.1.205","172.30.1.104","TCP","54","46888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46354","22.264470","172.30.1.205","172.30.1.104","TCP","74","39526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925490 TSecr=0 WS=128" +"46355","22.264615","172.30.1.104","172.30.1.205","TCP","54","135 > 46888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46356","22.264628","172.30.1.104","172.30.1.205","TCP","54","135 > 46888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46357","22.264633","172.30.1.205","172.30.1.104","TCP","54","46888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46358","22.264748","172.30.1.104","172.30.1.205","TCP","66","49671 > 39526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46359","22.264756","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46360","22.265136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46361","22.265431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46362","22.265440","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46363","22.267343","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46364","22.267701","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46365","22.267708","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46366","22.269110","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46367","22.273114","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46368","22.273123","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46369","22.274096","172.30.1.205","172.30.1.104","TCP","74","46892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925500 TSecr=0 WS=128" +"46370","22.274382","172.30.1.104","172.30.1.205","TCP","66","135 > 46892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46371","22.274393","172.30.1.205","172.30.1.104","TCP","54","46892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46372","22.274748","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46373","22.275046","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46374","22.275055","172.30.1.205","172.30.1.104","TCP","54","46892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46375","22.277256","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46376","22.278149","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46377","22.278156","172.30.1.205","172.30.1.104","TCP","54","46892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46378","22.279967","172.30.1.205","172.30.1.104","TCP","54","46892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46379","22.280089","172.30.1.205","172.30.1.104","TCP","74","39530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925506 TSecr=0 WS=128" +"46380","22.280224","172.30.1.104","172.30.1.205","TCP","54","135 > 46892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46381","22.280238","172.30.1.104","172.30.1.205","TCP","54","135 > 46892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46382","22.280243","172.30.1.205","172.30.1.104","TCP","54","46892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46383","22.280377","172.30.1.104","172.30.1.205","TCP","66","49671 > 39530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46384","22.280385","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46385","22.280730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46386","22.281023","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46387","22.281033","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46388","22.282898","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46389","22.283307","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46390","22.283314","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46391","22.284680","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46392","22.288192","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46393","22.288201","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46394","22.289189","172.30.1.205","172.30.1.104","TCP","74","46896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925515 TSecr=0 WS=128" +"46395","22.289556","172.30.1.104","172.30.1.205","TCP","66","135 > 46896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46396","22.289568","172.30.1.205","172.30.1.104","TCP","54","46896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46397","22.289931","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46398","22.290238","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46399","22.290247","172.30.1.205","172.30.1.104","TCP","54","46896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46400","22.292453","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46401","22.292884","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46402","22.292891","172.30.1.205","172.30.1.104","TCP","54","46896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46403","22.294707","172.30.1.205","172.30.1.104","TCP","54","46896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46404","22.294821","172.30.1.205","172.30.1.104","TCP","74","39534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925521 TSecr=0 WS=128" +"46405","22.294994","172.30.1.104","172.30.1.205","TCP","54","135 > 46896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46406","22.295007","172.30.1.104","172.30.1.205","TCP","54","135 > 46896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46407","22.295013","172.30.1.205","172.30.1.104","TCP","54","46896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46408","22.295123","172.30.1.104","172.30.1.205","TCP","66","49671 > 39534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46409","22.295131","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46410","22.295477","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46411","22.295791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46412","22.295798","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46413","22.297701","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46414","22.298924","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46415","22.298930","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46416","22.300283","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46417","22.303907","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46418","22.303919","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46419","22.304901","172.30.1.205","172.30.1.104","TCP","74","46900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925531 TSecr=0 WS=128" +"46420","22.305299","172.30.1.104","172.30.1.205","TCP","66","135 > 46900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46421","22.305310","172.30.1.205","172.30.1.104","TCP","54","46900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46422","22.305669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46423","22.306002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46424","22.306011","172.30.1.205","172.30.1.104","TCP","54","46900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46425","22.308214","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46426","22.308630","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46427","22.308637","172.30.1.205","172.30.1.104","TCP","54","46900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46428","22.310487","172.30.1.205","172.30.1.104","TCP","54","46900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46429","22.310599","172.30.1.205","172.30.1.104","TCP","74","39538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925537 TSecr=0 WS=128" +"46430","22.310806","172.30.1.104","172.30.1.205","TCP","54","135 > 46900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46431","22.310833","172.30.1.104","172.30.1.205","TCP","54","135 > 46900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46432","22.310839","172.30.1.205","172.30.1.104","TCP","54","46900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46433","22.310941","172.30.1.104","172.30.1.205","TCP","66","49671 > 39538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46434","22.310949","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46435","22.311300","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46436","22.311636","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46437","22.311654","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46438","22.313578","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46439","22.313970","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46440","22.313976","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46441","22.315328","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46442","22.318907","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46443","22.318916","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46444","22.319873","172.30.1.205","172.30.1.104","TCP","74","46904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925546 TSecr=0 WS=128" +"46445","22.320198","172.30.1.104","172.30.1.205","TCP","66","135 > 46904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46446","22.320209","172.30.1.205","172.30.1.104","TCP","54","46904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46447","22.320557","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46448","22.320844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46449","22.320853","172.30.1.205","172.30.1.104","TCP","54","46904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46450","22.323055","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46451","22.323496","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46452","22.323503","172.30.1.205","172.30.1.104","TCP","54","46904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46453","22.325361","172.30.1.205","172.30.1.104","TCP","54","46904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46454","22.325486","172.30.1.205","172.30.1.104","TCP","74","39542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925551 TSecr=0 WS=128" +"46455","22.325618","172.30.1.104","172.30.1.205","TCP","54","135 > 46904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46456","22.325641","172.30.1.104","172.30.1.205","TCP","54","135 > 46904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46457","22.325647","172.30.1.205","172.30.1.104","TCP","54","46904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46458","22.325768","172.30.1.104","172.30.1.205","TCP","66","49671 > 39542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46459","22.325777","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46460","22.326123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46461","22.326436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46462","22.326445","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46463","22.328308","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46464","22.329533","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46465","22.329540","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46466","22.330916","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46467","22.334486","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46468","22.334496","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46469","22.335467","172.30.1.205","172.30.1.104","TCP","74","46908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925561 TSecr=0 WS=128" +"46470","22.335744","172.30.1.104","172.30.1.205","TCP","66","135 > 46908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46471","22.335754","172.30.1.205","172.30.1.104","TCP","54","46908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46472","22.336103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46473","22.336364","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46474","22.336373","172.30.1.205","172.30.1.104","TCP","54","46908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46475","22.338602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46476","22.338990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46477","22.338997","172.30.1.205","172.30.1.104","TCP","54","46908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46478","22.340842","172.30.1.205","172.30.1.104","TCP","54","46908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46479","22.340953","172.30.1.205","172.30.1.104","TCP","74","39546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925567 TSecr=0 WS=128" +"46480","22.341115","172.30.1.104","172.30.1.205","TCP","54","135 > 46908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46481","22.341124","172.30.1.104","172.30.1.205","TCP","54","135 > 46908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46482","22.341130","172.30.1.205","172.30.1.104","TCP","54","46908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46483","22.341238","172.30.1.104","172.30.1.205","TCP","66","49671 > 39546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46484","22.341249","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46485","22.341598","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46486","22.341891","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46487","22.341900","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46488","22.343834","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46489","22.344192","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46490","22.344198","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46491","22.345625","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46492","22.349189","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46493","22.349199","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46494","22.350163","172.30.1.205","172.30.1.104","TCP","74","46912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925576 TSecr=0 WS=128" +"46495","22.350465","172.30.1.104","172.30.1.205","TCP","66","135 > 46912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46496","22.350475","172.30.1.205","172.30.1.104","TCP","54","46912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46497","22.350826","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46498","22.351171","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46499","22.351180","172.30.1.205","172.30.1.104","TCP","54","46912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46500","22.353433","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46501","22.353830","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46502","22.353837","172.30.1.205","172.30.1.104","TCP","54","46912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46503","22.355670","172.30.1.205","172.30.1.104","TCP","54","46912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46504","22.355786","172.30.1.205","172.30.1.104","TCP","74","39550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925582 TSecr=0 WS=128" +"46505","22.355946","172.30.1.104","172.30.1.205","TCP","54","135 > 46912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46506","22.356011","172.30.1.104","172.30.1.205","TCP","54","135 > 46912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46507","22.356017","172.30.1.205","172.30.1.104","TCP","54","46912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46508","22.356106","172.30.1.104","172.30.1.205","TCP","66","49671 > 39550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46509","22.356115","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46510","22.356461","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46511","22.356752","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46512","22.356761","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46513","22.358666","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46514","22.359015","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46515","22.359021","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46516","22.360403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46517","22.363779","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46518","22.363790","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46519","22.364750","172.30.1.205","172.30.1.104","TCP","74","46916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925591 TSecr=0 WS=128" +"46520","22.365013","172.30.1.104","172.30.1.205","TCP","66","135 > 46916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46521","22.365024","172.30.1.205","172.30.1.104","TCP","54","46916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46522","22.365388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46523","22.365663","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46524","22.365673","172.30.1.205","172.30.1.104","TCP","54","46916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46525","22.367874","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46526","22.368510","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46527","22.368516","172.30.1.205","172.30.1.104","TCP","54","46916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46528","22.370387","172.30.1.205","172.30.1.104","TCP","54","46916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46529","22.370502","172.30.1.205","172.30.1.104","TCP","74","39554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925596 TSecr=0 WS=128" +"46530","22.370669","172.30.1.104","172.30.1.205","TCP","54","135 > 46916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46531","22.370678","172.30.1.104","172.30.1.205","TCP","54","135 > 46916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46532","22.370683","172.30.1.205","172.30.1.104","TCP","54","46916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46533","22.370778","172.30.1.104","172.30.1.205","TCP","66","49671 > 39554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46534","22.370787","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46535","22.371191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46536","22.371516","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46537","22.371524","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46538","22.373444","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46539","22.373789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46540","22.373796","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46541","22.375158","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46542","22.378675","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46543","22.378684","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46544","22.379626","172.30.1.205","172.30.1.104","TCP","74","46920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925606 TSecr=0 WS=128" +"46545","22.379912","172.30.1.104","172.30.1.205","TCP","66","135 > 46920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46546","22.379923","172.30.1.205","172.30.1.104","TCP","54","46920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46547","22.380272","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46548","22.380549","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46549","22.380558","172.30.1.205","172.30.1.104","TCP","54","46920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46550","22.382765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46551","22.383152","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46552","22.383158","172.30.1.205","172.30.1.104","TCP","54","46920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46553","22.385051","172.30.1.205","172.30.1.104","TCP","54","46920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46554","22.385162","172.30.1.205","172.30.1.104","TCP","74","39558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925611 TSecr=0 WS=128" +"46555","22.385320","172.30.1.104","172.30.1.205","TCP","54","135 > 46920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46556","22.385354","172.30.1.104","172.30.1.205","TCP","54","135 > 46920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46557","22.385360","172.30.1.205","172.30.1.104","TCP","54","46920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46558","22.385438","172.30.1.104","172.30.1.205","TCP","66","49671 > 39558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46559","22.385447","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46560","22.385809","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46561","22.386088","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46562","22.386097","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46563","22.387958","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46564","22.388574","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46565","22.388578","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46566","22.389956","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46567","22.394033","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46568","22.394044","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46569","22.394994","172.30.1.205","172.30.1.104","TCP","74","46924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925621 TSecr=0 WS=128" +"46570","22.395324","172.30.1.104","172.30.1.205","TCP","66","135 > 46924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46571","22.395337","172.30.1.205","172.30.1.104","TCP","54","46924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46572","22.395704","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46573","22.396018","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46574","22.396027","172.30.1.205","172.30.1.104","TCP","54","46924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46575","22.398319","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46576","22.398734","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46577","22.398740","172.30.1.205","172.30.1.104","TCP","54","46924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46578","22.400616","172.30.1.205","172.30.1.104","TCP","54","46924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46579","22.400749","172.30.1.205","172.30.1.104","TCP","74","39562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925627 TSecr=0 WS=128" +"46580","22.400882","172.30.1.104","172.30.1.205","TCP","54","135 > 46924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46581","22.400903","172.30.1.104","172.30.1.205","TCP","54","135 > 46924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46582","22.400908","172.30.1.205","172.30.1.104","TCP","54","46924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46583","22.401050","172.30.1.104","172.30.1.205","TCP","66","49671 > 39562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46584","22.401075","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46585","22.401451","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46586","22.401731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46587","22.401742","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46588","22.403703","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46589","22.404114","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46590","22.404121","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46591","22.405526","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46592","22.410356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46593","22.410367","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46594","22.411340","172.30.1.205","172.30.1.104","TCP","74","46928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925637 TSecr=0 WS=128" +"46595","22.411670","172.30.1.104","172.30.1.205","TCP","66","135 > 46928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46596","22.411683","172.30.1.205","172.30.1.104","TCP","54","46928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46597","22.412047","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46598","22.412321","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46599","22.412330","172.30.1.205","172.30.1.104","TCP","54","46928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46600","22.414561","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46601","22.415005","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46602","22.415012","172.30.1.205","172.30.1.104","TCP","54","46928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46603","22.416837","172.30.1.205","172.30.1.104","TCP","54","46928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46604","22.416950","172.30.1.205","172.30.1.104","TCP","74","39566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925643 TSecr=0 WS=128" +"46605","22.417113","172.30.1.104","172.30.1.205","TCP","54","135 > 46928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46606","22.417128","172.30.1.104","172.30.1.205","TCP","54","135 > 46928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46607","22.417134","172.30.1.205","172.30.1.104","TCP","54","46928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46608","22.417256","172.30.1.104","172.30.1.205","TCP","66","49671 > 39566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46609","22.417264","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46610","22.417614","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46611","22.417950","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46612","22.417957","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46613","22.419841","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46614","22.420257","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46615","22.420263","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46616","22.421648","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46617","22.425241","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46618","22.425251","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46619","22.426194","172.30.1.205","172.30.1.104","TCP","74","46932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925652 TSecr=0 WS=128" +"46620","22.426524","172.30.1.104","172.30.1.205","TCP","66","135 > 46932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46621","22.426536","172.30.1.205","172.30.1.104","TCP","54","46932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46622","22.426891","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46623","22.427170","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46624","22.427178","172.30.1.205","172.30.1.104","TCP","54","46932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46625","22.429410","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46626","22.429811","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46627","22.429818","172.30.1.205","172.30.1.104","TCP","54","46932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46628","22.431632","172.30.1.205","172.30.1.104","TCP","54","46932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46629","22.431748","172.30.1.205","172.30.1.104","TCP","74","39570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925658 TSecr=0 WS=128" +"46630","22.431921","172.30.1.104","172.30.1.205","TCP","54","135 > 46932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46631","22.431932","172.30.1.104","172.30.1.205","TCP","54","135 > 46932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46632","22.431938","172.30.1.205","172.30.1.104","TCP","54","46932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46633","22.432020","172.30.1.104","172.30.1.205","TCP","66","49671 > 39570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46634","22.432028","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46635","22.432375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46636","22.432656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46637","22.432665","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46638","22.434582","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46639","22.434948","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46640","22.434953","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46641","22.436306","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46642","22.439930","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46643","22.439940","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46644","22.440919","172.30.1.205","172.30.1.104","TCP","74","46936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925667 TSecr=0 WS=128" +"46645","22.441231","172.30.1.104","172.30.1.205","TCP","66","135 > 46936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46646","22.441242","172.30.1.205","172.30.1.104","TCP","54","46936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46647","22.441609","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46648","22.441897","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46649","22.441906","172.30.1.205","172.30.1.104","TCP","54","46936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46650","22.444102","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46651","22.444509","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46652","22.444515","172.30.1.205","172.30.1.104","TCP","54","46936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46653","22.445394","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46654","22.445450","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46655","22.445487","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46656","22.445521","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46657","22.445549","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46658","22.445581","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46659","22.445604","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46660","22.445631","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46661","22.445658","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46662","22.445666","172.30.1.104","172.30.1.205","TCP","54","49671 > 39530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46663","22.445710","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46664","22.445737","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46665","22.445805","172.30.1.104","172.30.1.205","TCP","54","49671 > 39534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46666","22.445823","172.30.1.104","172.30.1.205","TCP","54","49671 > 39530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46667","22.445830","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46668","22.445840","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46669","22.445844","172.30.1.104","172.30.1.205","TCP","54","49671 > 39534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46670","22.445848","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46671","22.445868","172.30.1.104","172.30.1.205","TCP","54","49671 > 39538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46672","22.445889","172.30.1.104","172.30.1.205","TCP","54","49671 > 39542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46673","22.445910","172.30.1.104","172.30.1.205","TCP","54","49671 > 39538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46674","22.445913","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46675","22.446046","172.30.1.104","172.30.1.205","TCP","54","49671 > 39546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46676","22.446063","172.30.1.104","172.30.1.205","TCP","54","49671 > 39550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46677","22.446093","172.30.1.104","172.30.1.205","TCP","54","49671 > 39550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46678","22.446097","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46679","22.446116","172.30.1.104","172.30.1.205","TCP","54","49671 > 39542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46680","22.446119","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46681","22.446137","172.30.1.104","172.30.1.205","TCP","54","49671 > 39546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46682","22.446141","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46683","22.446158","172.30.1.104","172.30.1.205","TCP","54","49671 > 39558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46684","22.446178","172.30.1.104","172.30.1.205","TCP","54","49671 > 39562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46685","22.446196","172.30.1.104","172.30.1.205","TCP","54","49671 > 39558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46686","22.446200","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46687","22.446214","172.30.1.104","172.30.1.205","TCP","54","49671 > 39554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46688","22.446233","172.30.1.104","172.30.1.205","TCP","54","49671 > 39566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46689","22.446335","172.30.1.104","172.30.1.205","TCP","54","49671 > 39570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46690","22.446355","172.30.1.104","172.30.1.205","TCP","54","49671 > 39570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46691","22.446360","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46692","22.446374","172.30.1.104","172.30.1.205","TCP","54","49671 > 39566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46693","22.446377","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46694","22.446396","172.30.1.104","172.30.1.205","TCP","54","49671 > 39562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46695","22.446399","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46696","22.446414","172.30.1.104","172.30.1.205","TCP","54","49671 > 39554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46697","22.446417","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46698","22.446433","172.30.1.104","172.30.1.205","TCP","54","49671 > 39526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46699","22.446565","172.30.1.104","172.30.1.205","TCP","54","49671 > 39526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"46700","22.446569","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"46701","22.447403","172.30.1.205","172.30.1.104","TCP","54","46936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46702","22.447517","172.30.1.205","172.30.1.104","TCP","74","39574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925673 TSecr=0 WS=128" +"46703","22.448145","172.30.1.104","172.30.1.205","TCP","66","49671 > 39574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46704","22.448154","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46705","22.448178","172.30.1.104","172.30.1.205","TCP","54","135 > 46936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46706","22.448231","172.30.1.104","172.30.1.205","TCP","54","135 > 46936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46707","22.448237","172.30.1.205","172.30.1.104","TCP","54","46936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46708","22.448547","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46709","22.448842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46710","22.448852","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46711","22.450740","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46712","22.451116","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46713","22.451122","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46714","22.452482","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46715","22.456019","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46716","22.456030","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46717","22.457024","172.30.1.205","172.30.1.104","TCP","74","46940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925683 TSecr=0 WS=128" +"46718","22.457342","172.30.1.104","172.30.1.205","TCP","66","135 > 46940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46719","22.457353","172.30.1.205","172.30.1.104","TCP","54","46940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46720","22.457708","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46721","22.458598","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46722","22.458608","172.30.1.205","172.30.1.104","TCP","54","46940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46723","22.460799","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46724","22.461192","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46725","22.461198","172.30.1.205","172.30.1.104","TCP","54","46940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46726","22.463034","172.30.1.205","172.30.1.104","TCP","54","46940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46727","22.463147","172.30.1.205","172.30.1.104","TCP","74","39578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925689 TSecr=0 WS=128" +"46728","22.463306","172.30.1.104","172.30.1.205","TCP","54","135 > 46940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46729","22.463317","172.30.1.104","172.30.1.205","TCP","54","135 > 46940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46730","22.463322","172.30.1.205","172.30.1.104","TCP","54","46940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46731","22.463421","172.30.1.104","172.30.1.205","TCP","66","49671 > 39578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46732","22.463429","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46733","22.463780","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46734","22.464055","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46735","22.464063","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46736","22.465961","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46737","22.466339","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46738","22.466346","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46739","22.467715","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46740","22.471255","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46741","22.471265","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46742","22.472203","172.30.1.205","172.30.1.104","TCP","74","46944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925698 TSecr=0 WS=128" +"46743","22.472546","172.30.1.104","172.30.1.205","TCP","66","135 > 46944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46744","22.472559","172.30.1.205","172.30.1.104","TCP","54","46944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46745","22.472953","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46746","22.473299","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46747","22.473308","172.30.1.205","172.30.1.104","TCP","54","46944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46748","22.475505","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46749","22.475932","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46750","22.475939","172.30.1.205","172.30.1.104","TCP","54","46944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46751","22.477778","172.30.1.205","172.30.1.104","TCP","54","46944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46752","22.477902","172.30.1.205","172.30.1.104","TCP","74","39582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925704 TSecr=0 WS=128" +"46753","22.478042","172.30.1.104","172.30.1.205","TCP","54","135 > 46944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46754","22.478089","172.30.1.104","172.30.1.205","TCP","54","135 > 46944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46755","22.478094","172.30.1.205","172.30.1.104","TCP","54","46944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46756","22.478171","172.30.1.104","172.30.1.205","TCP","66","49671 > 39582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46757","22.478179","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46758","22.478530","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46759","22.479529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46760","22.479538","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46761","22.481450","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46762","22.481850","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46763","22.481857","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46764","22.483214","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46765","22.486650","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46766","22.486659","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46767","22.487618","172.30.1.205","172.30.1.104","TCP","74","46948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925714 TSecr=0 WS=128" +"46768","22.487935","172.30.1.104","172.30.1.205","TCP","66","135 > 46948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46769","22.487945","172.30.1.205","172.30.1.104","TCP","54","46948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46770","22.488307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46771","22.488592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46772","22.488603","172.30.1.205","172.30.1.104","TCP","54","46948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46773","22.490848","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46774","22.491252","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46775","22.491258","172.30.1.205","172.30.1.104","TCP","54","46948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46776","22.493112","172.30.1.205","172.30.1.104","TCP","54","46948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46777","22.493223","172.30.1.205","172.30.1.104","TCP","74","39586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925719 TSecr=0 WS=128" +"46778","22.493368","172.30.1.104","172.30.1.205","TCP","54","135 > 46948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46779","22.493423","172.30.1.104","172.30.1.205","TCP","54","135 > 46948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46780","22.493428","172.30.1.205","172.30.1.104","TCP","54","46948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46781","22.493508","172.30.1.104","172.30.1.205","TCP","66","49671 > 39586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46782","22.493516","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46783","22.493862","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46784","22.494155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46785","22.494167","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46786","22.496159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46787","22.496653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46788","22.496660","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46789","22.498050","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46790","22.501503","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46791","22.501513","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46792","22.502459","172.30.1.205","172.30.1.104","TCP","74","46952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925728 TSecr=0 WS=128" +"46793","22.502757","172.30.1.104","172.30.1.205","TCP","66","135 > 46952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46794","22.502768","172.30.1.205","172.30.1.104","TCP","54","46952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46795","22.503116","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46796","22.503374","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46797","22.503383","172.30.1.205","172.30.1.104","TCP","54","46952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46798","22.505620","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46799","22.506002","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46800","22.506009","172.30.1.205","172.30.1.104","TCP","54","46952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46801","22.507832","172.30.1.205","172.30.1.104","TCP","54","46952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46802","22.507943","172.30.1.205","172.30.1.104","TCP","74","39590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925734 TSecr=0 WS=128" +"46803","22.508082","172.30.1.104","172.30.1.205","TCP","54","135 > 46952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46804","22.508093","172.30.1.104","172.30.1.205","TCP","54","135 > 46952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46805","22.508099","172.30.1.205","172.30.1.104","TCP","54","46952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46806","22.508222","172.30.1.104","172.30.1.205","TCP","66","49671 > 39590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46807","22.508231","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46808","22.508599","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46809","22.508865","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46810","22.508874","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46811","22.510763","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46812","22.511133","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46813","22.511142","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46814","22.512509","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46815","22.516056","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46816","22.516068","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46817","22.517093","172.30.1.205","172.30.1.104","TCP","74","46956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925743 TSecr=0 WS=128" +"46818","22.517388","172.30.1.104","172.30.1.205","TCP","66","135 > 46956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46819","22.517400","172.30.1.205","172.30.1.104","TCP","54","46956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46820","22.517767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46821","22.518151","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46822","22.518160","172.30.1.205","172.30.1.104","TCP","54","46956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46823","22.520381","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46824","22.520843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46825","22.520850","172.30.1.205","172.30.1.104","TCP","54","46956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46826","22.522694","172.30.1.205","172.30.1.104","TCP","54","46956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46827","22.522806","172.30.1.205","172.30.1.104","TCP","74","39594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925749 TSecr=0 WS=128" +"46828","22.522945","172.30.1.104","172.30.1.205","TCP","54","135 > 46956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46829","22.523018","172.30.1.104","172.30.1.205","TCP","54","135 > 46956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46830","22.523024","172.30.1.205","172.30.1.104","TCP","54","46956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46831","22.523116","172.30.1.104","172.30.1.205","TCP","66","49671 > 39594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46832","22.523125","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46833","22.523471","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46834","22.523759","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46835","22.523768","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46836","22.525689","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46837","22.526050","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46838","22.526057","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46839","22.527421","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46840","22.531015","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46841","22.531024","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46842","22.531978","172.30.1.205","172.30.1.104","TCP","74","46960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925758 TSecr=0 WS=128" +"46843","22.532279","172.30.1.104","172.30.1.205","TCP","66","135 > 46960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46844","22.532290","172.30.1.205","172.30.1.104","TCP","54","46960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46845","22.532646","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46846","22.532909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46847","22.532918","172.30.1.205","172.30.1.104","TCP","54","46960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46848","22.535125","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46849","22.535506","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46850","22.535516","172.30.1.205","172.30.1.104","TCP","54","46960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46851","22.537438","172.30.1.205","172.30.1.104","TCP","54","46960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46852","22.537565","172.30.1.205","172.30.1.104","TCP","74","39598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925763 TSecr=0 WS=128" +"46853","22.537685","172.30.1.104","172.30.1.205","TCP","54","135 > 46960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46854","22.537698","172.30.1.104","172.30.1.205","TCP","54","135 > 46960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46855","22.537703","172.30.1.205","172.30.1.104","TCP","54","46960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46856","22.537871","172.30.1.104","172.30.1.205","TCP","66","49671 > 39598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46857","22.537880","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46858","22.538225","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46859","22.538503","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46860","22.538510","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46861","22.540389","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46862","22.540771","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46863","22.540787","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46864","22.542158","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46865","22.545876","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46866","22.545893","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46867","22.546923","172.30.1.205","172.30.1.104","TCP","74","46964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925773 TSecr=0 WS=128" +"46868","22.547264","172.30.1.104","172.30.1.205","TCP","66","135 > 46964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46869","22.547276","172.30.1.205","172.30.1.104","TCP","54","46964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46870","22.547632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46871","22.547938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46872","22.547947","172.30.1.205","172.30.1.104","TCP","54","46964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46873","22.550168","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46874","22.550676","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46875","22.550685","172.30.1.205","172.30.1.104","TCP","54","46964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46876","22.552571","172.30.1.205","172.30.1.104","TCP","54","46964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46877","22.552691","172.30.1.205","172.30.1.104","TCP","74","39602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925779 TSecr=0 WS=128" +"46878","22.552828","172.30.1.104","172.30.1.205","TCP","54","135 > 46964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46879","22.552867","172.30.1.104","172.30.1.205","TCP","54","135 > 46964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46880","22.552874","172.30.1.205","172.30.1.104","TCP","54","46964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46881","22.552976","172.30.1.104","172.30.1.205","TCP","66","49671 > 39602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46882","22.552985","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46883","22.553343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46884","22.553666","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46885","22.553675","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46886","22.555565","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46887","22.555959","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46888","22.555965","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46889","22.557375","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46890","22.561169","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46891","22.561179","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46892","22.562136","172.30.1.205","172.30.1.104","TCP","74","46968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925788 TSecr=0 WS=128" +"46893","22.562448","172.30.1.104","172.30.1.205","TCP","66","135 > 46968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46894","22.562459","172.30.1.205","172.30.1.104","TCP","54","46968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46895","22.562811","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46896","22.563136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46897","22.563145","172.30.1.205","172.30.1.104","TCP","54","46968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46898","22.565350","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46899","22.565796","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46900","22.565802","172.30.1.205","172.30.1.104","TCP","54","46968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46901","22.567607","172.30.1.205","172.30.1.104","TCP","54","46968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46902","22.567723","172.30.1.205","172.30.1.104","TCP","74","39606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925794 TSecr=0 WS=128" +"46903","22.567887","172.30.1.104","172.30.1.205","TCP","54","135 > 46968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46904","22.567950","172.30.1.104","172.30.1.205","TCP","54","135 > 46968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46905","22.567961","172.30.1.205","172.30.1.104","TCP","54","46968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46906","22.568034","172.30.1.104","172.30.1.205","TCP","66","49671 > 39606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46907","22.568042","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46908","22.568388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46909","22.568690","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46910","22.568699","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46911","22.570592","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46912","22.571026","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46913","22.571032","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46914","22.572375","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46915","22.576024","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46916","22.576034","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46917","22.577001","172.30.1.205","172.30.1.104","TCP","74","46972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925803 TSecr=0 WS=128" +"46918","22.577365","172.30.1.104","172.30.1.205","TCP","66","135 > 46972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46919","22.577387","172.30.1.205","172.30.1.104","TCP","54","46972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46920","22.577967","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46921","22.578321","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46922","22.578330","172.30.1.205","172.30.1.104","TCP","54","46972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46923","22.580510","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46924","22.580996","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46925","22.581003","172.30.1.205","172.30.1.104","TCP","54","46972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46926","22.582811","172.30.1.205","172.30.1.104","TCP","54","46972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46927","22.582922","172.30.1.205","172.30.1.104","TCP","74","39610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925809 TSecr=0 WS=128" +"46928","22.583130","172.30.1.104","172.30.1.205","TCP","54","135 > 46972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46929","22.583239","172.30.1.104","172.30.1.205","TCP","66","49671 > 39610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46930","22.583248","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46931","22.583254","172.30.1.104","172.30.1.205","TCP","54","135 > 46972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46932","22.583257","172.30.1.205","172.30.1.104","TCP","54","46972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46933","22.583604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46934","22.583907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46935","22.583916","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46936","22.585828","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46937","22.586240","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46938","22.586246","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46939","22.587589","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46940","22.591373","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46941","22.591384","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46942","22.592355","172.30.1.205","172.30.1.104","TCP","74","46976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925818 TSecr=0 WS=128" +"46943","22.592673","172.30.1.104","172.30.1.205","TCP","66","135 > 46976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46944","22.592684","172.30.1.205","172.30.1.104","TCP","54","46976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46945","22.593083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46946","22.593421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46947","22.593430","172.30.1.205","172.30.1.104","TCP","54","46976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46948","22.595704","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46949","22.596156","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46950","22.596162","172.30.1.205","172.30.1.104","TCP","54","46976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46951","22.598005","172.30.1.205","172.30.1.104","TCP","54","46976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46952","22.598129","172.30.1.205","172.30.1.104","TCP","74","39614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925824 TSecr=0 WS=128" +"46953","22.598287","172.30.1.104","172.30.1.205","TCP","54","135 > 46976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46954","22.598334","172.30.1.104","172.30.1.205","TCP","54","135 > 46976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46955","22.598339","172.30.1.205","172.30.1.104","TCP","54","46976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46956","22.598414","172.30.1.104","172.30.1.205","TCP","66","49671 > 39614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46957","22.598423","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46958","22.598769","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46959","22.599058","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46960","22.599066","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46961","22.601016","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46962","22.601429","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46963","22.601435","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46964","22.602800","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46965","22.606514","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46966","22.606524","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46967","22.607456","172.30.1.205","172.30.1.104","TCP","74","46980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925833 TSecr=0 WS=128" +"46968","22.607835","172.30.1.104","172.30.1.205","TCP","66","135 > 46980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46969","22.607846","172.30.1.205","172.30.1.104","TCP","54","46980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46970","22.608201","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46971","22.608497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46972","22.608506","172.30.1.205","172.30.1.104","TCP","54","46980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46973","22.610717","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46974","22.611162","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"46975","22.611175","172.30.1.205","172.30.1.104","TCP","54","46980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46976","22.613141","172.30.1.205","172.30.1.104","TCP","54","46980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"46977","22.613250","172.30.1.205","172.30.1.104","TCP","74","39618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925839 TSecr=0 WS=128" +"46978","22.613397","172.30.1.104","172.30.1.205","TCP","54","135 > 46980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46979","22.613425","172.30.1.104","172.30.1.205","TCP","54","135 > 46980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"46980","22.613430","172.30.1.205","172.30.1.104","TCP","54","46980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"46981","22.613523","172.30.1.104","172.30.1.205","TCP","66","49671 > 39618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46982","22.613531","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46983","22.613877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"46984","22.614142","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46985","22.614151","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46986","22.616027","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"46987","22.616419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"46988","22.616431","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"46989","22.618034","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"46990","22.623922","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"46991","22.623933","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"46992","22.624892","172.30.1.205","172.30.1.104","TCP","74","46984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925851 TSecr=0 WS=128" +"46993","22.625280","172.30.1.104","172.30.1.205","TCP","66","135 > 46984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"46994","22.625290","172.30.1.205","172.30.1.104","TCP","54","46984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"46995","22.625686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"46996","22.625963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"46997","22.625972","172.30.1.205","172.30.1.104","TCP","54","46984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"46998","22.628213","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"46999","22.628607","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47000","22.628614","172.30.1.205","172.30.1.104","TCP","54","46984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47001","22.629514","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47002","22.629564","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47003","22.629595","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47004","22.629619","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47005","22.629647","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47006","22.629671","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47007","22.629742","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47008","22.629783","172.30.1.104","172.30.1.205","TCP","54","49671 > 39578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47009","22.629799","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47010","22.629836","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47011","22.629868","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47012","22.629893","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47013","22.629916","172.30.1.104","172.30.1.205","TCP","54","49671 > 39582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47014","22.629935","172.30.1.104","172.30.1.205","TCP","54","49671 > 39578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47015","22.629941","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47016","22.629956","172.30.1.104","172.30.1.205","TCP","54","49671 > 39582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47017","22.629959","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47018","22.630018","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47019","22.630238","172.30.1.104","172.30.1.205","TCP","54","49671 > 39586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47020","22.630255","172.30.1.104","172.30.1.205","TCP","54","49671 > 39590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47021","22.630282","172.30.1.104","172.30.1.205","TCP","54","49671 > 39594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47022","22.630309","172.30.1.104","172.30.1.205","TCP","54","49671 > 39598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47023","22.630329","172.30.1.104","172.30.1.205","TCP","54","49671 > 39602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47024","22.630349","172.30.1.104","172.30.1.205","TCP","54","49671 > 39606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47025","22.630383","172.30.1.104","172.30.1.205","TCP","54","49671 > 39610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47026","22.630405","172.30.1.104","172.30.1.205","TCP","54","49671 > 39610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47027","22.630411","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47028","22.630425","172.30.1.104","172.30.1.205","TCP","54","49671 > 39606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47029","22.630427","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47030","22.630454","172.30.1.104","172.30.1.205","TCP","54","49671 > 39602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47031","22.630458","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47032","22.630469","172.30.1.104","172.30.1.205","TCP","54","49671 > 39598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47033","22.630472","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47034","22.630489","172.30.1.104","172.30.1.205","TCP","54","49671 > 39586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47035","22.630492","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47036","22.630509","172.30.1.104","172.30.1.205","TCP","54","49671 > 39590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47037","22.630512","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47038","22.630528","172.30.1.104","172.30.1.205","TCP","54","49671 > 39594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47039","22.630531","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47040","22.630570","172.30.1.104","172.30.1.205","TCP","54","49671 > 39614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47041","22.630744","172.30.1.104","172.30.1.205","TCP","54","49671 > 39618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47042","22.630765","172.30.1.104","172.30.1.205","TCP","54","49671 > 39574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47043","22.630786","172.30.1.104","172.30.1.205","TCP","54","49671 > 39614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47044","22.630791","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47045","22.631008","172.30.1.104","172.30.1.205","TCP","54","49671 > 39618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47046","22.631012","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47047","22.631018","172.30.1.104","172.30.1.205","TCP","54","49671 > 39574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47048","22.631020","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47049","22.631575","172.30.1.205","172.30.1.104","TCP","54","46984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47050","22.631694","172.30.1.205","172.30.1.104","TCP","74","39622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925858 TSecr=0 WS=128" +"47051","22.631854","172.30.1.104","172.30.1.205","TCP","54","135 > 46984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47052","22.631886","172.30.1.104","172.30.1.205","TCP","54","135 > 46984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47053","22.631891","172.30.1.205","172.30.1.104","TCP","54","46984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47054","22.631963","172.30.1.104","172.30.1.205","TCP","66","49671 > 39622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47055","22.631972","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47056","22.632324","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47057","22.632615","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47058","22.632623","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47059","22.634545","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47060","22.634955","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47061","22.634961","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47062","22.636316","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47063","22.640063","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47064","22.640072","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47065","22.641048","172.30.1.205","172.30.1.104","TCP","74","46988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925867 TSecr=0 WS=128" +"47066","22.641376","172.30.1.104","172.30.1.205","TCP","66","135 > 46988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47067","22.641387","172.30.1.205","172.30.1.104","TCP","54","46988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47068","22.641740","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47069","22.642109","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47070","22.642118","172.30.1.205","172.30.1.104","TCP","54","46988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47071","22.644298","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47072","22.644709","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47073","22.644715","172.30.1.205","172.30.1.104","TCP","54","46988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47074","22.646517","172.30.1.205","172.30.1.104","TCP","54","46988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47075","22.646627","172.30.1.205","172.30.1.104","TCP","74","39626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925873 TSecr=0 WS=128" +"47076","22.646775","172.30.1.104","172.30.1.205","TCP","54","135 > 46988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47077","22.646820","172.30.1.104","172.30.1.205","TCP","54","135 > 46988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47078","22.646826","172.30.1.205","172.30.1.104","TCP","54","46988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47079","22.646905","172.30.1.104","172.30.1.205","TCP","66","49671 > 39626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47080","22.646913","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47081","22.647255","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47082","22.647555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47083","22.647563","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47084","22.649477","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47085","22.649817","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47086","22.649823","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47087","22.651168","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47088","22.654807","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47089","22.654831","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47090","22.655953","172.30.1.205","172.30.1.104","TCP","74","46992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925882 TSecr=0 WS=128" +"47091","22.656294","172.30.1.104","172.30.1.205","TCP","66","135 > 46992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47092","22.656307","172.30.1.205","172.30.1.104","TCP","54","46992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47093","22.656672","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47094","22.657001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47095","22.657013","172.30.1.205","172.30.1.104","TCP","54","46992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47096","22.659287","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47097","22.659728","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47098","22.659735","172.30.1.205","172.30.1.104","TCP","54","46992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47099","22.661568","172.30.1.205","172.30.1.104","TCP","54","46992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47100","22.661686","172.30.1.205","172.30.1.104","TCP","74","39630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925888 TSecr=0 WS=128" +"47101","22.661823","172.30.1.104","172.30.1.205","TCP","54","135 > 46992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47102","22.661865","172.30.1.104","172.30.1.205","TCP","54","135 > 46992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47103","22.661871","172.30.1.205","172.30.1.104","TCP","54","46992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47104","22.661958","172.30.1.104","172.30.1.205","TCP","66","49671 > 39630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47105","22.661967","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47106","22.662317","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47107","22.663623","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47108","22.663632","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47109","22.665571","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47110","22.666027","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47111","22.666035","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47112","22.667403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47113","22.671155","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47114","22.671165","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47115","22.672148","172.30.1.205","172.30.1.104","TCP","74","46996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925898 TSecr=0 WS=128" +"47116","22.672494","172.30.1.104","172.30.1.205","TCP","66","135 > 46996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47117","22.672504","172.30.1.205","172.30.1.104","TCP","54","46996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47118","22.672903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47119","22.673199","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47120","22.673208","172.30.1.205","172.30.1.104","TCP","54","46996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47121","22.675425","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47122","22.675854","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47123","22.675860","172.30.1.205","172.30.1.104","TCP","54","46996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47124","22.677711","172.30.1.205","172.30.1.104","TCP","54","46996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47125","22.677825","172.30.1.205","172.30.1.104","TCP","74","39634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925904 TSecr=0 WS=128" +"47126","22.677986","172.30.1.104","172.30.1.205","TCP","54","135 > 46996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47127","22.678037","172.30.1.104","172.30.1.205","TCP","54","135 > 46996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47128","22.678043","172.30.1.205","172.30.1.104","TCP","54","46996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47129","22.678143","172.30.1.104","172.30.1.205","TCP","66","49671 > 39634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47130","22.678153","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47131","22.678517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47132","22.678821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47133","22.678830","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47134","22.680724","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47135","22.681094","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47136","22.681101","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47137","22.682467","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47138","22.686191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47139","22.686201","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47140","22.687152","172.30.1.205","172.30.1.104","TCP","74","47000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925913 TSecr=0 WS=128" +"47141","22.687475","172.30.1.104","172.30.1.205","TCP","66","135 > 47000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47142","22.687486","172.30.1.205","172.30.1.104","TCP","54","47000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47143","22.687838","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47144","22.688167","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47145","22.688176","172.30.1.205","172.30.1.104","TCP","54","47000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47146","22.690388","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47147","22.690866","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47148","22.690873","172.30.1.205","172.30.1.104","TCP","54","47000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47149","22.692687","172.30.1.205","172.30.1.104","TCP","54","47000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47150","22.692821","172.30.1.205","172.30.1.104","TCP","74","39638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925919 TSecr=0 WS=128" +"47151","22.692999","172.30.1.104","172.30.1.205","TCP","54","135 > 47000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47152","22.693010","172.30.1.104","172.30.1.205","TCP","54","135 > 47000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47153","22.693016","172.30.1.205","172.30.1.104","TCP","54","47000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47154","22.693105","172.30.1.104","172.30.1.205","TCP","66","49671 > 39638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47155","22.693114","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47156","22.693463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47157","22.693739","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47158","22.693748","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47159","22.695613","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47160","22.695991","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47161","22.696016","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47162","22.697402","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47163","22.701163","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47164","22.701173","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47165","22.702146","172.30.1.205","172.30.1.104","TCP","74","47004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925928 TSecr=0 WS=128" +"47166","22.702491","172.30.1.104","172.30.1.205","TCP","66","135 > 47004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47167","22.702502","172.30.1.205","172.30.1.104","TCP","54","47004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47168","22.702855","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47169","22.703150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47170","22.703160","172.30.1.205","172.30.1.104","TCP","54","47004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47171","22.705417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47172","22.705874","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47173","22.705881","172.30.1.205","172.30.1.104","TCP","54","47004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47174","22.707753","172.30.1.205","172.30.1.104","TCP","54","47004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47175","22.707862","172.30.1.205","172.30.1.104","TCP","74","39642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925934 TSecr=0 WS=128" +"47176","22.708215","172.30.1.104","172.30.1.205","TCP","66","49671 > 39642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47177","22.708226","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47178","22.708251","172.30.1.104","172.30.1.205","TCP","54","135 > 47004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47179","22.708262","172.30.1.104","172.30.1.205","TCP","54","135 > 47004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47180","22.708266","172.30.1.205","172.30.1.104","TCP","54","47004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47181","22.708608","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47182","22.708903","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47183","22.708913","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47184","22.710881","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47185","22.711251","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47186","22.711257","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47187","22.712714","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47188","22.716456","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47189","22.716466","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47190","22.717435","172.30.1.205","172.30.1.104","TCP","74","47008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925943 TSecr=0 WS=128" +"47191","22.717790","172.30.1.104","172.30.1.205","TCP","66","135 > 47008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47192","22.717802","172.30.1.205","172.30.1.104","TCP","54","47008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47193","22.718179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47194","22.718534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47195","22.718543","172.30.1.205","172.30.1.104","TCP","54","47008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47196","22.720739","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47197","22.721164","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47198","22.721170","172.30.1.205","172.30.1.104","TCP","54","47008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47199","22.722982","172.30.1.205","172.30.1.104","TCP","54","47008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47200","22.723094","172.30.1.205","172.30.1.104","TCP","74","39646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925949 TSecr=0 WS=128" +"47201","22.723245","172.30.1.104","172.30.1.205","TCP","54","135 > 47008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47202","22.723255","172.30.1.104","172.30.1.205","TCP","54","135 > 47008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47203","22.723261","172.30.1.205","172.30.1.104","TCP","54","47008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47204","22.723359","172.30.1.104","172.30.1.205","TCP","66","49671 > 39646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47205","22.723367","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47206","22.723737","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47207","22.724041","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47208","22.724057","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47209","22.726212","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47210","22.727684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47211","22.727691","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47212","22.729104","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47213","22.732821","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47214","22.732830","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47215","22.733798","172.30.1.205","172.30.1.104","TCP","74","47012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925960 TSecr=0 WS=128" +"47216","22.734149","172.30.1.104","172.30.1.205","TCP","66","135 > 47012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47217","22.734161","172.30.1.205","172.30.1.104","TCP","54","47012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47218","22.734521","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47219","22.734812","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47220","22.734821","172.30.1.205","172.30.1.104","TCP","54","47012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47221","22.737036","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47222","22.737430","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47223","22.737438","172.30.1.205","172.30.1.104","TCP","54","47012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47224","22.739276","172.30.1.205","172.30.1.104","TCP","54","47012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47225","22.739389","172.30.1.205","172.30.1.104","TCP","74","39650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925965 TSecr=0 WS=128" +"47226","22.739544","172.30.1.104","172.30.1.205","TCP","54","135 > 47012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47227","22.739574","172.30.1.104","172.30.1.205","TCP","54","135 > 47012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47228","22.739580","172.30.1.205","172.30.1.104","TCP","54","47012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47229","22.739681","172.30.1.104","172.30.1.205","TCP","66","49671 > 39650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47230","22.739689","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47231","22.740034","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47232","22.740327","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47233","22.740336","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47234","22.742277","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47235","22.742633","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47236","22.742640","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47237","22.743997","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47238","22.748162","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47239","22.748172","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47240","22.749158","172.30.1.205","172.30.1.104","TCP","74","47016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925975 TSecr=0 WS=128" +"47241","22.749441","172.30.1.104","172.30.1.205","TCP","66","135 > 47016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47242","22.749452","172.30.1.205","172.30.1.104","TCP","54","47016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47243","22.749807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47244","22.750087","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47245","22.750096","172.30.1.205","172.30.1.104","TCP","54","47016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47246","22.752289","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47247","22.752684","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47248","22.752690","172.30.1.205","172.30.1.104","TCP","54","47016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47249","22.754537","172.30.1.205","172.30.1.104","TCP","54","47016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47250","22.754649","172.30.1.205","172.30.1.104","TCP","74","39654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925981 TSecr=0 WS=128" +"47251","22.754794","172.30.1.104","172.30.1.205","TCP","54","135 > 47016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47252","22.754805","172.30.1.104","172.30.1.205","TCP","54","135 > 47016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47253","22.754810","172.30.1.205","172.30.1.104","TCP","54","47016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47254","22.754974","172.30.1.104","172.30.1.205","TCP","66","49671 > 39654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47255","22.754982","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47256","22.755344","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47257","22.755624","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47258","22.755633","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47259","22.757569","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47260","22.758308","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47261","22.758316","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47262","22.759688","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47263","22.763454","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47264","22.763465","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47265","22.764425","172.30.1.205","172.30.1.104","TCP","74","47020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925990 TSecr=0 WS=128" +"47266","22.764769","172.30.1.104","172.30.1.205","TCP","66","135 > 47020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47267","22.764789","172.30.1.205","172.30.1.104","TCP","54","47020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47268","22.765155","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47269","22.765445","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47270","22.765454","172.30.1.205","172.30.1.104","TCP","54","47020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47271","22.767662","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47272","22.768118","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47273","22.768124","172.30.1.205","172.30.1.104","TCP","54","47020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47274","22.769977","172.30.1.205","172.30.1.104","TCP","54","47020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47275","22.770110","172.30.1.205","172.30.1.104","TCP","74","39658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925996 TSecr=0 WS=128" +"47276","22.770252","172.30.1.104","172.30.1.205","TCP","54","135 > 47020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47277","22.770262","172.30.1.104","172.30.1.205","TCP","54","135 > 47020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47278","22.770268","172.30.1.205","172.30.1.104","TCP","54","47020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47279","22.770411","172.30.1.104","172.30.1.205","TCP","66","49671 > 39658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47280","22.770419","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47281","22.770766","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47282","22.771035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47283","22.771044","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47284","22.772945","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47285","22.774006","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47286","22.774013","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47287","22.775374","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47288","22.779440","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47289","22.779450","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47290","22.780433","172.30.1.205","172.30.1.104","TCP","74","47024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926006 TSecr=0 WS=128" +"47291","22.780792","172.30.1.104","172.30.1.205","TCP","66","135 > 47024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47292","22.780804","172.30.1.205","172.30.1.104","TCP","54","47024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47293","22.781175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47294","22.781456","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47295","22.781465","172.30.1.205","172.30.1.104","TCP","54","47024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47296","22.783692","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47297","22.784145","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47298","22.784152","172.30.1.205","172.30.1.104","TCP","54","47024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47299","22.785996","172.30.1.205","172.30.1.104","TCP","54","47024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47300","22.786112","172.30.1.205","172.30.1.104","TCP","74","39662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926012 TSecr=0 WS=128" +"47301","22.786265","172.30.1.104","172.30.1.205","TCP","54","135 > 47024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47302","22.786277","172.30.1.104","172.30.1.205","TCP","54","135 > 47024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47303","22.786284","172.30.1.205","172.30.1.104","TCP","54","47024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47304","22.786414","172.30.1.104","172.30.1.205","TCP","66","49671 > 39662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47305","22.786422","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47306","22.786773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47307","22.787100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47308","22.787109","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47309","22.789020","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47310","22.789382","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47311","22.789389","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47312","22.790744","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47313","22.794490","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47314","22.794502","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47315","22.795493","172.30.1.205","172.30.1.104","TCP","74","47028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926021 TSecr=0 WS=128" +"47316","22.795860","172.30.1.104","172.30.1.205","TCP","66","135 > 47028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47317","22.795873","172.30.1.205","172.30.1.104","TCP","54","47028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47318","22.796231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47319","22.796534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47320","22.796543","172.30.1.205","172.30.1.104","TCP","54","47028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47321","22.798776","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47322","22.799255","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47323","22.799262","172.30.1.205","172.30.1.104","TCP","54","47028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47324","22.801129","172.30.1.205","172.30.1.104","TCP","54","47028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47325","22.801248","172.30.1.205","172.30.1.104","TCP","74","39666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926027 TSecr=0 WS=128" +"47326","22.801430","172.30.1.104","172.30.1.205","TCP","54","135 > 47028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47327","22.801441","172.30.1.104","172.30.1.205","TCP","54","135 > 47028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47328","22.801447","172.30.1.205","172.30.1.104","TCP","54","47028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47329","22.801578","172.30.1.104","172.30.1.205","TCP","66","49671 > 39666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47330","22.801586","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47331","22.801951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47332","22.802245","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47333","22.802254","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47334","22.804132","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47335","22.804569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47336","22.804576","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47337","22.805953","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47338","22.809511","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47339","22.809524","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47340","22.810757","172.30.1.205","172.30.1.104","TCP","74","47032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926037 TSecr=0 WS=128" +"47341","22.811100","172.30.1.104","172.30.1.205","TCP","66","135 > 47032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47342","22.811112","172.30.1.205","172.30.1.104","TCP","54","47032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47343","22.811472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47344","22.811761","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47345","22.811770","172.30.1.205","172.30.1.104","TCP","54","47032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47346","22.813971","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47347","22.814403","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47348","22.814410","172.30.1.205","172.30.1.104","TCP","54","47032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47349","22.815262","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47350","22.815311","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47351","22.815349","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47352","22.815383","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47353","22.815411","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47354","22.815440","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47355","22.815472","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47356","22.815506","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47357","22.815532","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47358","22.815560","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47359","22.815591","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47360","22.815661","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47361","22.815905","172.30.1.104","172.30.1.205","TCP","54","49671 > 39626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47362","22.815922","172.30.1.104","172.30.1.205","TCP","54","49671 > 39630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47363","22.815940","172.30.1.104","172.30.1.205","TCP","54","49671 > 39626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47364","22.815947","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47365","22.815971","172.30.1.104","172.30.1.205","TCP","54","49671 > 39630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47366","22.815975","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47367","22.816019","172.30.1.104","172.30.1.205","TCP","54","49671 > 39634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47368","22.816037","172.30.1.104","172.30.1.205","TCP","54","49671 > 39638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47369","22.816062","172.30.1.104","172.30.1.205","TCP","54","49671 > 39634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47370","22.816067","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47371","22.816086","172.30.1.104","172.30.1.205","TCP","54","49671 > 39642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47372","22.816164","172.30.1.104","172.30.1.205","TCP","54","49671 > 39638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47373","22.816168","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47374","22.816184","172.30.1.104","172.30.1.205","TCP","54","49671 > 39646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47375","22.816207","172.30.1.104","172.30.1.205","TCP","54","49671 > 39650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47376","22.816227","172.30.1.104","172.30.1.205","TCP","54","49671 > 39650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47377","22.816230","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47378","22.816274","172.30.1.104","172.30.1.205","TCP","54","49671 > 39654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47379","22.816293","172.30.1.104","172.30.1.205","TCP","54","49671 > 39654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47380","22.816297","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47381","22.816313","172.30.1.104","172.30.1.205","TCP","54","49671 > 39658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47382","22.816334","172.30.1.104","172.30.1.205","TCP","54","49671 > 39658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47383","22.816338","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47384","22.816355","172.30.1.104","172.30.1.205","TCP","54","49671 > 39662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47385","22.816377","172.30.1.104","172.30.1.205","TCP","54","49671 > 39662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47386","22.816380","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47387","22.816482","172.30.1.104","172.30.1.205","TCP","54","49671 > 39666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47388","22.816503","172.30.1.104","172.30.1.205","TCP","54","49671 > 39666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47389","22.816506","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47390","22.816772","172.30.1.104","172.30.1.205","TCP","54","49671 > 39642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47391","22.816790","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47392","22.816807","172.30.1.104","172.30.1.205","TCP","54","49671 > 39622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47393","22.816817","172.30.1.104","172.30.1.205","TCP","54","49671 > 39646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47394","22.816820","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47395","22.816920","172.30.1.104","172.30.1.205","TCP","54","49671 > 39622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47396","22.816925","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47397","22.817331","172.30.1.205","172.30.1.104","TCP","54","47032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47398","22.817442","172.30.1.205","172.30.1.104","TCP","74","39670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926043 TSecr=0 WS=128" +"47399","22.817915","172.30.1.104","172.30.1.205","TCP","54","135 > 47032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47400","22.817956","172.30.1.104","172.30.1.205","TCP","54","135 > 47032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47401","22.817960","172.30.1.205","172.30.1.104","TCP","54","47032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47402","22.817992","172.30.1.104","172.30.1.205","TCP","66","49671 > 39670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47403","22.818000","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47404","22.818352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47405","22.818666","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47406","22.818676","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47407","22.820543","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47408","22.820925","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47409","22.820932","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47410","22.822305","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47411","22.826054","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47412","22.826064","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47413","22.827019","172.30.1.205","172.30.1.104","TCP","74","47036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926053 TSecr=0 WS=128" +"47414","22.827347","172.30.1.104","172.30.1.205","TCP","66","135 > 47036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47415","22.827359","172.30.1.205","172.30.1.104","TCP","54","47036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47416","22.827723","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47417","22.829962","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47418","22.829977","172.30.1.205","172.30.1.104","TCP","54","47036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47419","22.832167","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47420","22.832638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47421","22.832645","172.30.1.205","172.30.1.104","TCP","54","47036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47422","22.834521","172.30.1.205","172.30.1.104","TCP","54","47036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47423","22.834635","172.30.1.205","172.30.1.104","TCP","74","39674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926061 TSecr=0 WS=128" +"47424","22.834809","172.30.1.104","172.30.1.205","TCP","54","135 > 47036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47425","22.834882","172.30.1.104","172.30.1.205","TCP","54","135 > 47036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47426","22.834887","172.30.1.205","172.30.1.104","TCP","54","47036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47427","22.834918","172.30.1.104","172.30.1.205","TCP","66","49671 > 39674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47428","22.834926","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47429","22.835268","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47430","22.835559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47431","22.835568","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47432","22.837478","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47433","22.837897","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47434","22.837904","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47435","22.839273","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47436","22.842996","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47437","22.843007","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47438","22.843972","172.30.1.205","172.30.1.104","TCP","74","47040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926070 TSecr=0 WS=128" +"47439","22.844287","172.30.1.104","172.30.1.205","TCP","66","135 > 47040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47440","22.844299","172.30.1.205","172.30.1.104","TCP","54","47040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47441","22.844653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47442","22.844950","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47443","22.844960","172.30.1.205","172.30.1.104","TCP","54","47040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47444","22.847178","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47445","22.847657","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47446","22.847664","172.30.1.205","172.30.1.104","TCP","54","47040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47447","22.849498","172.30.1.205","172.30.1.104","TCP","54","47040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47448","22.849610","172.30.1.205","172.30.1.104","TCP","74","39678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926076 TSecr=0 WS=128" +"47449","22.849776","172.30.1.104","172.30.1.205","TCP","54","135 > 47040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47450","22.849800","172.30.1.104","172.30.1.205","TCP","54","135 > 47040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47451","22.849806","172.30.1.205","172.30.1.104","TCP","54","47040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47452","22.849874","172.30.1.104","172.30.1.205","TCP","66","49671 > 39678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47453","22.849882","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47454","22.850229","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47455","22.850517","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47456","22.850528","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47457","22.852428","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47458","22.852928","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47459","22.852935","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47460","22.854321","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47461","22.858101","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47462","22.858111","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47463","22.859063","172.30.1.205","172.30.1.104","TCP","74","47044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926085 TSecr=0 WS=128" +"47464","22.859362","172.30.1.104","172.30.1.205","TCP","66","135 > 47044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47465","22.859372","172.30.1.205","172.30.1.104","TCP","54","47044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47466","22.859728","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47467","22.860029","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47468","22.860038","172.30.1.205","172.30.1.104","TCP","54","47044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47469","22.862270","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47470","22.862763","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47471","22.862770","172.30.1.205","172.30.1.104","TCP","54","47044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47472","22.864592","172.30.1.205","172.30.1.104","TCP","54","47044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47473","22.864703","172.30.1.205","172.30.1.104","TCP","74","39682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926091 TSecr=0 WS=128" +"47474","22.864873","172.30.1.104","172.30.1.205","TCP","54","135 > 47044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47475","22.864911","172.30.1.104","172.30.1.205","TCP","54","135 > 47044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47476","22.864917","172.30.1.205","172.30.1.104","TCP","54","47044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47477","22.864989","172.30.1.104","172.30.1.205","TCP","66","49671 > 39682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47478","22.864997","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47479","22.865351","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47480","22.866317","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47481","22.866326","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47482","22.868205","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47483","22.868620","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47484","22.868626","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47485","22.870027","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47486","22.873779","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47487","22.873789","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47488","22.874800","172.30.1.205","172.30.1.104","TCP","74","47048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926101 TSecr=0 WS=128" +"47489","22.875114","172.30.1.104","172.30.1.205","TCP","66","135 > 47048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47490","22.875125","172.30.1.205","172.30.1.104","TCP","54","47048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47491","22.875486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47492","22.875779","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47493","22.875788","172.30.1.205","172.30.1.104","TCP","54","47048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47494","22.878024","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47495","22.878438","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47496","22.878444","172.30.1.205","172.30.1.104","TCP","54","47048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47497","22.880261","172.30.1.205","172.30.1.104","TCP","54","47048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47498","22.880372","172.30.1.205","172.30.1.104","TCP","74","39686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926106 TSecr=0 WS=128" +"47499","22.880538","172.30.1.104","172.30.1.205","TCP","54","135 > 47048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47500","22.880549","172.30.1.104","172.30.1.205","TCP","54","135 > 47048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47501","22.880554","172.30.1.205","172.30.1.104","TCP","54","47048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47502","22.880661","172.30.1.104","172.30.1.205","TCP","66","49671 > 39686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47503","22.880669","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47504","22.881061","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47505","22.881364","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47506","22.881373","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47507","22.883258","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47508","22.883619","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47509","22.883626","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47510","22.885013","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47511","22.888798","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47512","22.888808","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47513","22.889749","172.30.1.205","172.30.1.104","TCP","74","47052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926116 TSecr=0 WS=128" +"47514","22.890136","172.30.1.104","172.30.1.205","TCP","66","135 > 47052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47515","22.890147","172.30.1.205","172.30.1.104","TCP","54","47052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47516","22.890505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47517","22.890786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47518","22.890795","172.30.1.205","172.30.1.104","TCP","54","47052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47519","22.893005","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47520","22.893468","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47521","22.893475","172.30.1.205","172.30.1.104","TCP","54","47052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47522","22.895303","172.30.1.205","172.30.1.104","TCP","54","47052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47523","22.895414","172.30.1.205","172.30.1.104","TCP","74","39690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926121 TSecr=0 WS=128" +"47524","22.895571","172.30.1.104","172.30.1.205","TCP","54","135 > 47052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47525","22.895582","172.30.1.104","172.30.1.205","TCP","54","135 > 47052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47526","22.895587","172.30.1.205","172.30.1.104","TCP","54","47052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47527","22.895741","172.30.1.104","172.30.1.205","TCP","66","49671 > 39690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47528","22.895750","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47529","22.896097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47530","22.896394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47531","22.896411","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47532","22.898555","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47533","22.898969","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47534","22.898975","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47535","22.900331","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47536","22.904117","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47537","22.904136","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47538","22.905297","172.30.1.205","172.30.1.104","TCP","74","47056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926131 TSecr=0 WS=128" +"47539","22.905630","172.30.1.104","172.30.1.205","TCP","66","135 > 47056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47540","22.905642","172.30.1.205","172.30.1.104","TCP","54","47056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47541","22.906011","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47542","22.906283","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47543","22.906292","172.30.1.205","172.30.1.104","TCP","54","47056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47544","22.908501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47545","22.908922","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47546","22.908928","172.30.1.205","172.30.1.104","TCP","54","47056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47547","22.910750","172.30.1.205","172.30.1.104","TCP","54","47056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47548","22.910864","172.30.1.205","172.30.1.104","TCP","74","39694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926137 TSecr=0 WS=128" +"47549","22.910991","172.30.1.104","172.30.1.205","TCP","54","135 > 47056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47550","22.911004","172.30.1.104","172.30.1.205","TCP","54","135 > 47056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47551","22.911009","172.30.1.205","172.30.1.104","TCP","54","47056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47552","22.911144","172.30.1.104","172.30.1.205","TCP","66","49671 > 39694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47553","22.911164","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47554","22.911513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47555","22.911814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47556","22.911823","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47557","22.913785","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47558","22.914187","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47559","22.914194","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47560","22.915561","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47561","22.919322","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47562","22.919332","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47563","22.920279","172.30.1.205","172.30.1.104","TCP","74","47060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926146 TSecr=0 WS=128" +"47564","22.920627","172.30.1.104","172.30.1.205","TCP","66","135 > 47060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47565","22.920639","172.30.1.205","172.30.1.104","TCP","54","47060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47566","22.921030","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47567","22.921324","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47568","22.921335","172.30.1.205","172.30.1.104","TCP","54","47060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47569","22.923539","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47570","22.923954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47571","22.923961","172.30.1.205","172.30.1.104","TCP","54","47060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47572","22.925794","172.30.1.205","172.30.1.104","TCP","54","47060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47573","22.925904","172.30.1.205","172.30.1.104","TCP","74","39698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926152 TSecr=0 WS=128" +"47574","22.926040","172.30.1.104","172.30.1.205","TCP","54","135 > 47060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47575","22.926055","172.30.1.104","172.30.1.205","TCP","54","135 > 47060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47576","22.926060","172.30.1.205","172.30.1.104","TCP","54","47060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47577","22.926180","172.30.1.104","172.30.1.205","TCP","66","49671 > 39698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47578","22.926189","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47579","22.926538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47580","22.926826","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47581","22.926834","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47582","22.928735","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47583","22.929087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47584","22.929094","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47585","22.930497","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47586","22.934456","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47587","22.934466","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47588","22.935460","172.30.1.205","172.30.1.104","TCP","74","47064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926161 TSecr=0 WS=128" +"47589","22.935805","172.30.1.104","172.30.1.205","TCP","66","135 > 47064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47590","22.935817","172.30.1.205","172.30.1.104","TCP","54","47064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47591","22.936168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47592","22.936467","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47593","22.936476","172.30.1.205","172.30.1.104","TCP","54","47064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47594","22.938684","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47595","22.939093","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47596","22.939107","172.30.1.205","172.30.1.104","TCP","54","47064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47597","22.940936","172.30.1.205","172.30.1.104","TCP","54","47064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47598","22.941046","172.30.1.205","172.30.1.104","TCP","74","39702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926167 TSecr=0 WS=128" +"47599","22.941221","172.30.1.104","172.30.1.205","TCP","54","135 > 47064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47600","22.941232","172.30.1.104","172.30.1.205","TCP","54","135 > 47064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47601","22.941237","172.30.1.205","172.30.1.104","TCP","54","47064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47602","22.941319","172.30.1.104","172.30.1.205","TCP","66","49671 > 39702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47603","22.941327","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47604","22.941668","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47605","22.942132","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47606","22.942139","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47607","22.943995","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47608","22.944390","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47609","22.944396","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47610","22.945779","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47611","22.949402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47612","22.949422","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47613","22.950624","172.30.1.205","172.30.1.104","TCP","74","47068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926177 TSecr=0 WS=128" +"47614","22.950980","172.30.1.104","172.30.1.205","TCP","66","135 > 47068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47615","22.950991","172.30.1.205","172.30.1.104","TCP","54","47068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47616","22.951345","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47617","22.951666","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47618","22.951675","172.30.1.205","172.30.1.104","TCP","54","47068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47619","22.953894","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47620","22.954380","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47621","22.954387","172.30.1.205","172.30.1.104","TCP","54","47068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47622","22.956197","172.30.1.205","172.30.1.104","TCP","54","47068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47623","22.956308","172.30.1.205","172.30.1.104","TCP","74","39706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926182 TSecr=0 WS=128" +"47624","22.956494","172.30.1.104","172.30.1.205","TCP","54","135 > 47068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47625","22.956520","172.30.1.104","172.30.1.205","TCP","54","135 > 47068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47626","22.956526","172.30.1.205","172.30.1.104","TCP","54","47068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47627","22.956598","172.30.1.104","172.30.1.205","TCP","66","49671 > 39706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47628","22.956606","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47629","22.956988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47630","22.957268","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47631","22.957277","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47632","22.959168","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47633","22.959562","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47634","22.959569","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47635","22.960946","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47636","22.964594","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47637","22.964604","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47638","22.965579","172.30.1.205","172.30.1.104","TCP","74","47072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926192 TSecr=0 WS=128" +"47639","22.965931","172.30.1.104","172.30.1.205","TCP","66","135 > 47072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47640","22.965943","172.30.1.205","172.30.1.104","TCP","54","47072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47641","22.966311","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47642","22.966654","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47643","22.966663","172.30.1.205","172.30.1.104","TCP","54","47072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47644","22.968871","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47645","22.969325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47646","22.969332","172.30.1.205","172.30.1.104","TCP","54","47072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47647","22.971147","172.30.1.205","172.30.1.104","TCP","54","47072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47648","22.971258","172.30.1.205","172.30.1.104","TCP","74","39710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926197 TSecr=0 WS=128" +"47649","22.971426","172.30.1.104","172.30.1.205","TCP","54","135 > 47072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47650","22.971473","172.30.1.104","172.30.1.205","TCP","54","135 > 47072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47651","22.971479","172.30.1.205","172.30.1.104","TCP","54","47072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47652","22.971561","172.30.1.104","172.30.1.205","TCP","66","49671 > 39710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47653","22.971569","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47654","22.971919","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47655","22.972227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47656","22.972238","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47657","22.974154","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47658","22.974569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47659","22.974576","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47660","22.975931","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47661","22.979607","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47662","22.979625","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47663","22.980578","172.30.1.205","172.30.1.104","TCP","74","47076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926207 TSecr=0 WS=128" +"47664","22.980997","172.30.1.104","172.30.1.205","TCP","66","135 > 47076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47665","22.981007","172.30.1.205","172.30.1.104","TCP","54","47076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47666","22.981375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47667","22.981696","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47668","22.981713","172.30.1.205","172.30.1.104","TCP","54","47076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47669","22.984161","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47670","22.984601","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47671","22.984608","172.30.1.205","172.30.1.104","TCP","54","47076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47672","22.986435","172.30.1.205","172.30.1.104","TCP","54","47076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47673","22.986545","172.30.1.205","172.30.1.104","TCP","74","39714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926212 TSecr=0 WS=128" +"47674","22.986698","172.30.1.104","172.30.1.205","TCP","54","135 > 47076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47675","22.986732","172.30.1.104","172.30.1.205","TCP","54","135 > 47076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47676","22.986737","172.30.1.205","172.30.1.104","TCP","54","47076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47677","22.986831","172.30.1.104","172.30.1.205","TCP","66","49671 > 39714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47678","22.986839","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47679","22.987184","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47680","22.987517","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47681","22.987526","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47682","22.989412","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47683","22.989786","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47684","22.989793","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47685","22.991179","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47686","22.994892","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47687","22.994914","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47688","22.996060","172.30.1.205","172.30.1.104","TCP","74","47080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926222 TSecr=0 WS=128" +"47689","22.996361","172.30.1.104","172.30.1.205","TCP","66","135 > 47080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47690","22.996371","172.30.1.205","172.30.1.104","TCP","54","47080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47691","22.996728","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47692","22.997012","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47693","22.997021","172.30.1.205","172.30.1.104","TCP","54","47080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47694","22.999209","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47695","22.999599","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47696","22.999605","172.30.1.205","172.30.1.104","TCP","54","47080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47697","23.000450","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47698","23.000507","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47699","23.000544","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47700","23.000574","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47701","23.000607","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47702","23.000635","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47703","23.000666","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47704","23.000698","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47705","23.000720","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47706","23.000750","172.30.1.104","172.30.1.205","TCP","54","49671 > 39674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47707","23.000761","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47708","23.000815","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47709","23.000827","172.30.1.104","172.30.1.205","TCP","54","49671 > 39678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47710","23.000846","172.30.1.104","172.30.1.205","TCP","54","49671 > 39682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47711","23.000870","172.30.1.104","172.30.1.205","TCP","54","49671 > 39674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47712","23.000876","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47713","23.000890","172.30.1.104","172.30.1.205","TCP","54","49671 > 39686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47714","23.000909","172.30.1.104","172.30.1.205","TCP","54","49671 > 39678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47715","23.000913","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47716","23.000959","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47717","23.001051","172.30.1.104","172.30.1.205","TCP","54","49671 > 39690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47718","23.001065","172.30.1.104","172.30.1.205","TCP","54","49671 > 39694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47719","23.001088","172.30.1.104","172.30.1.205","TCP","54","49671 > 39694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47720","23.001093","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47721","23.001109","172.30.1.104","172.30.1.205","TCP","54","49671 > 39690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47722","23.001111","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47723","23.001129","172.30.1.104","172.30.1.205","TCP","54","49671 > 39682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47724","23.001137","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47725","23.001161","172.30.1.104","172.30.1.205","TCP","54","49671 > 39686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47726","23.001163","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47727","23.001181","172.30.1.104","172.30.1.205","TCP","54","49671 > 39698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47728","23.001201","172.30.1.104","172.30.1.205","TCP","54","49671 > 39702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47729","23.001310","172.30.1.104","172.30.1.205","TCP","54","49671 > 39706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47730","23.001329","172.30.1.104","172.30.1.205","TCP","54","49671 > 39698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47731","23.001334","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47732","23.001349","172.30.1.104","172.30.1.205","TCP","54","49671 > 39702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47733","23.001352","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47734","23.001373","172.30.1.104","172.30.1.205","TCP","54","49671 > 39706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47735","23.001377","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47736","23.001392","172.30.1.104","172.30.1.205","TCP","54","49671 > 39710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47737","23.001413","172.30.1.104","172.30.1.205","TCP","54","49671 > 39714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47738","23.001501","172.30.1.104","172.30.1.205","TCP","54","49671 > 39670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47739","23.001520","172.30.1.104","172.30.1.205","TCP","54","49671 > 39710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47740","23.001524","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47741","23.001541","172.30.1.104","172.30.1.205","TCP","54","49671 > 39714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47742","23.001544","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47743","23.001571","172.30.1.104","172.30.1.205","TCP","54","49671 > 39670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"47744","23.001573","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"47745","23.002464","172.30.1.205","172.30.1.104","TCP","54","47080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47746","23.002582","172.30.1.205","172.30.1.104","TCP","74","39718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926229 TSecr=0 WS=128" +"47747","23.002722","172.30.1.104","172.30.1.205","TCP","54","135 > 47080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47748","23.002768","172.30.1.104","172.30.1.205","TCP","54","135 > 47080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47749","23.002773","172.30.1.205","172.30.1.104","TCP","54","47080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47750","23.002844","172.30.1.104","172.30.1.205","TCP","66","49671 > 39718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47751","23.002852","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47752","23.003206","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47753","23.003533","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47754","23.003542","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47755","23.005470","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47756","23.005827","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47757","23.005834","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47758","23.007192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47759","23.010756","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47760","23.010767","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47761","23.011754","172.30.1.205","172.30.1.104","TCP","74","47084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926238 TSecr=0 WS=128" +"47762","23.012064","172.30.1.104","172.30.1.205","TCP","66","135 > 47084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47763","23.012077","172.30.1.205","172.30.1.104","TCP","54","47084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47764","23.012441","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47765","23.012719","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47766","23.012728","172.30.1.205","172.30.1.104","TCP","54","47084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47767","23.014927","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47768","23.015352","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47769","23.015359","172.30.1.205","172.30.1.104","TCP","54","47084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47770","23.017204","172.30.1.205","172.30.1.104","TCP","54","47084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47771","23.017324","172.30.1.205","172.30.1.104","TCP","74","39722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926243 TSecr=0 WS=128" +"47772","23.017511","172.30.1.104","172.30.1.205","TCP","54","135 > 47084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47773","23.017559","172.30.1.104","172.30.1.205","TCP","54","135 > 47084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47774","23.017565","172.30.1.205","172.30.1.104","TCP","54","47084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47775","23.017647","172.30.1.104","172.30.1.205","TCP","66","49671 > 39722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47776","23.017655","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47777","23.017997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47778","23.018281","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47779","23.018290","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47780","23.020148","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47781","23.020509","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47782","23.020515","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47783","23.021888","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47784","23.025541","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47785","23.025551","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47786","23.026513","172.30.1.205","172.30.1.104","TCP","74","47088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926252 TSecr=0 WS=128" +"47787","23.026844","172.30.1.104","172.30.1.205","TCP","66","135 > 47088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47788","23.026855","172.30.1.205","172.30.1.104","TCP","54","47088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47789","23.027203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47790","23.027511","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47791","23.027519","172.30.1.205","172.30.1.104","TCP","54","47088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47792","23.029745","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47793","23.030127","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47794","23.030133","172.30.1.205","172.30.1.104","TCP","54","47088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47795","23.031957","172.30.1.205","172.30.1.104","TCP","54","47088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47796","23.032069","172.30.1.205","172.30.1.104","TCP","74","39726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926258 TSecr=0 WS=128" +"47797","23.032234","172.30.1.104","172.30.1.205","TCP","54","135 > 47088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47798","23.032245","172.30.1.104","172.30.1.205","TCP","54","135 > 47088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47799","23.032251","172.30.1.205","172.30.1.104","TCP","54","47088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47800","23.032346","172.30.1.104","172.30.1.205","TCP","66","49671 > 39726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47801","23.032354","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47802","23.032700","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47803","23.032986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47804","23.032995","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47805","23.034891","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47806","23.035253","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47807","23.035259","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47808","23.036614","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47809","23.040308","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47810","23.040318","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47811","23.041310","172.30.1.205","172.30.1.104","TCP","74","47092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926267 TSecr=0 WS=128" +"47812","23.041648","172.30.1.104","172.30.1.205","TCP","66","135 > 47092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47813","23.041658","172.30.1.205","172.30.1.104","TCP","54","47092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47814","23.042013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47815","23.042298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47816","23.042309","172.30.1.205","172.30.1.104","TCP","54","47092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47817","23.044523","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47818","23.044907","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47819","23.044914","172.30.1.205","172.30.1.104","TCP","54","47092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47820","23.046737","172.30.1.205","172.30.1.104","TCP","54","47092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47821","23.046849","172.30.1.205","172.30.1.104","TCP","74","39730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926273 TSecr=0 WS=128" +"47822","23.047001","172.30.1.104","172.30.1.205","TCP","54","135 > 47092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47823","23.047013","172.30.1.104","172.30.1.205","TCP","54","135 > 47092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47824","23.047018","172.30.1.205","172.30.1.104","TCP","54","47092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47825","23.047130","172.30.1.104","172.30.1.205","TCP","66","49671 > 39730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47826","23.047138","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47827","23.047483","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47828","23.047777","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47829","23.047786","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47830","23.049713","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47831","23.050095","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47832","23.050101","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47833","23.051459","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47834","23.055109","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47835","23.055119","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47836","23.056065","172.30.1.205","172.30.1.104","TCP","74","47096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926282 TSecr=0 WS=128" +"47837","23.056381","172.30.1.104","172.30.1.205","TCP","66","135 > 47096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47838","23.056391","172.30.1.205","172.30.1.104","TCP","54","47096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47839","23.056739","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47840","23.057046","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47841","23.057063","172.30.1.205","172.30.1.104","TCP","54","47096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47842","23.059463","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47843","23.059905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47844","23.059917","172.30.1.205","172.30.1.104","TCP","54","47096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47845","23.061955","172.30.1.205","172.30.1.104","TCP","54","47096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47846","23.062066","172.30.1.205","172.30.1.104","TCP","74","39734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926288 TSecr=0 WS=128" +"47847","23.062260","172.30.1.104","172.30.1.205","TCP","54","135 > 47096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47848","23.062332","172.30.1.104","172.30.1.205","TCP","66","49671 > 39734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47849","23.062340","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47850","23.062351","172.30.1.104","172.30.1.205","TCP","54","135 > 47096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47851","23.062359","172.30.1.205","172.30.1.104","TCP","54","47096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47852","23.062702","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47853","23.063014","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47854","23.063023","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47855","23.064935","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47856","23.065302","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47857","23.065309","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47858","23.066659","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47859","23.070323","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47860","23.070343","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47861","23.071448","172.30.1.205","172.30.1.104","TCP","74","47100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926297 TSecr=0 WS=128" +"47862","23.071783","172.30.1.104","172.30.1.205","TCP","66","135 > 47100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47863","23.071795","172.30.1.205","172.30.1.104","TCP","54","47100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47864","23.072149","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47865","23.072483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47866","23.072492","172.30.1.205","172.30.1.104","TCP","54","47100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47867","23.074703","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47868","23.075158","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47869","23.075164","172.30.1.205","172.30.1.104","TCP","54","47100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47870","23.077028","172.30.1.205","172.30.1.104","TCP","54","47100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47871","23.077137","172.30.1.205","172.30.1.104","TCP","74","39738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926303 TSecr=0 WS=128" +"47872","23.077287","172.30.1.104","172.30.1.205","TCP","54","135 > 47100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47873","23.077308","172.30.1.104","172.30.1.205","TCP","54","135 > 47100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47874","23.077314","172.30.1.205","172.30.1.104","TCP","54","47100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47875","23.077420","172.30.1.104","172.30.1.205","TCP","66","49671 > 39738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47876","23.077428","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47877","23.077775","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47878","23.078073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47879","23.078082","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47880","23.079983","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47881","23.080402","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47882","23.080408","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47883","23.081792","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47884","23.085521","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47885","23.085531","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47886","23.086480","172.30.1.205","172.30.1.104","TCP","74","47104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926312 TSecr=0 WS=128" +"47887","23.086772","172.30.1.104","172.30.1.205","TCP","66","135 > 47104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47888","23.086782","172.30.1.205","172.30.1.104","TCP","54","47104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47889","23.087130","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47890","23.087506","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47891","23.087518","172.30.1.205","172.30.1.104","TCP","54","47104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47892","23.089735","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47893","23.090156","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47894","23.090168","172.30.1.205","172.30.1.104","TCP","54","47104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47895","23.092151","172.30.1.205","172.30.1.104","TCP","54","47104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47896","23.092261","172.30.1.205","172.30.1.104","TCP","74","39742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926318 TSecr=0 WS=128" +"47897","23.092437","172.30.1.104","172.30.1.205","TCP","54","135 > 47104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47898","23.092449","172.30.1.104","172.30.1.205","TCP","54","135 > 47104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47899","23.092454","172.30.1.205","172.30.1.104","TCP","54","47104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47900","23.092526","172.30.1.104","172.30.1.205","TCP","66","49671 > 39742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47901","23.092535","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47902","23.092913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47903","23.093229","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47904","23.093236","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47905","23.095105","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47906","23.095493","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47907","23.095499","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47908","23.096892","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47909","23.100574","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47910","23.100583","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47911","23.101551","172.30.1.205","172.30.1.104","TCP","74","47108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926327 TSecr=0 WS=128" +"47912","23.101875","172.30.1.104","172.30.1.205","TCP","66","135 > 47108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47913","23.101886","172.30.1.205","172.30.1.104","TCP","54","47108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47914","23.102243","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47915","23.102557","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47916","23.102568","172.30.1.205","172.30.1.104","TCP","54","47108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47917","23.104791","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47918","23.105201","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47919","23.105213","172.30.1.205","172.30.1.104","TCP","54","47108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47920","23.107167","172.30.1.205","172.30.1.104","TCP","54","47108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47921","23.107279","172.30.1.205","172.30.1.104","TCP","74","39746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926333 TSecr=0 WS=128" +"47922","23.107435","172.30.1.104","172.30.1.205","TCP","54","135 > 47108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47923","23.107445","172.30.1.104","172.30.1.205","TCP","54","135 > 47108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47924","23.107450","172.30.1.205","172.30.1.104","TCP","54","47108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47925","23.107558","172.30.1.104","172.30.1.205","TCP","66","49671 > 39746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47926","23.107567","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47927","23.107911","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47928","23.108198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47929","23.108206","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47930","23.110181","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47931","23.110560","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47932","23.110566","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47933","23.111970","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47934","23.115582","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47935","23.115591","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47936","23.116531","172.30.1.205","172.30.1.104","TCP","74","47112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926342 TSecr=0 WS=128" +"47937","23.116842","172.30.1.104","172.30.1.205","TCP","66","135 > 47112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47938","23.116852","172.30.1.205","172.30.1.104","TCP","54","47112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47939","23.117212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47940","23.117497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47941","23.117506","172.30.1.205","172.30.1.104","TCP","54","47112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47942","23.119689","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47943","23.120098","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47944","23.120111","172.30.1.205","172.30.1.104","TCP","54","47112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47945","23.121944","172.30.1.205","172.30.1.104","TCP","54","47112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47946","23.122055","172.30.1.205","172.30.1.104","TCP","74","39750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926348 TSecr=0 WS=128" +"47947","23.122230","172.30.1.104","172.30.1.205","TCP","54","135 > 47112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47948","23.122302","172.30.1.104","172.30.1.205","TCP","66","49671 > 39750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47949","23.122311","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47950","23.122672","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47951","23.124571","172.30.1.104","172.30.1.205","TCP","54","135 > 47112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47952","23.124577","172.30.1.205","172.30.1.104","TCP","54","47112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47953","23.124705","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47954","23.124714","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47955","23.126605","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47956","23.127030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47957","23.127036","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47958","23.128378","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47959","23.131998","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47960","23.132009","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47961","23.132986","172.30.1.205","172.30.1.104","TCP","74","47116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926359 TSecr=0 WS=128" +"47962","23.133343","172.30.1.104","172.30.1.205","TCP","66","135 > 47116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47963","23.133354","172.30.1.205","172.30.1.104","TCP","54","47116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47964","23.133707","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47965","23.134015","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47966","23.134024","172.30.1.205","172.30.1.104","TCP","54","47116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47967","23.136209","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47968","23.136653","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47969","23.136659","172.30.1.205","172.30.1.104","TCP","54","47116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47970","23.138491","172.30.1.205","172.30.1.104","TCP","54","47116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47971","23.138602","172.30.1.205","172.30.1.104","TCP","74","39754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926365 TSecr=0 WS=128" +"47972","23.138827","172.30.1.104","172.30.1.205","TCP","54","135 > 47116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47973","23.138836","172.30.1.104","172.30.1.205","TCP","54","135 > 47116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47974","23.138841","172.30.1.205","172.30.1.104","TCP","54","47116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"47975","23.138950","172.30.1.104","172.30.1.205","TCP","66","49671 > 39754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47976","23.138958","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47977","23.139302","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"47978","23.139609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47979","23.139625","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47980","23.141529","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"47981","23.141915","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"47982","23.141921","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"47983","23.143265","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"47984","23.146912","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"47985","23.146923","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"47986","23.147875","172.30.1.205","172.30.1.104","TCP","74","47120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926374 TSecr=0 WS=128" +"47987","23.148241","172.30.1.104","172.30.1.205","TCP","66","135 > 47120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"47988","23.148252","172.30.1.205","172.30.1.104","TCP","54","47120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"47989","23.148605","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"47990","23.148909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"47991","23.148919","172.30.1.205","172.30.1.104","TCP","54","47120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"47992","23.151126","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"47993","23.151533","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"47994","23.151540","172.30.1.205","172.30.1.104","TCP","54","47120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47995","23.153372","172.30.1.205","172.30.1.104","TCP","54","47120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"47996","23.153519","172.30.1.205","172.30.1.104","TCP","74","39758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926379 TSecr=0 WS=128" +"47997","23.153732","172.30.1.104","172.30.1.205","TCP","54","135 > 47120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47998","23.153752","172.30.1.104","172.30.1.205","TCP","54","135 > 47120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"47999","23.153758","172.30.1.205","172.30.1.104","TCP","54","47120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48000","23.153842","172.30.1.104","172.30.1.205","TCP","66","49671 > 39758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48001","23.153850","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48002","23.154256","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48003","23.154529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48004","23.154538","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48005","23.156433","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48006","23.156837","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48007","23.156843","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48008","23.158225","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48009","23.161873","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48010","23.161884","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48011","23.162844","172.30.1.205","172.30.1.104","TCP","74","47124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926389 TSecr=0 WS=128" +"48012","23.163177","172.30.1.104","172.30.1.205","TCP","66","135 > 47124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48013","23.163188","172.30.1.205","172.30.1.104","TCP","54","47124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48014","23.163543","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48015","23.163842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48016","23.163854","172.30.1.205","172.30.1.104","TCP","54","47124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48017","23.166092","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48018","23.166537","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48019","23.166544","172.30.1.205","172.30.1.104","TCP","54","47124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48020","23.168349","172.30.1.205","172.30.1.104","TCP","54","47124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48021","23.168459","172.30.1.205","172.30.1.104","TCP","74","39762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926394 TSecr=0 WS=128" +"48022","23.168619","172.30.1.104","172.30.1.205","TCP","54","135 > 47124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48023","23.168666","172.30.1.104","172.30.1.205","TCP","54","135 > 47124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48024","23.168671","172.30.1.205","172.30.1.104","TCP","54","47124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48025","23.168824","172.30.1.104","172.30.1.205","TCP","66","49671 > 39762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48026","23.168833","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48027","23.169179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48028","23.169466","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48029","23.169474","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48030","23.171336","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48031","23.174795","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48032","23.174802","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48033","23.176159","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48034","23.179828","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48035","23.179837","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48036","23.180793","172.30.1.205","172.30.1.104","TCP","74","47128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926407 TSecr=0 WS=128" +"48037","23.181109","172.30.1.104","172.30.1.205","TCP","66","135 > 47128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48038","23.181120","172.30.1.205","172.30.1.104","TCP","54","47128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48039","23.181470","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48040","23.181745","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48041","23.181754","172.30.1.205","172.30.1.104","TCP","54","47128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48042","23.183928","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48043","23.184358","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48044","23.184370","172.30.1.205","172.30.1.104","TCP","54","47128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48045","23.185258","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48046","23.185307","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48047","23.185344","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48048","23.185378","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48049","23.185410","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48050","23.185443","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48051","23.185475","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48052","23.185511","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48053","23.185535","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48054","23.185557","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48055","23.185583","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48056","23.185662","172.30.1.104","172.30.1.205","TCP","54","49671 > 39722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48057","23.185671","172.30.1.104","172.30.1.205","TCP","54","49671 > 39726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48058","23.185680","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48059","23.185901","172.30.1.104","172.30.1.205","TCP","54","49671 > 39722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48060","23.185908","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48061","23.185915","172.30.1.104","172.30.1.205","TCP","54","49671 > 39730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48062","23.185924","172.30.1.104","172.30.1.205","TCP","54","49671 > 39726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48063","23.185926","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48064","23.185928","172.30.1.104","172.30.1.205","TCP","54","49671 > 39730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48065","23.185929","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48066","23.185930","172.30.1.104","172.30.1.205","TCP","54","49671 > 39734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48067","23.185934","172.30.1.104","172.30.1.205","TCP","54","49671 > 39738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48068","23.185937","172.30.1.104","172.30.1.205","TCP","54","49671 > 39734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48069","23.185938","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48070","23.185940","172.30.1.104","172.30.1.205","TCP","54","49671 > 39742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48071","23.186052","172.30.1.104","172.30.1.205","TCP","54","49671 > 39746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48072","23.186075","172.30.1.104","172.30.1.205","TCP","54","49671 > 39738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48073","23.186080","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48074","23.186102","172.30.1.104","172.30.1.205","TCP","54","49671 > 39742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48075","23.186105","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48076","23.186126","172.30.1.104","172.30.1.205","TCP","54","49671 > 39746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48077","23.186129","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48078","23.186165","172.30.1.104","172.30.1.205","TCP","54","49671 > 39750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48079","23.186180","172.30.1.104","172.30.1.205","TCP","54","49671 > 39754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48080","23.186199","172.30.1.104","172.30.1.205","TCP","54","49671 > 39758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48081","23.186217","172.30.1.104","172.30.1.205","TCP","54","49671 > 39750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48082","23.186220","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48083","23.186237","172.30.1.104","172.30.1.205","TCP","54","49671 > 39762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48084","23.186520","172.30.1.104","172.30.1.205","TCP","54","49671 > 39762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48085","23.186525","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48086","23.186538","172.30.1.104","172.30.1.205","TCP","54","49671 > 39718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48087","23.186560","172.30.1.104","172.30.1.205","TCP","54","49671 > 39718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48088","23.186563","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48089","23.186580","172.30.1.104","172.30.1.205","TCP","54","49671 > 39754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48090","23.186583","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48091","23.186601","172.30.1.104","172.30.1.205","TCP","54","49671 > 39758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48092","23.186604","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48093","23.187207","172.30.1.205","172.30.1.104","TCP","54","47128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48094","23.187318","172.30.1.205","172.30.1.104","TCP","74","39766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926413 TSecr=0 WS=128" +"48095","23.187498","172.30.1.104","172.30.1.205","TCP","54","135 > 47128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48096","23.187537","172.30.1.104","172.30.1.205","TCP","54","135 > 47128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48097","23.187542","172.30.1.205","172.30.1.104","TCP","54","47128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48098","23.187631","172.30.1.104","172.30.1.205","TCP","66","49671 > 39766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48099","23.187644","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48100","23.188021","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48101","23.188290","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48102","23.188297","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48103","23.190289","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48104","23.190624","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48105","23.190630","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48106","23.191988","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48107","23.195516","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48108","23.195527","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48109","23.196518","172.30.1.205","172.30.1.104","TCP","74","47132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926422 TSecr=0 WS=128" +"48110","23.196850","172.30.1.104","172.30.1.205","TCP","66","135 > 47132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48111","23.196862","172.30.1.205","172.30.1.104","TCP","54","47132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48112","23.197238","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48113","23.197539","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48114","23.197548","172.30.1.205","172.30.1.104","TCP","54","47132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48115","23.199722","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48116","23.200147","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48117","23.200154","172.30.1.205","172.30.1.104","TCP","54","47132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48118","23.201990","172.30.1.205","172.30.1.104","TCP","54","47132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48119","23.202103","172.30.1.205","172.30.1.104","TCP","74","39770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926428 TSecr=0 WS=128" +"48120","23.202255","172.30.1.104","172.30.1.205","TCP","54","135 > 47132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48121","23.202269","172.30.1.104","172.30.1.205","TCP","54","135 > 47132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48122","23.202274","172.30.1.205","172.30.1.104","TCP","54","47132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48123","23.202374","172.30.1.104","172.30.1.205","TCP","66","49671 > 39770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48124","23.202382","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48125","23.202727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48126","23.203023","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48127","23.203032","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48128","23.204941","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48129","23.205276","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48130","23.205283","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48131","23.206634","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48132","23.210236","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48133","23.210246","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48134","23.211180","172.30.1.205","172.30.1.104","TCP","74","47136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926437 TSecr=0 WS=128" +"48135","23.211490","172.30.1.104","172.30.1.205","TCP","66","135 > 47136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48136","23.211502","172.30.1.205","172.30.1.104","TCP","54","47136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48137","23.211855","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48138","23.212150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48139","23.212159","172.30.1.205","172.30.1.104","TCP","54","47136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48140","23.214380","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48141","23.214736","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48142","23.214743","172.30.1.205","172.30.1.104","TCP","54","47136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48143","23.216556","172.30.1.205","172.30.1.104","TCP","54","47136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48144","23.216667","172.30.1.205","172.30.1.104","TCP","74","39774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926443 TSecr=0 WS=128" +"48145","23.216826","172.30.1.104","172.30.1.205","TCP","54","135 > 47136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48146","23.216877","172.30.1.104","172.30.1.205","TCP","54","135 > 47136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48147","23.216883","172.30.1.205","172.30.1.104","TCP","54","47136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48148","23.216951","172.30.1.104","172.30.1.205","TCP","66","49671 > 39774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48149","23.216959","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48150","23.217314","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48151","23.217632","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48152","23.217641","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48153","23.219526","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48154","23.219896","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48155","23.219902","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48156","23.221284","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48157","23.224980","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48158","23.224989","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48159","23.225935","172.30.1.205","172.30.1.104","TCP","74","47140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926452 TSecr=0 WS=128" +"48160","23.226273","172.30.1.104","172.30.1.205","TCP","66","135 > 47140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48161","23.226284","172.30.1.205","172.30.1.104","TCP","54","47140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48162","23.226637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48163","23.226925","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48164","23.226934","172.30.1.205","172.30.1.104","TCP","54","47140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48165","23.229148","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48166","23.229556","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48167","23.229568","172.30.1.205","172.30.1.104","TCP","54","47140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48168","23.231588","172.30.1.205","172.30.1.104","TCP","54","47140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48169","23.231698","172.30.1.205","172.30.1.104","TCP","74","39778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926458 TSecr=0 WS=128" +"48170","23.231858","172.30.1.104","172.30.1.205","TCP","54","135 > 47140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48171","23.231889","172.30.1.104","172.30.1.205","TCP","54","135 > 47140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48172","23.231894","172.30.1.205","172.30.1.104","TCP","54","47140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48173","23.231984","172.30.1.104","172.30.1.205","TCP","66","49671 > 39778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48174","23.231992","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48175","23.232335","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48176","23.232610","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48177","23.232619","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48178","23.234525","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48179","23.234909","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48180","23.234915","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48181","23.236267","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48182","23.239952","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48183","23.239974","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48184","23.241192","172.30.1.205","172.30.1.104","TCP","74","47144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926467 TSecr=0 WS=128" +"48185","23.241470","172.30.1.104","172.30.1.205","TCP","66","135 > 47144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48186","23.241481","172.30.1.205","172.30.1.104","TCP","54","47144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48187","23.241834","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48188","23.242119","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48189","23.242129","172.30.1.205","172.30.1.104","TCP","54","47144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48190","23.244313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48191","23.244731","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48192","23.244737","172.30.1.205","172.30.1.104","TCP","54","47144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48193","23.246551","172.30.1.205","172.30.1.104","TCP","54","47144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48194","23.246661","172.30.1.205","172.30.1.104","TCP","74","39782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926473 TSecr=0 WS=128" +"48195","23.246856","172.30.1.104","172.30.1.205","TCP","54","135 > 47144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48196","23.246865","172.30.1.104","172.30.1.205","TCP","54","135 > 47144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48197","23.246870","172.30.1.205","172.30.1.104","TCP","54","47144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48198","23.246958","172.30.1.104","172.30.1.205","TCP","66","49671 > 39782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48199","23.246966","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48200","23.247312","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48201","23.247637","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48202","23.247645","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48203","23.249570","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48204","23.249966","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48205","23.249978","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48206","23.251553","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48207","23.255285","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48208","23.255294","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48209","23.256235","172.30.1.205","172.30.1.104","TCP","74","47148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926482 TSecr=0 WS=128" +"48210","23.256638","172.30.1.104","172.30.1.205","TCP","66","135 > 47148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48211","23.256650","172.30.1.205","172.30.1.104","TCP","54","47148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48212","23.257036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48213","23.257334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48214","23.257344","172.30.1.205","172.30.1.104","TCP","54","47148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48215","23.259532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48216","23.259949","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48217","23.259956","172.30.1.205","172.30.1.104","TCP","54","47148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48218","23.261795","172.30.1.205","172.30.1.104","TCP","54","47148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48219","23.261905","172.30.1.205","172.30.1.104","TCP","74","39786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926488 TSecr=0 WS=128" +"48220","23.262080","172.30.1.104","172.30.1.205","TCP","54","135 > 47148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48221","23.262206","172.30.1.104","172.30.1.205","TCP","66","49671 > 39786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48222","23.262215","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48223","23.262226","172.30.1.104","172.30.1.205","TCP","54","135 > 47148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48224","23.262233","172.30.1.205","172.30.1.104","TCP","54","47148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48225","23.262577","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48226","23.262934","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48227","23.262943","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48228","23.264842","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48229","23.265210","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48230","23.265216","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48231","23.266598","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48232","23.270323","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48233","23.270332","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48234","23.271315","172.30.1.205","172.30.1.104","TCP","74","47152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926497 TSecr=0 WS=128" +"48235","23.271655","172.30.1.104","172.30.1.205","TCP","66","135 > 47152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48236","23.271666","172.30.1.205","172.30.1.104","TCP","54","47152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48237","23.272010","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48238","23.272300","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48239","23.272308","172.30.1.205","172.30.1.104","TCP","54","47152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48240","23.274534","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48241","23.274983","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48242","23.274989","172.30.1.205","172.30.1.104","TCP","54","47152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48243","23.276816","172.30.1.205","172.30.1.104","TCP","54","47152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48244","23.276927","172.30.1.205","172.30.1.104","TCP","74","39790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926503 TSecr=0 WS=128" +"48245","23.277077","172.30.1.104","172.30.1.205","TCP","54","135 > 47152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48246","23.277105","172.30.1.104","172.30.1.205","TCP","54","135 > 47152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48247","23.277111","172.30.1.205","172.30.1.104","TCP","54","47152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48248","23.277215","172.30.1.104","172.30.1.205","TCP","66","49671 > 39790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48249","23.277223","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48250","23.277569","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48251","23.277907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48252","23.277916","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48253","23.279800","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48254","23.281424","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48255","23.281433","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48256","23.282807","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48257","23.286508","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48258","23.286518","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48259","23.287471","172.30.1.205","172.30.1.104","TCP","74","47156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926513 TSecr=0 WS=128" +"48260","23.287898","172.30.1.104","172.30.1.205","TCP","66","135 > 47156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48261","23.287910","172.30.1.205","172.30.1.104","TCP","54","47156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48262","23.288261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48263","23.288562","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48264","23.288571","172.30.1.205","172.30.1.104","TCP","54","47156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48265","23.290805","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48266","23.291258","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48267","23.291264","172.30.1.205","172.30.1.104","TCP","54","47156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48268","23.293096","172.30.1.205","172.30.1.104","TCP","54","47156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48269","23.293205","172.30.1.205","172.30.1.104","TCP","74","39794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926519 TSecr=0 WS=128" +"48270","23.293428","172.30.1.104","172.30.1.205","TCP","54","135 > 47156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48271","23.293483","172.30.1.104","172.30.1.205","TCP","66","49671 > 39794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48272","23.293493","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48273","23.293523","172.30.1.104","172.30.1.205","TCP","54","135 > 47156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48274","23.293528","172.30.1.205","172.30.1.104","TCP","54","47156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48275","23.293856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48276","23.294168","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48277","23.294176","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48278","23.296046","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48279","23.296407","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48280","23.296413","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48281","23.297798","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48282","23.301506","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48283","23.301515","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48284","23.302463","172.30.1.205","172.30.1.104","TCP","74","47160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926528 TSecr=0 WS=128" +"48285","23.302839","172.30.1.104","172.30.1.205","TCP","66","135 > 47160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48286","23.302849","172.30.1.205","172.30.1.104","TCP","54","47160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48287","23.303196","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48288","23.303499","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48289","23.303508","172.30.1.205","172.30.1.104","TCP","54","47160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48290","23.305702","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48291","23.306131","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48292","23.306137","172.30.1.205","172.30.1.104","TCP","54","47160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48293","23.307952","172.30.1.205","172.30.1.104","TCP","54","47160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48294","23.308069","172.30.1.205","172.30.1.104","TCP","74","39798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926534 TSecr=0 WS=128" +"48295","23.308293","172.30.1.104","172.30.1.205","TCP","54","135 > 47160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48296","23.308301","172.30.1.104","172.30.1.205","TCP","54","135 > 47160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48297","23.308306","172.30.1.205","172.30.1.104","TCP","54","47160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48298","23.308392","172.30.1.104","172.30.1.205","TCP","66","49671 > 39798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48299","23.308400","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48300","23.308742","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48301","23.309073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48302","23.309082","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48303","23.310951","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48304","23.311300","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48305","23.311307","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48306","23.312667","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48307","23.316393","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48308","23.316414","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48309","23.317507","172.30.1.205","172.30.1.104","TCP","74","47164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926543 TSecr=0 WS=128" +"48310","23.317907","172.30.1.104","172.30.1.205","TCP","66","135 > 47164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48311","23.317918","172.30.1.205","172.30.1.104","TCP","54","47164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48312","23.318295","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48313","23.318577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48314","23.318586","172.30.1.205","172.30.1.104","TCP","54","47164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48315","23.320765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48316","23.321162","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48317","23.321169","172.30.1.205","172.30.1.104","TCP","54","47164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48318","23.322973","172.30.1.205","172.30.1.104","TCP","54","47164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48319","23.323090","172.30.1.205","172.30.1.104","TCP","74","39802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926549 TSecr=0 WS=128" +"48320","23.323288","172.30.1.104","172.30.1.205","TCP","54","135 > 47164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48321","23.323297","172.30.1.104","172.30.1.205","TCP","54","135 > 47164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48322","23.323302","172.30.1.205","172.30.1.104","TCP","54","47164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48323","23.323377","172.30.1.104","172.30.1.205","TCP","66","49671 > 39802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48324","23.323386","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48325","23.323734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48326","23.324045","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48327","23.324054","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48328","23.325940","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48329","23.326331","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48330","23.326336","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48331","23.327678","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48332","23.331379","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48333","23.331389","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48334","23.332327","172.30.1.205","172.30.1.104","TCP","74","47168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926558 TSecr=0 WS=128" +"48335","23.332658","172.30.1.104","172.30.1.205","TCP","66","135 > 47168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48336","23.332670","172.30.1.205","172.30.1.104","TCP","54","47168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48337","23.333056","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48338","23.333409","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48339","23.333419","172.30.1.205","172.30.1.104","TCP","54","47168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48340","23.335595","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48341","23.336021","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48342","23.336028","172.30.1.205","172.30.1.104","TCP","54","47168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48343","23.337861","172.30.1.205","172.30.1.104","TCP","54","47168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48344","23.337971","172.30.1.205","172.30.1.104","TCP","74","39806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926564 TSecr=0 WS=128" +"48345","23.338118","172.30.1.104","172.30.1.205","TCP","54","135 > 47168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48346","23.338146","172.30.1.104","172.30.1.205","TCP","54","135 > 47168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48347","23.338151","172.30.1.205","172.30.1.104","TCP","54","47168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48348","23.338241","172.30.1.104","172.30.1.205","TCP","66","49671 > 39806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48349","23.338249","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48350","23.338596","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48351","23.338913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48352","23.338921","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48353","23.340862","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48354","23.342202","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48355","23.342208","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48356","23.343549","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48357","23.347297","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48358","23.347307","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48359","23.348243","172.30.1.205","172.30.1.104","TCP","74","47172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926574 TSecr=0 WS=128" +"48360","23.348617","172.30.1.104","172.30.1.205","TCP","66","135 > 47172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48361","23.348628","172.30.1.205","172.30.1.104","TCP","54","47172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48362","23.349008","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48363","23.349294","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48364","23.349304","172.30.1.205","172.30.1.104","TCP","54","47172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48365","23.351489","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48366","23.351973","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48367","23.351980","172.30.1.205","172.30.1.104","TCP","54","47172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48368","23.353810","172.30.1.205","172.30.1.104","TCP","54","47172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48369","23.353922","172.30.1.205","172.30.1.104","TCP","74","39810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926580 TSecr=0 WS=128" +"48370","23.354207","172.30.1.104","172.30.1.205","TCP","54","135 > 47172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48371","23.354217","172.30.1.104","172.30.1.205","TCP","66","49671 > 39810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48372","23.354226","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48373","23.354248","172.30.1.104","172.30.1.205","TCP","54","135 > 47172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48374","23.354253","172.30.1.205","172.30.1.104","TCP","54","47172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48375","23.354595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48376","23.354898","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48377","23.354907","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48378","23.356796","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48379","23.357200","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48380","23.357207","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48381","23.358556","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48382","23.362399","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48383","23.362432","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48384","23.363364","172.30.1.205","172.30.1.104","TCP","74","47176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926589 TSecr=0 WS=128" +"48385","23.363764","172.30.1.104","172.30.1.205","TCP","66","135 > 47176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48386","23.363774","172.30.1.205","172.30.1.104","TCP","54","47176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48387","23.364129","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48388","23.364441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48389","23.364449","172.30.1.205","172.30.1.104","TCP","54","47176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48390","23.366650","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48391","23.367144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48392","23.367150","172.30.1.205","172.30.1.104","TCP","54","47176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48393","23.368000","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48394","23.368048","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48395","23.368084","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48396","23.368117","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48397","23.368149","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48398","23.368189","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48399","23.368217","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48400","23.368249","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48401","23.368281","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48402","23.368308","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48403","23.368338","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48404","23.368413","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48405","23.368565","172.30.1.104","172.30.1.205","TCP","54","49671 > 39770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48406","23.368581","172.30.1.104","172.30.1.205","TCP","54","49671 > 39774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48407","23.368599","172.30.1.104","172.30.1.205","TCP","54","49671 > 39770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48408","23.368605","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48409","23.368619","172.30.1.104","172.30.1.205","TCP","54","49671 > 39778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48410","23.368639","172.30.1.104","172.30.1.205","TCP","54","49671 > 39782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48411","23.368683","172.30.1.104","172.30.1.205","TCP","54","49671 > 39774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48412","23.368689","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48413","23.368702","172.30.1.104","172.30.1.205","TCP","54","49671 > 39786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48414","23.368727","172.30.1.104","172.30.1.205","TCP","54","49671 > 39786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48415","23.368732","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48416","23.368744","172.30.1.104","172.30.1.205","TCP","54","49671 > 39778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48417","23.368747","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48418","23.368764","172.30.1.104","172.30.1.205","TCP","54","49671 > 39790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48419","23.368789","172.30.1.104","172.30.1.205","TCP","54","49671 > 39794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48420","23.368803","172.30.1.104","172.30.1.205","TCP","54","49671 > 39794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48421","23.368807","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48422","23.368821","172.30.1.104","172.30.1.205","TCP","54","49671 > 39798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48423","23.368841","172.30.1.104","172.30.1.205","TCP","54","49671 > 39802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48424","23.368859","172.30.1.104","172.30.1.205","TCP","54","49671 > 39802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48425","23.368863","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48426","23.368877","172.30.1.104","172.30.1.205","TCP","54","49671 > 39806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48427","23.368898","172.30.1.104","172.30.1.205","TCP","54","49671 > 39798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48428","23.368902","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48429","23.369016","172.30.1.104","172.30.1.205","TCP","54","49671 > 39810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48430","23.369046","172.30.1.104","172.30.1.205","TCP","54","49671 > 39810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48431","23.369051","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48432","23.369052","172.30.1.104","172.30.1.205","TCP","54","49671 > 39806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48433","23.369054","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48434","23.369065","172.30.1.104","172.30.1.205","TCP","54","49671 > 39782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48435","23.369068","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48436","23.369084","172.30.1.104","172.30.1.205","TCP","54","49671 > 39790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48437","23.369087","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48438","23.369204","172.30.1.104","172.30.1.205","TCP","54","49671 > 39766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48439","23.369223","172.30.1.104","172.30.1.205","TCP","54","49671 > 39766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48440","23.369226","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48441","23.370027","172.30.1.205","172.30.1.104","TCP","54","47176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48442","23.370139","172.30.1.205","172.30.1.104","TCP","74","39814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926596 TSecr=0 WS=128" +"48443","23.370288","172.30.1.104","172.30.1.205","TCP","54","135 > 47176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48444","23.370326","172.30.1.104","172.30.1.205","TCP","54","135 > 47176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48445","23.370331","172.30.1.205","172.30.1.104","TCP","54","47176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48446","23.370433","172.30.1.104","172.30.1.205","TCP","66","49671 > 39814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48447","23.370441","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48448","23.370811","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48449","23.371148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48450","23.371157","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48451","23.373062","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48452","23.373427","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48453","23.373433","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48454","23.374785","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48455","23.378528","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48456","23.378538","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48457","23.379477","172.30.1.205","172.30.1.104","TCP","74","47180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926605 TSecr=0 WS=128" +"48458","23.379836","172.30.1.104","172.30.1.205","TCP","66","135 > 47180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48459","23.379847","172.30.1.205","172.30.1.104","TCP","54","47180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48460","23.380200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48461","23.380509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48462","23.380519","172.30.1.205","172.30.1.104","TCP","54","47180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48463","23.382709","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48464","23.383114","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48465","23.383120","172.30.1.205","172.30.1.104","TCP","54","47180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48466","23.384942","172.30.1.205","172.30.1.104","TCP","54","47180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48467","23.385050","172.30.1.205","172.30.1.104","TCP","74","39818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926611 TSecr=0 WS=128" +"48468","23.385222","172.30.1.104","172.30.1.205","TCP","54","135 > 47180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48469","23.385232","172.30.1.104","172.30.1.205","TCP","54","135 > 47180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48470","23.385237","172.30.1.205","172.30.1.104","TCP","54","47180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48471","23.385327","172.30.1.104","172.30.1.205","TCP","66","49671 > 39818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48472","23.385335","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48473","23.385678","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48474","23.385966","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48475","23.385975","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48476","23.387833","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48477","23.388206","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48478","23.388213","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48479","23.389604","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48480","23.393267","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48481","23.393278","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48482","23.394254","172.30.1.205","172.30.1.104","TCP","74","47184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926620 TSecr=0 WS=128" +"48483","23.394581","172.30.1.104","172.30.1.205","TCP","66","135 > 47184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48484","23.394592","172.30.1.205","172.30.1.104","TCP","54","47184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48485","23.394957","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48486","23.395253","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48487","23.395262","172.30.1.205","172.30.1.104","TCP","54","47184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48488","23.397507","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48489","23.397917","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48490","23.397924","172.30.1.205","172.30.1.104","TCP","54","47184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48491","23.399750","172.30.1.205","172.30.1.104","TCP","54","47184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48492","23.399865","172.30.1.205","172.30.1.104","TCP","74","39822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926626 TSecr=0 WS=128" +"48493","23.400020","172.30.1.104","172.30.1.205","TCP","54","135 > 47184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48494","23.400032","172.30.1.104","172.30.1.205","TCP","54","135 > 47184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48495","23.400037","172.30.1.205","172.30.1.104","TCP","54","47184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48496","23.400172","172.30.1.104","172.30.1.205","TCP","66","49671 > 39822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48497","23.400180","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48498","23.400526","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48499","23.400813","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48500","23.400822","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48501","23.402721","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48502","23.403086","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48503","23.403093","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48504","23.404441","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48505","23.408065","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48506","23.408075","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48507","23.409046","172.30.1.205","172.30.1.104","TCP","74","47188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926635 TSecr=0 WS=128" +"48508","23.409389","172.30.1.104","172.30.1.205","TCP","66","135 > 47188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48509","23.409399","172.30.1.205","172.30.1.104","TCP","54","47188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48510","23.409750","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48511","23.410033","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48512","23.410042","172.30.1.205","172.30.1.104","TCP","54","47188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48513","23.412226","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48514","23.412621","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48515","23.412628","172.30.1.205","172.30.1.104","TCP","54","47188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48516","23.414464","172.30.1.205","172.30.1.104","TCP","54","47188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48517","23.414575","172.30.1.205","172.30.1.104","TCP","74","39826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926641 TSecr=0 WS=128" +"48518","23.414722","172.30.1.104","172.30.1.205","TCP","54","135 > 47188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48519","23.414779","172.30.1.104","172.30.1.205","TCP","54","135 > 47188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48520","23.414785","172.30.1.205","172.30.1.104","TCP","54","47188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48521","23.414863","172.30.1.104","172.30.1.205","TCP","66","49671 > 39826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48522","23.414871","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48523","23.415232","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48524","23.416735","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48525","23.416744","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48526","23.418632","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48527","23.419068","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48528","23.419075","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48529","23.420426","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48530","23.424140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48531","23.424151","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48532","23.425147","172.30.1.205","172.30.1.104","TCP","74","47192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926651 TSecr=0 WS=128" +"48533","23.425518","172.30.1.104","172.30.1.205","TCP","66","135 > 47192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48534","23.425528","172.30.1.205","172.30.1.104","TCP","54","47192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48535","23.425881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48536","23.426186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48537","23.426195","172.30.1.205","172.30.1.104","TCP","54","47192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48538","23.428377","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48539","23.428819","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48540","23.428825","172.30.1.205","172.30.1.104","TCP","54","47192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48541","23.430635","172.30.1.205","172.30.1.104","TCP","54","47192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48542","23.430766","172.30.1.205","172.30.1.104","TCP","74","39830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926657 TSecr=0 WS=128" +"48543","23.430908","172.30.1.104","172.30.1.205","TCP","54","135 > 47192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48544","23.430944","172.30.1.104","172.30.1.205","TCP","54","135 > 47192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48545","23.430950","172.30.1.205","172.30.1.104","TCP","54","47192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48546","23.431044","172.30.1.104","172.30.1.205","TCP","66","49671 > 39830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48547","23.431053","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48548","23.431421","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48549","23.431702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48550","23.431710","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48551","23.433628","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48552","23.434167","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48553","23.434174","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48554","23.435523","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48555","23.439237","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48556","23.439246","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48557","23.440190","172.30.1.205","172.30.1.104","TCP","74","47196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926666 TSecr=0 WS=128" +"48558","23.440572","172.30.1.104","172.30.1.205","TCP","66","135 > 47196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48559","23.440584","172.30.1.205","172.30.1.104","TCP","54","47196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48560","23.440973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48561","23.441278","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48562","23.441287","172.30.1.205","172.30.1.104","TCP","54","47196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48563","23.443478","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48564","23.443988","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48565","23.443994","172.30.1.205","172.30.1.104","TCP","54","47196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48566","23.445834","172.30.1.205","172.30.1.104","TCP","54","47196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48567","23.445945","172.30.1.205","172.30.1.104","TCP","74","39834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926672 TSecr=0 WS=128" +"48568","23.446140","172.30.1.104","172.30.1.205","TCP","54","135 > 47196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48569","23.446151","172.30.1.104","172.30.1.205","TCP","54","135 > 47196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48570","23.446156","172.30.1.205","172.30.1.104","TCP","54","47196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48571","23.446229","172.30.1.104","172.30.1.205","TCP","66","49671 > 39834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48572","23.446237","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48573","23.446584","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48574","23.446869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48575","23.446878","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48576","23.448761","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48577","23.449164","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48578","23.449171","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48579","23.450530","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48580","23.454305","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48581","23.454330","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48582","23.455332","172.30.1.205","172.30.1.104","TCP","74","47200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926681 TSecr=0 WS=128" +"48583","23.455676","172.30.1.104","172.30.1.205","TCP","66","135 > 47200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48584","23.455687","172.30.1.205","172.30.1.104","TCP","54","47200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48585","23.456035","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48586","23.456324","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48587","23.456333","172.30.1.205","172.30.1.104","TCP","54","47200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48588","23.458595","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48589","23.459014","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48590","23.459021","172.30.1.205","172.30.1.104","TCP","54","47200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48591","23.460850","172.30.1.205","172.30.1.104","TCP","54","47200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48592","23.460965","172.30.1.205","172.30.1.104","TCP","74","39838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926687 TSecr=0 WS=128" +"48593","23.461121","172.30.1.104","172.30.1.205","TCP","54","135 > 47200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48594","23.461136","172.30.1.104","172.30.1.205","TCP","54","135 > 47200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48595","23.461142","172.30.1.205","172.30.1.104","TCP","54","47200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48596","23.461269","172.30.1.104","172.30.1.205","TCP","66","49671 > 39838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48597","23.461277","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48598","23.461621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48599","23.461902","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48600","23.461912","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48601","23.463787","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48602","23.464226","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48603","23.464232","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48604","23.465631","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48605","23.469406","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48606","23.469417","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48607","23.470401","172.30.1.205","172.30.1.104","TCP","74","47204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926696 TSecr=0 WS=128" +"48608","23.470702","172.30.1.104","172.30.1.205","TCP","66","135 > 47204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48609","23.470714","172.30.1.205","172.30.1.104","TCP","54","47204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48610","23.471124","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48611","23.471403","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48612","23.471412","172.30.1.205","172.30.1.104","TCP","54","47204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48613","23.473641","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48614","23.474044","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48615","23.474050","172.30.1.205","172.30.1.104","TCP","54","47204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48616","23.475861","172.30.1.205","172.30.1.104","TCP","54","47204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48617","23.475970","172.30.1.205","172.30.1.104","TCP","74","39842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926702 TSecr=0 WS=128" +"48618","23.476112","172.30.1.104","172.30.1.205","TCP","54","135 > 47204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48619","23.476126","172.30.1.104","172.30.1.205","TCP","54","135 > 47204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48620","23.476131","172.30.1.205","172.30.1.104","TCP","54","47204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48621","23.476249","172.30.1.104","172.30.1.205","TCP","66","49671 > 39842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48622","23.476258","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48623","23.476601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48624","23.476878","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48625","23.476887","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48626","23.478774","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48627","23.479132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48628","23.479138","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48629","23.480489","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48630","23.484268","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48631","23.484279","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48632","23.485252","172.30.1.205","172.30.1.104","TCP","74","47208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926711 TSecr=0 WS=128" +"48633","23.485597","172.30.1.104","172.30.1.205","TCP","66","135 > 47208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48634","23.485610","172.30.1.205","172.30.1.104","TCP","54","47208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48635","23.485972","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48636","23.486293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48637","23.486302","172.30.1.205","172.30.1.104","TCP","54","47208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48638","23.488485","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48639","23.488912","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48640","23.488920","172.30.1.205","172.30.1.104","TCP","54","47208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48641","23.490755","172.30.1.205","172.30.1.104","TCP","54","47208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48642","23.490867","172.30.1.205","172.30.1.104","TCP","74","39846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926717 TSecr=0 WS=128" +"48643","23.491011","172.30.1.104","172.30.1.205","TCP","54","135 > 47208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48644","23.491040","172.30.1.104","172.30.1.205","TCP","54","135 > 47208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48645","23.491045","172.30.1.205","172.30.1.104","TCP","54","47208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48646","23.491161","172.30.1.104","172.30.1.205","TCP","66","49671 > 39846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48647","23.491169","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48648","23.491517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48649","23.491805","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48650","23.491814","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48651","23.493710","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48652","23.494110","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48653","23.494116","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48654","23.495454","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48655","23.499260","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48656","23.499271","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48657","23.500216","172.30.1.205","172.30.1.104","TCP","74","47212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926726 TSecr=0 WS=128" +"48658","23.500528","172.30.1.104","172.30.1.205","TCP","66","135 > 47212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48659","23.500538","172.30.1.205","172.30.1.104","TCP","54","47212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48660","23.500915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48661","23.501196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48662","23.501205","172.30.1.205","172.30.1.104","TCP","54","47212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48663","23.503392","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48664","23.503797","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48665","23.503804","172.30.1.205","172.30.1.104","TCP","54","47212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48666","23.505637","172.30.1.205","172.30.1.104","TCP","54","47212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48667","23.505758","172.30.1.205","172.30.1.104","TCP","74","39850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926732 TSecr=0 WS=128" +"48668","23.505906","172.30.1.104","172.30.1.205","TCP","54","135 > 47212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48669","23.505959","172.30.1.104","172.30.1.205","TCP","54","135 > 47212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48670","23.505965","172.30.1.205","172.30.1.104","TCP","54","47212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48671","23.506081","172.30.1.104","172.30.1.205","TCP","66","49671 > 39850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48672","23.506097","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48673","23.506496","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48674","23.506770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48675","23.506780","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48676","23.508698","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48677","23.509096","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48678","23.509103","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48679","23.510489","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48680","23.514318","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48681","23.514329","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48682","23.515305","172.30.1.205","172.30.1.104","TCP","74","47216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926741 TSecr=0 WS=128" +"48683","23.515597","172.30.1.104","172.30.1.205","TCP","66","135 > 47216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48684","23.515608","172.30.1.205","172.30.1.104","TCP","54","47216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48685","23.515963","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48686","23.516248","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48687","23.516257","172.30.1.205","172.30.1.104","TCP","54","47216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48688","23.518500","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48689","23.518915","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48690","23.518922","172.30.1.205","172.30.1.104","TCP","54","47216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48691","23.520732","172.30.1.205","172.30.1.104","TCP","54","47216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48692","23.520871","172.30.1.205","172.30.1.104","TCP","74","39854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926747 TSecr=0 WS=128" +"48693","23.520994","172.30.1.104","172.30.1.205","TCP","54","135 > 47216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48694","23.521005","172.30.1.104","172.30.1.205","TCP","54","135 > 47216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48695","23.521011","172.30.1.205","172.30.1.104","TCP","54","47216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48696","23.521152","172.30.1.104","172.30.1.205","TCP","66","49671 > 39854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48697","23.521161","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48698","23.521517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48699","23.521807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48700","23.521825","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48701","23.523947","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48702","23.524328","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48703","23.524335","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48704","23.525715","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48705","23.529540","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48706","23.529550","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48707","23.530504","172.30.1.205","172.30.1.104","TCP","74","47220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926756 TSecr=0 WS=128" +"48708","23.530855","172.30.1.104","172.30.1.205","TCP","66","135 > 47220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48709","23.530867","172.30.1.205","172.30.1.104","TCP","54","47220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48710","23.531226","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48711","23.531514","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48712","23.531524","172.30.1.205","172.30.1.104","TCP","54","47220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48713","23.533750","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48714","23.534160","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48715","23.534167","172.30.1.205","172.30.1.104","TCP","54","47220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48716","23.536007","172.30.1.205","172.30.1.104","TCP","54","47220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48717","23.536119","172.30.1.205","172.30.1.104","TCP","74","39858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926762 TSecr=0 WS=128" +"48718","23.536257","172.30.1.104","172.30.1.205","TCP","54","135 > 47220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48719","23.536284","172.30.1.104","172.30.1.205","TCP","54","135 > 47220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48720","23.536290","172.30.1.205","172.30.1.104","TCP","54","47220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48721","23.536419","172.30.1.104","172.30.1.205","TCP","66","49671 > 39858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48722","23.536436","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48723","23.537064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48724","23.537339","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48725","23.537346","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48726","23.539215","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48727","23.539577","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48728","23.539584","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48729","23.540962","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48730","23.544752","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48731","23.544763","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48732","23.545741","172.30.1.205","172.30.1.104","TCP","74","47224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926772 TSecr=0 WS=128" +"48733","23.546025","172.30.1.104","172.30.1.205","TCP","66","135 > 47224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48734","23.546036","172.30.1.205","172.30.1.104","TCP","54","47224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48735","23.546400","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48736","23.546680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48737","23.546689","172.30.1.205","172.30.1.104","TCP","54","47224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48738","23.548911","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48739","23.549328","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48740","23.549334","172.30.1.205","172.30.1.104","TCP","54","47224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48741","23.550194","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48742","23.550243","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48743","23.550282","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48744","23.550316","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48745","23.550349","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48746","23.550382","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48747","23.550409","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48748","23.550436","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48749","23.550455","172.30.1.104","172.30.1.205","TCP","54","49671 > 39818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48750","23.550500","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48751","23.550533","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48752","23.550559","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48753","23.550570","172.30.1.104","172.30.1.205","TCP","54","49671 > 39822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48754","23.550589","172.30.1.104","172.30.1.205","TCP","54","49671 > 39818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48755","23.550595","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48756","23.550608","172.30.1.104","172.30.1.205","TCP","54","49671 > 39830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48757","23.550627","172.30.1.104","172.30.1.205","TCP","54","49671 > 39826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48758","23.550686","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48759","23.550720","172.30.1.104","172.30.1.205","TCP","54","49671 > 39826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48760","23.550725","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48761","23.550739","172.30.1.104","172.30.1.205","TCP","54","49671 > 39838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48762","23.550758","172.30.1.104","172.30.1.205","TCP","54","49671 > 39838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48763","23.550761","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48764","23.550778","172.30.1.104","172.30.1.205","TCP","54","49671 > 39834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48765","23.550799","172.30.1.104","172.30.1.205","TCP","54","49671 > 39834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48766","23.550804","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48767","23.550818","172.30.1.104","172.30.1.205","TCP","54","49671 > 39822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48768","23.550821","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48769","23.550846","172.30.1.104","172.30.1.205","TCP","54","49671 > 39830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48770","23.550850","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48771","23.550873","172.30.1.104","172.30.1.205","TCP","54","49671 > 39842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48772","23.551018","172.30.1.104","172.30.1.205","TCP","54","49671 > 39846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48773","23.551037","172.30.1.104","172.30.1.205","TCP","54","49671 > 39850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48774","23.551056","172.30.1.104","172.30.1.205","TCP","54","49671 > 39850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48775","23.551061","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48776","23.551077","172.30.1.104","172.30.1.205","TCP","54","49671 > 39842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48777","23.551079","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48778","23.551100","172.30.1.104","172.30.1.205","TCP","54","49671 > 39846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48779","23.551103","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48780","23.551128","172.30.1.104","172.30.1.205","TCP","54","49671 > 39854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48781","23.551216","172.30.1.104","172.30.1.205","TCP","54","49671 > 39858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48782","23.551234","172.30.1.104","172.30.1.205","TCP","54","49671 > 39854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48783","23.551238","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48784","23.551255","172.30.1.104","172.30.1.205","TCP","54","49671 > 39858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48785","23.551257","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48786","23.551283","172.30.1.104","172.30.1.205","TCP","54","49671 > 39814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48787","23.551348","172.30.1.104","172.30.1.205","TCP","54","49671 > 39814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"48788","23.551351","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"48789","23.552212","172.30.1.205","172.30.1.104","TCP","54","47224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48790","23.552326","172.30.1.205","172.30.1.104","TCP","74","39862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926778 TSecr=0 WS=128" +"48791","23.552471","172.30.1.104","172.30.1.205","TCP","54","135 > 47224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48792","23.552485","172.30.1.104","172.30.1.205","TCP","54","135 > 47224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48793","23.552490","172.30.1.205","172.30.1.104","TCP","54","47224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48794","23.552639","172.30.1.104","172.30.1.205","TCP","66","49671 > 39862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48795","23.552647","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48796","23.553057","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48797","23.553345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48798","23.553354","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48799","23.555226","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48800","23.555612","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48801","23.555619","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48802","23.557004","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48803","23.560719","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48804","23.560729","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48805","23.561713","172.30.1.205","172.30.1.104","TCP","74","47228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926788 TSecr=0 WS=128" +"48806","23.562030","172.30.1.104","172.30.1.205","TCP","66","135 > 47228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48807","23.562041","172.30.1.205","172.30.1.104","TCP","54","47228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48808","23.562393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48809","23.562670","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48810","23.562680","172.30.1.205","172.30.1.104","TCP","54","47228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48811","23.564869","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48812","23.565296","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48813","23.565303","172.30.1.205","172.30.1.104","TCP","54","47228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48814","23.567113","172.30.1.205","172.30.1.104","TCP","54","47228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48815","23.567225","172.30.1.205","172.30.1.104","TCP","74","39866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926793 TSecr=0 WS=128" +"48816","23.567421","172.30.1.104","172.30.1.205","TCP","54","135 > 47228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48817","23.567459","172.30.1.104","172.30.1.205","TCP","54","135 > 47228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48818","23.567465","172.30.1.205","172.30.1.104","TCP","54","47228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48819","23.567591","172.30.1.104","172.30.1.205","TCP","66","49671 > 39866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48820","23.567602","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48821","23.568231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48822","23.568510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48823","23.568519","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48824","23.570435","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48825","23.570789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48826","23.570795","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48827","23.572139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48828","23.577950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48829","23.577969","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48830","23.579074","172.30.1.205","172.30.1.104","TCP","74","47232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926805 TSecr=0 WS=128" +"48831","23.579453","172.30.1.104","172.30.1.205","TCP","66","135 > 47232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48832","23.579465","172.30.1.205","172.30.1.104","TCP","54","47232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48833","23.579823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48834","23.580117","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48835","23.580125","172.30.1.205","172.30.1.104","TCP","54","47232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48836","23.582342","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48837","23.582775","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48838","23.582789","172.30.1.205","172.30.1.104","TCP","54","47232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48839","23.584620","172.30.1.205","172.30.1.104","TCP","54","47232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48840","23.584732","172.30.1.205","172.30.1.104","TCP","74","39870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926811 TSecr=0 WS=128" +"48841","23.584874","172.30.1.104","172.30.1.205","TCP","54","135 > 47232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48842","23.584907","172.30.1.104","172.30.1.205","TCP","54","135 > 47232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48843","23.584913","172.30.1.205","172.30.1.104","TCP","54","47232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48844","23.585007","172.30.1.104","172.30.1.205","TCP","66","49671 > 39870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48845","23.585014","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48846","23.585381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48847","23.586770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48848","23.586780","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48849","23.588667","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48850","23.589030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48851","23.589039","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48852","23.590407","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48853","23.594181","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48854","23.594200","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48855","23.595149","172.30.1.205","172.30.1.104","TCP","74","47236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926821 TSecr=0 WS=128" +"48856","23.595588","172.30.1.104","172.30.1.205","TCP","66","135 > 47236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48857","23.595602","172.30.1.205","172.30.1.104","TCP","54","47236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48858","23.595975","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48859","23.596269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48860","23.596278","172.30.1.205","172.30.1.104","TCP","54","47236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48861","23.598499","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48862","23.598909","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48863","23.598916","172.30.1.205","172.30.1.104","TCP","54","47236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48864","23.600738","172.30.1.205","172.30.1.104","TCP","54","47236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48865","23.600869","172.30.1.205","172.30.1.104","TCP","74","39874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926827 TSecr=0 WS=128" +"48866","23.600987","172.30.1.104","172.30.1.205","TCP","54","135 > 47236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48867","23.600998","172.30.1.104","172.30.1.205","TCP","54","135 > 47236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48868","23.601003","172.30.1.205","172.30.1.104","TCP","54","47236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48869","23.601145","172.30.1.104","172.30.1.205","TCP","66","49671 > 39874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48870","23.601153","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48871","23.601500","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48872","23.601799","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48873","23.601808","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48874","23.603703","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48875","23.604067","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48876","23.604073","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48877","23.605460","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48878","23.609255","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48879","23.609266","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48880","23.610235","172.30.1.205","172.30.1.104","TCP","74","47240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926836 TSecr=0 WS=128" +"48881","23.610545","172.30.1.104","172.30.1.205","TCP","66","135 > 47240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48882","23.610555","172.30.1.205","172.30.1.104","TCP","54","47240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48883","23.610912","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48884","23.611200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48885","23.611209","172.30.1.205","172.30.1.104","TCP","54","47240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48886","23.613435","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48887","23.613830","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48888","23.613837","172.30.1.205","172.30.1.104","TCP","54","47240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48889","23.615664","172.30.1.205","172.30.1.104","TCP","54","47240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48890","23.615776","172.30.1.205","172.30.1.104","TCP","74","39878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926842 TSecr=0 WS=128" +"48891","23.615943","172.30.1.104","172.30.1.205","TCP","54","135 > 47240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48892","23.615978","172.30.1.104","172.30.1.205","TCP","54","135 > 47240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48893","23.615983","172.30.1.205","172.30.1.104","TCP","54","47240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48894","23.616064","172.30.1.104","172.30.1.205","TCP","66","49671 > 39878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48895","23.616073","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48896","23.616419","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48897","23.616700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48898","23.616709","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48899","23.618614","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48900","23.619019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48901","23.619025","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48902","23.620378","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48903","23.624142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48904","23.624154","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48905","23.625153","172.30.1.205","172.30.1.104","TCP","74","47244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926851 TSecr=0 WS=128" +"48906","23.625478","172.30.1.104","172.30.1.205","TCP","66","135 > 47244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48907","23.625489","172.30.1.205","172.30.1.104","TCP","54","47244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48908","23.625854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48909","23.626161","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48910","23.626170","172.30.1.205","172.30.1.104","TCP","54","47244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48911","23.628373","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48912","23.628791","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48913","23.628798","172.30.1.205","172.30.1.104","TCP","54","47244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48914","23.630632","172.30.1.205","172.30.1.104","TCP","54","47244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48915","23.630745","172.30.1.205","172.30.1.104","TCP","74","39882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926857 TSecr=0 WS=128" +"48916","23.630891","172.30.1.104","172.30.1.205","TCP","54","135 > 47244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48917","23.630903","172.30.1.104","172.30.1.205","TCP","54","135 > 47244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48918","23.630909","172.30.1.205","172.30.1.104","TCP","54","47244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48919","23.631042","172.30.1.104","172.30.1.205","TCP","66","49671 > 39882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48920","23.631050","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48921","23.631404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48922","23.635086","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48923","23.635096","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48924","23.637098","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48925","23.637490","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48926","23.637496","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48927","23.638872","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48928","23.647484","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48929","23.647495","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48930","23.648489","172.30.1.205","172.30.1.104","TCP","74","47248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926874 TSecr=0 WS=128" +"48931","23.648883","172.30.1.104","172.30.1.205","TCP","66","135 > 47248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48932","23.648896","172.30.1.205","172.30.1.104","TCP","54","47248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48933","23.649253","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48934","23.649572","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48935","23.649581","172.30.1.205","172.30.1.104","TCP","54","47248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48936","23.651786","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48937","23.652208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48938","23.652215","172.30.1.205","172.30.1.104","TCP","54","47248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48939","23.654058","172.30.1.205","172.30.1.104","TCP","54","47248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48940","23.654177","172.30.1.205","172.30.1.104","TCP","74","39886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926880 TSecr=0 WS=128" +"48941","23.654324","172.30.1.104","172.30.1.205","TCP","54","135 > 47248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48942","23.654333","172.30.1.104","172.30.1.205","TCP","54","135 > 47248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48943","23.654339","172.30.1.205","172.30.1.104","TCP","54","47248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48944","23.654451","172.30.1.104","172.30.1.205","TCP","66","49671 > 39886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48945","23.654460","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48946","23.654807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48947","23.655130","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48948","23.655138","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48949","23.657066","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48950","23.658402","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48951","23.658408","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48952","23.659765","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48953","23.664549","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48954","23.664560","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48955","23.665541","172.30.1.205","172.30.1.104","TCP","74","47252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926891 TSecr=0 WS=128" +"48956","23.665874","172.30.1.104","172.30.1.205","TCP","66","135 > 47252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48957","23.665886","172.30.1.205","172.30.1.104","TCP","54","47252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48958","23.666250","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48959","23.666562","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48960","23.666571","172.30.1.205","172.30.1.104","TCP","54","47252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48961","23.668772","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48962","23.669208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48963","23.669214","172.30.1.205","172.30.1.104","TCP","54","47252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48964","23.671019","172.30.1.205","172.30.1.104","TCP","54","47252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48965","23.671131","172.30.1.205","172.30.1.104","TCP","74","39890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926897 TSecr=0 WS=128" +"48966","23.671330","172.30.1.104","172.30.1.205","TCP","54","135 > 47252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48967","23.671390","172.30.1.104","172.30.1.205","TCP","54","135 > 47252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48968","23.671396","172.30.1.205","172.30.1.104","TCP","54","47252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48969","23.671496","172.30.1.104","172.30.1.205","TCP","66","49671 > 39890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48970","23.671507","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48971","23.671874","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48972","23.674751","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48973","23.674772","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48974","23.676804","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"48975","23.677193","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"48976","23.677200","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"48977","23.678559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"48978","23.682303","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"48979","23.682316","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"48980","23.683334","172.30.1.205","172.30.1.104","TCP","74","47256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926909 TSecr=0 WS=128" +"48981","23.683654","172.30.1.104","172.30.1.205","TCP","66","135 > 47256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48982","23.683666","172.30.1.205","172.30.1.104","TCP","54","47256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48983","23.684024","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"48984","23.684375","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48985","23.684385","172.30.1.205","172.30.1.104","TCP","54","47256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48986","23.686606","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"48987","23.687017","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"48988","23.687024","172.30.1.205","172.30.1.104","TCP","54","47256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48989","23.688844","172.30.1.205","172.30.1.104","TCP","54","47256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"48990","23.688952","172.30.1.205","172.30.1.104","TCP","74","39894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926915 TSecr=0 WS=128" +"48991","23.689130","172.30.1.104","172.30.1.205","TCP","54","135 > 47256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48992","23.689137","172.30.1.104","172.30.1.205","TCP","54","135 > 47256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"48993","23.689142","172.30.1.205","172.30.1.104","TCP","54","47256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"48994","23.689224","172.30.1.104","172.30.1.205","TCP","66","49671 > 39894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"48995","23.689232","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"48996","23.689574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"48997","23.689864","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"48998","23.689872","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"48999","23.691725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49000","23.692084","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49001","23.692090","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49002","23.693454","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49003","23.697227","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49004","23.697257","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49005","23.698204","172.30.1.205","172.30.1.104","TCP","74","47260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926924 TSecr=0 WS=128" +"49006","23.698503","172.30.1.104","172.30.1.205","TCP","66","135 > 47260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49007","23.698514","172.30.1.205","172.30.1.104","TCP","54","47260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49008","23.698866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49009","23.699146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49010","23.699155","172.30.1.205","172.30.1.104","TCP","54","47260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49011","23.701354","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49012","23.701769","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49013","23.701775","172.30.1.205","172.30.1.104","TCP","54","47260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49014","23.703580","172.30.1.205","172.30.1.104","TCP","54","47260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49015","23.703689","172.30.1.205","172.30.1.104","TCP","74","39898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926930 TSecr=0 WS=128" +"49016","23.703856","172.30.1.104","172.30.1.205","TCP","54","135 > 47260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49017","23.703867","172.30.1.104","172.30.1.205","TCP","54","135 > 47260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49018","23.703873","172.30.1.205","172.30.1.104","TCP","54","47260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49019","23.703950","172.30.1.104","172.30.1.205","TCP","66","49671 > 39898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49020","23.703958","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49021","23.704299","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49022","23.704592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49023","23.704601","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49024","23.706491","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49025","23.706856","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49026","23.706862","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49027","23.708195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49028","23.712021","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49029","23.712031","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49030","23.712994","172.30.1.205","172.30.1.104","TCP","74","47264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926939 TSecr=0 WS=128" +"49031","23.713380","172.30.1.104","172.30.1.205","TCP","66","135 > 47264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49032","23.713391","172.30.1.205","172.30.1.104","TCP","54","47264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49033","23.713748","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49034","23.714099","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49035","23.714108","172.30.1.205","172.30.1.104","TCP","54","47264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49036","23.716280","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49037","23.716695","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49038","23.716701","172.30.1.205","172.30.1.104","TCP","54","47264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49039","23.718517","172.30.1.205","172.30.1.104","TCP","54","47264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49040","23.718627","172.30.1.205","172.30.1.104","TCP","74","39902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926945 TSecr=0 WS=128" +"49041","23.718837","172.30.1.104","172.30.1.205","TCP","54","135 > 47264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49042","23.718872","172.30.1.104","172.30.1.205","TCP","54","135 > 47264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49043","23.718878","172.30.1.205","172.30.1.104","TCP","54","47264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49044","23.718977","172.30.1.104","172.30.1.205","TCP","66","49671 > 39902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49045","23.718985","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49046","23.719332","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49047","23.719625","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49048","23.719634","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49049","23.721545","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49050","23.722006","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49051","23.722012","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49052","23.723348","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49053","23.727087","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49054","23.727098","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49055","23.728037","172.30.1.205","172.30.1.104","TCP","74","47268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926954 TSecr=0 WS=128" +"49056","23.728354","172.30.1.104","172.30.1.205","TCP","66","135 > 47268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49057","23.728374","172.30.1.205","172.30.1.104","TCP","54","47268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49058","23.728909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49059","23.729266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49060","23.729275","172.30.1.205","172.30.1.104","TCP","54","47268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49061","23.731448","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49062","23.731953","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49063","23.731960","172.30.1.205","172.30.1.104","TCP","54","47268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49064","23.733770","172.30.1.205","172.30.1.104","TCP","54","47268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49065","23.733878","172.30.1.205","172.30.1.104","TCP","74","39906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926960 TSecr=0 WS=128" +"49066","23.734048","172.30.1.104","172.30.1.205","TCP","54","135 > 47268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49067","23.734090","172.30.1.104","172.30.1.205","TCP","54","135 > 47268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49068","23.734101","172.30.1.205","172.30.1.104","TCP","54","47268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49069","23.734168","172.30.1.104","172.30.1.205","TCP","66","49671 > 39906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49070","23.734181","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49071","23.734603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49072","23.735606","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49073","23.735616","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49074","23.737539","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49075","23.737919","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49076","23.737926","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49077","23.739277","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49078","23.743067","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49079","23.743078","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49080","23.744038","172.30.1.205","172.30.1.104","TCP","74","47272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926970 TSecr=0 WS=128" +"49081","23.744379","172.30.1.104","172.30.1.205","TCP","66","135 > 47272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49082","23.744392","172.30.1.205","172.30.1.104","TCP","54","47272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49083","23.744762","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49084","23.745095","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49085","23.745105","172.30.1.205","172.30.1.104","TCP","54","47272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49086","23.747307","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49087","23.747773","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49088","23.747779","172.30.1.205","172.30.1.104","TCP","54","47272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49089","23.748628","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49090","23.748681","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49091","23.748715","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49092","23.748741","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49093","23.748769","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49094","23.748822","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49095","23.748851","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49096","23.748875","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49097","23.748902","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49098","23.748924","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49099","23.748945","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49100","23.748966","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49101","23.748979","172.30.1.104","172.30.1.205","TCP","54","49671 > 39862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49102","23.749032","172.30.1.104","172.30.1.205","TCP","54","49671 > 39862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49103","23.749039","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49104","23.749043","172.30.1.104","172.30.1.205","TCP","54","49671 > 39866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49105","23.749066","172.30.1.104","172.30.1.205","TCP","54","49671 > 39870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49106","23.749087","172.30.1.104","172.30.1.205","TCP","54","49671 > 39866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49107","23.749091","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49108","23.749108","172.30.1.104","172.30.1.205","TCP","54","49671 > 39870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49109","23.749114","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49110","23.749335","172.30.1.104","172.30.1.205","TCP","54","49671 > 39874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49111","23.749351","172.30.1.104","172.30.1.205","TCP","54","49671 > 39878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49112","23.749372","172.30.1.104","172.30.1.205","TCP","54","49671 > 39874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49113","23.749378","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49114","23.749391","172.30.1.104","172.30.1.205","TCP","54","49671 > 39878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49115","23.749393","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49116","23.749411","172.30.1.104","172.30.1.205","TCP","54","49671 > 39882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49117","23.749432","172.30.1.104","172.30.1.205","TCP","54","49671 > 39882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49118","23.749435","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49119","23.749519","172.30.1.104","172.30.1.205","TCP","54","49671 > 39886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49120","23.749537","172.30.1.104","172.30.1.205","TCP","54","49671 > 39890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49121","23.749557","172.30.1.104","172.30.1.205","TCP","54","49671 > 39894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49122","23.749586","172.30.1.104","172.30.1.205","TCP","54","49671 > 39898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49123","23.749611","172.30.1.104","172.30.1.205","TCP","54","49671 > 39902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49124","23.749667","172.30.1.104","172.30.1.205","TCP","54","49671 > 39906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49125","23.749687","172.30.1.104","172.30.1.205","TCP","54","49671 > 39902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49126","23.749692","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49127","23.749708","172.30.1.104","172.30.1.205","TCP","54","49671 > 39898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49128","23.749711","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49129","23.749730","172.30.1.104","172.30.1.205","TCP","54","49671 > 39886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49130","23.749732","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49131","23.749750","172.30.1.104","172.30.1.205","TCP","54","49671 > 39906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49132","23.749752","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49133","23.749770","172.30.1.104","172.30.1.205","TCP","54","49671 > 39890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49134","23.749773","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49135","23.749791","172.30.1.104","172.30.1.205","TCP","54","49671 > 39894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49136","23.749794","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49137","23.750607","172.30.1.205","172.30.1.104","TCP","54","47272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49138","23.750719","172.30.1.205","172.30.1.104","TCP","74","39910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926977 TSecr=0 WS=128" +"49139","23.750907","172.30.1.104","172.30.1.205","TCP","54","135 > 47272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49140","23.750928","172.30.1.104","172.30.1.205","TCP","54","135 > 47272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49141","23.750933","172.30.1.205","172.30.1.104","TCP","54","47272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49142","23.751004","172.30.1.104","172.30.1.205","TCP","66","49671 > 39910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49143","23.751012","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49144","23.751368","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49145","23.751651","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49146","23.751661","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49147","23.753614","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49148","23.754032","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49149","23.754038","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49150","23.755390","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49151","23.759153","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49152","23.759162","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49153","23.760116","172.30.1.205","172.30.1.104","TCP","74","47276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926986 TSecr=0 WS=128" +"49154","23.760436","172.30.1.104","172.30.1.205","TCP","66","135 > 47276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49155","23.760447","172.30.1.205","172.30.1.104","TCP","54","47276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49156","23.760831","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49157","23.761112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49158","23.761121","172.30.1.205","172.30.1.104","TCP","54","47276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49159","23.763298","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49160","23.763727","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49161","23.763734","172.30.1.205","172.30.1.104","TCP","54","47276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49162","23.765577","172.30.1.205","172.30.1.104","TCP","54","47276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49163","23.765688","172.30.1.205","172.30.1.104","TCP","74","39914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926992 TSecr=0 WS=128" +"49164","23.765827","172.30.1.104","172.30.1.205","TCP","54","135 > 47276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49165","23.765842","172.30.1.104","172.30.1.205","TCP","54","135 > 47276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49166","23.765847","172.30.1.205","172.30.1.104","TCP","54","47276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49167","23.765955","172.30.1.104","172.30.1.205","TCP","66","49671 > 39914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49168","23.765964","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49169","23.766308","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49170","23.766597","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49171","23.766606","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49172","23.768481","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49173","23.768897","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49174","23.768903","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49175","23.770265","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49176","23.774066","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49177","23.774076","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49178","23.775020","172.30.1.205","172.30.1.104","TCP","74","47280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927001 TSecr=0 WS=128" +"49179","23.775375","172.30.1.104","172.30.1.205","TCP","66","135 > 47280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49180","23.775386","172.30.1.205","172.30.1.104","TCP","54","47280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49181","23.775733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49182","23.776068","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49183","23.776085","172.30.1.205","172.30.1.104","TCP","54","47280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49184","23.778517","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49185","23.778990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49186","23.778997","172.30.1.205","172.30.1.104","TCP","54","47280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49187","23.780844","172.30.1.205","172.30.1.104","TCP","54","47280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49188","23.780953","172.30.1.205","172.30.1.104","TCP","74","39918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927007 TSecr=0 WS=128" +"49189","23.781146","172.30.1.104","172.30.1.205","TCP","54","135 > 47280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49190","23.781186","172.30.1.104","172.30.1.205","TCP","54","135 > 47280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49191","23.781196","172.30.1.205","172.30.1.104","TCP","54","47280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49192","23.781291","172.30.1.104","172.30.1.205","TCP","66","49671 > 39918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49193","23.781303","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49194","23.781716","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49195","23.783696","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49196","23.783705","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49197","23.785617","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49198","23.786021","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49199","23.786028","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49200","23.787386","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49201","23.791149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49202","23.791159","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49203","23.792113","172.30.1.205","172.30.1.104","TCP","74","47284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927018 TSecr=0 WS=128" +"49204","23.792438","172.30.1.104","172.30.1.205","TCP","66","135 > 47284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49205","23.792461","172.30.1.205","172.30.1.104","TCP","54","47284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49206","23.793046","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49207","23.793440","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49208","23.793454","172.30.1.205","172.30.1.104","TCP","54","47284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49209","23.795640","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49210","23.796093","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49211","23.796100","172.30.1.205","172.30.1.104","TCP","54","47284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49212","23.797967","172.30.1.205","172.30.1.104","TCP","54","47284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49213","23.798080","172.30.1.205","172.30.1.104","TCP","74","39922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927024 TSecr=0 WS=128" +"49214","23.798227","172.30.1.104","172.30.1.205","TCP","54","135 > 47284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49215","23.798251","172.30.1.104","172.30.1.205","TCP","54","135 > 47284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49216","23.798256","172.30.1.205","172.30.1.104","TCP","54","47284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49217","23.798360","172.30.1.104","172.30.1.205","TCP","66","49671 > 39922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49218","23.798369","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49219","23.798715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49220","23.799094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49221","23.799101","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49222","23.801028","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49223","23.801406","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49224","23.801413","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49225","23.802766","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49226","23.806534","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49227","23.806545","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49228","23.807501","172.30.1.205","172.30.1.104","TCP","74","47288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927033 TSecr=0 WS=128" +"49229","23.807823","172.30.1.104","172.30.1.205","TCP","66","135 > 47288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49230","23.807833","172.30.1.205","172.30.1.104","TCP","54","47288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49231","23.808180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49232","23.808463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49233","23.808472","172.30.1.205","172.30.1.104","TCP","54","47288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49234","23.810666","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49235","23.811101","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49236","23.811108","172.30.1.205","172.30.1.104","TCP","54","47288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49237","23.812942","172.30.1.205","172.30.1.104","TCP","54","47288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49238","23.813050","172.30.1.205","172.30.1.104","TCP","74","39926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927039 TSecr=0 WS=128" +"49239","23.813198","172.30.1.104","172.30.1.205","TCP","54","135 > 47288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49240","23.813209","172.30.1.104","172.30.1.205","TCP","54","135 > 47288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49241","23.813215","172.30.1.205","172.30.1.104","TCP","54","47288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49242","23.813368","172.30.1.104","172.30.1.205","TCP","66","49671 > 39926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49243","23.813376","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49244","23.813719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49245","23.814010","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49246","23.814018","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49247","23.815883","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49248","23.816298","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49249","23.816304","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49250","23.817675","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49251","23.821360","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49252","23.821370","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49253","23.822303","172.30.1.205","172.30.1.104","TCP","74","47292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927048 TSecr=0 WS=128" +"49254","23.822627","172.30.1.104","172.30.1.205","TCP","66","135 > 47292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49255","23.822638","172.30.1.205","172.30.1.104","TCP","54","47292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49256","23.822986","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49257","23.823282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49258","23.823291","172.30.1.205","172.30.1.104","TCP","54","47292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49259","23.825501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49260","23.825919","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49261","23.825926","172.30.1.205","172.30.1.104","TCP","54","47292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49262","23.827747","172.30.1.205","172.30.1.104","TCP","54","47292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49263","23.827860","172.30.1.205","172.30.1.104","TCP","74","39930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927054 TSecr=0 WS=128" +"49264","23.828045","172.30.1.104","172.30.1.205","TCP","54","135 > 47292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49265","23.828082","172.30.1.104","172.30.1.205","TCP","54","135 > 47292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49266","23.828088","172.30.1.205","172.30.1.104","TCP","54","47292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49267","23.828161","172.30.1.104","172.30.1.205","TCP","66","49671 > 39930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49268","23.828170","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49269","23.828514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49270","23.828835","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49271","23.828844","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49272","23.830744","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49273","23.831117","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49274","23.831123","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49275","23.832481","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49276","23.836169","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49277","23.836180","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49278","23.837165","172.30.1.205","172.30.1.104","TCP","74","47296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927063 TSecr=0 WS=128" +"49279","23.837488","172.30.1.104","172.30.1.205","TCP","66","135 > 47296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49280","23.837500","172.30.1.205","172.30.1.104","TCP","54","47296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49281","23.837857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49282","23.838987","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49283","23.838996","172.30.1.205","172.30.1.104","TCP","54","47296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49284","23.841207","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49285","23.841625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49286","23.841632","172.30.1.205","172.30.1.104","TCP","54","47296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49287","23.843468","172.30.1.205","172.30.1.104","TCP","54","47296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49288","23.843578","172.30.1.205","172.30.1.104","TCP","74","39934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927070 TSecr=0 WS=128" +"49289","23.843725","172.30.1.104","172.30.1.205","TCP","54","135 > 47296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49290","23.843841","172.30.1.104","172.30.1.205","TCP","66","49671 > 39934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49291","23.843851","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49292","23.844193","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49293","23.844312","172.30.1.104","172.30.1.205","TCP","54","135 > 47296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49294","23.844319","172.30.1.205","172.30.1.104","TCP","54","47296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49295","23.844464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49296","23.844472","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49297","23.846364","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49298","23.846735","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49299","23.846741","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49300","23.848095","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49301","23.852010","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49302","23.852021","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49303","23.853009","172.30.1.205","172.30.1.104","TCP","74","47300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927079 TSecr=0 WS=128" +"49304","23.853295","172.30.1.104","172.30.1.205","TCP","66","135 > 47300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49305","23.853306","172.30.1.205","172.30.1.104","TCP","54","47300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49306","23.853659","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49307","23.853960","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49308","23.853969","172.30.1.205","172.30.1.104","TCP","54","47300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49309","23.856158","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49310","23.856600","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49311","23.856607","172.30.1.205","172.30.1.104","TCP","54","47300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49312","23.858421","172.30.1.205","172.30.1.104","TCP","54","47300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49313","23.858533","172.30.1.205","172.30.1.104","TCP","74","39938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927084 TSecr=0 WS=128" +"49314","23.858701","172.30.1.104","172.30.1.205","TCP","54","135 > 47300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49315","23.858711","172.30.1.104","172.30.1.205","TCP","54","135 > 47300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49316","23.858717","172.30.1.205","172.30.1.104","TCP","54","47300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49317","23.858828","172.30.1.104","172.30.1.205","TCP","66","49671 > 39938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49318","23.858836","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49319","23.859180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49320","23.859460","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49321","23.859467","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49322","23.861370","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49323","23.861732","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49324","23.861738","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49325","23.863085","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49326","23.866664","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49327","23.866674","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49328","23.867614","172.30.1.205","172.30.1.104","TCP","74","47304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927094 TSecr=0 WS=128" +"49329","23.867952","172.30.1.104","172.30.1.205","TCP","66","135 > 47304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49330","23.867973","172.30.1.205","172.30.1.104","TCP","54","47304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49331","23.868329","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49332","23.868650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49333","23.868659","172.30.1.205","172.30.1.104","TCP","54","47304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49334","23.870880","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49335","23.871262","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49336","23.871269","172.30.1.205","172.30.1.104","TCP","54","47304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49337","23.873100","172.30.1.205","172.30.1.104","TCP","54","47304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49338","23.873208","172.30.1.205","172.30.1.104","TCP","74","39942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927099 TSecr=0 WS=128" +"49339","23.873359","172.30.1.104","172.30.1.205","TCP","54","135 > 47304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49340","23.873370","172.30.1.104","172.30.1.205","TCP","54","135 > 47304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49341","23.873375","172.30.1.205","172.30.1.104","TCP","54","47304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49342","23.873484","172.30.1.104","172.30.1.205","TCP","66","49671 > 39942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49343","23.873492","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49344","23.873835","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49345","23.874105","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49346","23.874114","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49347","23.875982","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49348","23.876377","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49349","23.876383","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49350","23.877744","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49351","23.882617","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49352","23.882629","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49353","23.883602","172.30.1.205","172.30.1.104","TCP","74","47308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927110 TSecr=0 WS=128" +"49354","23.883978","172.30.1.104","172.30.1.205","TCP","66","135 > 47308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49355","23.883989","172.30.1.205","172.30.1.104","TCP","54","47308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49356","23.884345","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49357","23.884717","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49358","23.884725","172.30.1.205","172.30.1.104","TCP","54","47308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49359","23.886915","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49360","23.887340","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49361","23.887347","172.30.1.205","172.30.1.104","TCP","54","47308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49362","23.889215","172.30.1.205","172.30.1.104","TCP","54","47308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49363","23.889324","172.30.1.205","172.30.1.104","TCP","74","39946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927115 TSecr=0 WS=128" +"49364","23.889502","172.30.1.104","172.30.1.205","TCP","54","135 > 47308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49365","23.889543","172.30.1.104","172.30.1.205","TCP","54","135 > 47308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49366","23.889549","172.30.1.205","172.30.1.104","TCP","54","47308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49367","23.889629","172.30.1.104","172.30.1.205","TCP","66","49671 > 39946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49368","23.889637","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49369","23.889983","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49370","23.890278","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49371","23.890285","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49372","23.892163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49373","23.892533","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49374","23.892539","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49375","23.893898","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49376","23.897631","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49377","23.897640","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49378","23.898581","172.30.1.205","172.30.1.104","TCP","74","47312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927125 TSecr=0 WS=128" +"49379","23.898991","172.30.1.104","172.30.1.205","TCP","66","135 > 47312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49380","23.899002","172.30.1.205","172.30.1.104","TCP","54","47312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49381","23.899357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49382","23.899674","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49383","23.899683","172.30.1.205","172.30.1.104","TCP","54","47312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49384","23.901888","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49385","23.902312","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49386","23.902318","172.30.1.205","172.30.1.104","TCP","54","47312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49387","23.904114","172.30.1.205","172.30.1.104","TCP","54","47312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49388","23.904227","172.30.1.205","172.30.1.104","TCP","74","39950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927130 TSecr=0 WS=128" +"49389","23.904395","172.30.1.104","172.30.1.205","TCP","54","135 > 47312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49390","23.904404","172.30.1.104","172.30.1.205","TCP","54","135 > 47312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49391","23.904409","172.30.1.205","172.30.1.104","TCP","54","47312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49392","23.904586","172.30.1.104","172.30.1.205","TCP","66","49671 > 39950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49393","23.904594","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49394","23.904969","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49395","23.905302","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49396","23.905310","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49397","23.907172","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49398","23.907568","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49399","23.907575","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49400","23.908980","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49401","23.913142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49402","23.913151","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49403","23.914099","172.30.1.205","172.30.1.104","TCP","74","47316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927140 TSecr=0 WS=128" +"49404","23.914408","172.30.1.104","172.30.1.205","TCP","66","135 > 47316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49405","23.914419","172.30.1.205","172.30.1.104","TCP","54","47316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49406","23.914773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49407","23.915083","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49408","23.915092","172.30.1.205","172.30.1.104","TCP","54","47316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49409","23.917294","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49410","23.918332","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49411","23.918338","172.30.1.205","172.30.1.104","TCP","54","47316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49412","23.920155","172.30.1.205","172.30.1.104","TCP","54","47316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49413","23.920270","172.30.1.205","172.30.1.104","TCP","74","39954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927146 TSecr=0 WS=128" +"49414","23.920428","172.30.1.104","172.30.1.205","TCP","54","135 > 47316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49415","23.920459","172.30.1.104","172.30.1.205","TCP","54","135 > 47316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49416","23.920465","172.30.1.205","172.30.1.104","TCP","54","47316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49417","23.920563","172.30.1.104","172.30.1.205","TCP","66","49671 > 39954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49418","23.920572","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49419","23.920950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49420","23.921259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49421","23.921266","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49422","23.923125","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49423","23.923507","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49424","23.923513","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49425","23.924873","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49426","23.928643","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49427","23.928661","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49428","23.929722","172.30.1.205","172.30.1.104","TCP","74","47320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927156 TSecr=0 WS=128" +"49429","23.930075","172.30.1.104","172.30.1.205","TCP","66","135 > 47320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49430","23.930086","172.30.1.205","172.30.1.104","TCP","54","47320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49431","23.930447","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49432","23.930747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49433","23.930756","172.30.1.205","172.30.1.104","TCP","54","47320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49434","23.932970","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49435","23.933438","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49436","23.933444","172.30.1.205","172.30.1.104","TCP","54","47320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49437","23.934296","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49438","23.934343","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49439","23.934380","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49440","23.934412","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49441","23.934440","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49442","23.934467","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49443","23.934494","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49444","23.934525","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49445","23.934547","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49446","23.934572","172.30.1.104","172.30.1.205","TCP","54","49671 > 39914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49447","23.934595","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49448","23.934607","172.30.1.104","172.30.1.205","TCP","54","49671 > 39918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49449","23.934637","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49450","23.934710","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49451","23.934980","172.30.1.104","172.30.1.205","TCP","54","49671 > 39914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49452","23.934988","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49453","23.934996","172.30.1.104","172.30.1.205","TCP","54","49671 > 39922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49454","23.935012","172.30.1.104","172.30.1.205","TCP","54","49671 > 39918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49455","23.935016","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49456","23.935017","172.30.1.104","172.30.1.205","TCP","54","49671 > 39922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49457","23.935019","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49458","23.935038","172.30.1.104","172.30.1.205","TCP","54","49671 > 39926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49459","23.935073","172.30.1.104","172.30.1.205","TCP","54","49671 > 39926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49460","23.935078","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49461","23.935118","172.30.1.104","172.30.1.205","TCP","54","49671 > 39930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49462","23.935124","172.30.1.104","172.30.1.205","TCP","54","49671 > 39930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49463","23.935127","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49464","23.935149","172.30.1.104","172.30.1.205","TCP","54","49671 > 39934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49465","23.935174","172.30.1.104","172.30.1.205","TCP","54","49671 > 39938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49466","23.935206","172.30.1.104","172.30.1.205","TCP","54","49671 > 39934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49467","23.935209","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49468","23.935227","172.30.1.104","172.30.1.205","TCP","54","49671 > 39942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49469","23.935248","172.30.1.104","172.30.1.205","TCP","54","49671 > 39938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49470","23.935252","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49471","23.935268","172.30.1.104","172.30.1.205","TCP","54","49671 > 39946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49472","23.935296","172.30.1.104","172.30.1.205","TCP","54","49671 > 39942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49473","23.935300","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49474","23.935317","172.30.1.104","172.30.1.205","TCP","54","49671 > 39910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49475","23.935321","172.30.1.104","172.30.1.205","TCP","54","49671 > 39950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49476","23.935336","172.30.1.104","172.30.1.205","TCP","54","49671 > 39954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49477","23.935353","172.30.1.104","172.30.1.205","TCP","54","49671 > 39910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49478","23.935357","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49479","23.935359","172.30.1.104","172.30.1.205","TCP","54","49671 > 39954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49480","23.935361","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49481","23.935376","172.30.1.104","172.30.1.205","TCP","54","49671 > 39946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49482","23.935379","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49483","23.935395","172.30.1.104","172.30.1.205","TCP","54","49671 > 39950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49484","23.935398","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49485","23.936207","172.30.1.205","172.30.1.104","TCP","54","47320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49486","23.936317","172.30.1.205","172.30.1.104","TCP","74","39958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927162 TSecr=0 WS=128" +"49487","23.936457","172.30.1.104","172.30.1.205","TCP","54","135 > 47320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49488","23.936478","172.30.1.104","172.30.1.205","TCP","54","135 > 47320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49489","23.936483","172.30.1.205","172.30.1.104","TCP","54","47320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49490","23.936591","172.30.1.104","172.30.1.205","TCP","66","49671 > 39958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49491","23.936599","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49492","23.936994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49493","23.937277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49494","23.937285","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49495","23.939146","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49496","23.939610","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49497","23.939616","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49498","23.940995","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49499","23.944806","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49500","23.944816","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49501","23.945756","172.30.1.205","172.30.1.104","TCP","74","47324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927172 TSecr=0 WS=128" +"49502","23.946043","172.30.1.104","172.30.1.205","TCP","66","135 > 47324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49503","23.946054","172.30.1.205","172.30.1.104","TCP","54","47324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49504","23.946405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49505","23.946732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49506","23.946742","172.30.1.205","172.30.1.104","TCP","54","47324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49507","23.948930","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49508","23.949339","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49509","23.949346","172.30.1.205","172.30.1.104","TCP","54","47324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49510","23.951149","172.30.1.205","172.30.1.104","TCP","54","47324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49511","23.951258","172.30.1.205","172.30.1.104","TCP","74","39962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927177 TSecr=0 WS=128" +"49512","23.951393","172.30.1.104","172.30.1.205","TCP","54","135 > 47324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49513","23.951407","172.30.1.104","172.30.1.205","TCP","54","135 > 47324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49514","23.951412","172.30.1.205","172.30.1.104","TCP","54","47324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49515","23.951533","172.30.1.104","172.30.1.205","TCP","66","49671 > 39962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49516","23.951542","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49517","23.951881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49518","23.952160","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49519","23.952167","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49520","23.954059","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49521","23.954419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49522","23.954425","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49523","23.955765","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49524","23.959594","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49525","23.959609","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49526","23.960654","172.30.1.205","172.30.1.104","TCP","74","47328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927187 TSecr=0 WS=128" +"49527","23.961032","172.30.1.104","172.30.1.205","TCP","66","135 > 47328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49528","23.961044","172.30.1.205","172.30.1.104","TCP","54","47328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49529","23.961404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49530","23.961700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49531","23.961710","172.30.1.205","172.30.1.104","TCP","54","47328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49532","23.963932","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49533","23.964372","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49534","23.964379","172.30.1.205","172.30.1.104","TCP","54","47328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49535","23.966239","172.30.1.205","172.30.1.104","TCP","54","47328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49536","23.966353","172.30.1.205","172.30.1.104","TCP","74","39966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927192 TSecr=0 WS=128" +"49537","23.966509","172.30.1.104","172.30.1.205","TCP","54","135 > 47328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49538","23.966553","172.30.1.104","172.30.1.205","TCP","54","135 > 47328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49539","23.966559","172.30.1.205","172.30.1.104","TCP","54","47328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49540","23.966682","172.30.1.104","172.30.1.205","TCP","66","49671 > 39966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49541","23.966691","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49542","23.967039","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49543","23.967357","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49544","23.967366","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49545","23.969277","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49546","23.969680","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49547","23.969685","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49548","23.971039","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49549","23.974843","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49550","23.974853","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49551","23.975800","172.30.1.205","172.30.1.104","TCP","74","47332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927202 TSecr=0 WS=128" +"49552","23.976117","172.30.1.104","172.30.1.205","TCP","66","135 > 47332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49553","23.976128","172.30.1.205","172.30.1.104","TCP","54","47332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49554","23.976479","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49555","23.976791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49556","23.976801","172.30.1.205","172.30.1.104","TCP","54","47332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49557","23.979004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49558","23.979405","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49559","23.979411","172.30.1.205","172.30.1.104","TCP","54","47332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49560","23.981251","172.30.1.205","172.30.1.104","TCP","54","47332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49561","23.981362","172.30.1.205","172.30.1.104","TCP","74","39970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927207 TSecr=0 WS=128" +"49562","23.981515","172.30.1.104","172.30.1.205","TCP","54","135 > 47332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49563","23.981554","172.30.1.104","172.30.1.205","TCP","54","135 > 47332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49564","23.981560","172.30.1.205","172.30.1.104","TCP","54","47332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49565","23.981642","172.30.1.104","172.30.1.205","TCP","66","49671 > 39970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49566","23.981651","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49567","23.982005","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49568","23.982301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49569","23.982312","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49570","23.984228","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49571","23.984627","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49572","23.984640","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49573","23.986108","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49574","23.989890","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49575","23.989900","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49576","23.990857","172.30.1.205","172.30.1.104","TCP","74","47336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927217 TSecr=0 WS=128" +"49577","23.991219","172.30.1.104","172.30.1.205","TCP","66","135 > 47336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49578","23.991230","172.30.1.205","172.30.1.104","TCP","54","47336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49579","23.991581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49580","23.991869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49581","23.991878","172.30.1.205","172.30.1.104","TCP","54","47336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49582","23.994087","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49583","23.994469","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49584","23.994475","172.30.1.205","172.30.1.104","TCP","54","47336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49585","23.996291","172.30.1.205","172.30.1.104","TCP","54","47336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49586","23.996401","172.30.1.205","172.30.1.104","TCP","74","39974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927222 TSecr=0 WS=128" +"49587","23.996629","172.30.1.104","172.30.1.205","TCP","54","135 > 47336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49588","23.996672","172.30.1.104","172.30.1.205","TCP","54","135 > 47336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49589","23.996677","172.30.1.205","172.30.1.104","TCP","54","47336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49590","23.996696","172.30.1.104","172.30.1.205","TCP","66","49671 > 39974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49591","23.996704","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49592","23.997074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49593","23.997444","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49594","23.997453","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49595","23.999335","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49596","23.999716","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49597","23.999723","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49598","24.001146","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49599","24.004832","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49600","24.004851","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49601","24.005859","172.30.1.205","172.30.1.104","TCP","74","47340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927232 TSecr=0 WS=128" +"49602","24.006218","172.30.1.104","172.30.1.205","TCP","66","135 > 47340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49603","24.006229","172.30.1.205","172.30.1.104","TCP","54","47340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49604","24.006583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49605","24.006869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49606","24.006878","172.30.1.205","172.30.1.104","TCP","54","47340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49607","24.009127","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49608","24.009531","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49609","24.009537","172.30.1.205","172.30.1.104","TCP","54","47340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49610","24.011363","172.30.1.205","172.30.1.104","TCP","54","47340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49611","24.011484","172.30.1.205","172.30.1.104","TCP","74","39978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927237 TSecr=0 WS=128" +"49612","24.011625","172.30.1.104","172.30.1.205","TCP","54","135 > 47340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49613","24.011638","172.30.1.104","172.30.1.205","TCP","54","135 > 47340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49614","24.011644","172.30.1.205","172.30.1.104","TCP","54","47340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49615","24.011760","172.30.1.104","172.30.1.205","TCP","66","49671 > 39978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49616","24.011769","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49617","24.012121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49618","24.012412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49619","24.012422","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49620","24.014405","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49621","24.016079","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49622","24.016088","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49623","24.017560","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49624","24.022274","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49625","24.022285","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49626","24.023341","172.30.1.205","172.30.1.104","TCP","74","47344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927249 TSecr=0 WS=128" +"49627","24.023646","172.30.1.104","172.30.1.205","TCP","66","135 > 47344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49628","24.023659","172.30.1.205","172.30.1.104","TCP","54","47344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49629","24.024015","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49630","24.024317","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49631","24.024326","172.30.1.205","172.30.1.104","TCP","54","47344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49632","24.026562","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49633","24.026970","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49634","24.026976","172.30.1.205","172.30.1.104","TCP","54","47344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49635","24.028829","172.30.1.205","172.30.1.104","TCP","54","47344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49636","24.028939","172.30.1.205","172.30.1.104","TCP","74","39982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927255 TSecr=0 WS=128" +"49637","24.029086","172.30.1.104","172.30.1.205","TCP","54","135 > 47344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49638","24.029102","172.30.1.104","172.30.1.205","TCP","54","135 > 47344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49639","24.029108","172.30.1.205","172.30.1.104","TCP","54","47344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49640","24.029222","172.30.1.104","172.30.1.205","TCP","66","49671 > 39982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49641","24.029230","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49642","24.029572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49643","24.029870","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49644","24.029876","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49645","24.031744","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49646","24.032108","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49647","24.032114","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49648","24.033491","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49649","24.037265","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49650","24.037275","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49651","24.038222","172.30.1.205","172.30.1.104","TCP","74","47348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927264 TSecr=0 WS=128" +"49652","24.038517","172.30.1.104","172.30.1.205","TCP","66","135 > 47348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49653","24.038527","172.30.1.205","172.30.1.104","TCP","54","47348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49654","24.038873","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49655","24.039160","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49656","24.039169","172.30.1.205","172.30.1.104","TCP","54","47348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49657","24.041400","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49658","24.041811","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49659","24.041817","172.30.1.205","172.30.1.104","TCP","54","47348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49660","24.043619","172.30.1.205","172.30.1.104","TCP","54","47348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49661","24.043728","172.30.1.205","172.30.1.104","TCP","74","39986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927270 TSecr=0 WS=128" +"49662","24.043903","172.30.1.104","172.30.1.205","TCP","54","135 > 47348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49663","24.043931","172.30.1.104","172.30.1.205","TCP","54","135 > 47348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49664","24.043939","172.30.1.205","172.30.1.104","TCP","54","47348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49665","24.043973","172.30.1.104","172.30.1.205","TCP","66","49671 > 39986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49666","24.043983","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49667","24.044375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49668","24.044674","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49669","24.044684","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49670","24.046607","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49671","24.047060","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49672","24.047072","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49673","24.048488","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49674","24.052227","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49675","24.052238","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49676","24.053238","172.30.1.205","172.30.1.104","TCP","74","47352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927279 TSecr=0 WS=128" +"49677","24.053602","172.30.1.104","172.30.1.205","TCP","66","135 > 47352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49678","24.053614","172.30.1.205","172.30.1.104","TCP","54","47352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49679","24.053974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49680","24.054296","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49681","24.054305","172.30.1.205","172.30.1.104","TCP","54","47352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49682","24.056504","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49683","24.056899","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49684","24.056905","172.30.1.205","172.30.1.104","TCP","54","47352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49685","24.058711","172.30.1.205","172.30.1.104","TCP","54","47352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49686","24.058821","172.30.1.205","172.30.1.104","TCP","74","39990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927285 TSecr=0 WS=128" +"49687","24.058980","172.30.1.104","172.30.1.205","TCP","54","135 > 47352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49688","24.059104","172.30.1.104","172.30.1.205","TCP","66","49671 > 39990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49689","24.059118","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49690","24.059131","172.30.1.104","172.30.1.205","TCP","54","135 > 47352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49691","24.059141","172.30.1.205","172.30.1.104","TCP","54","47352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49692","24.059545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49693","24.059867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49694","24.059876","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49695","24.061809","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49696","24.062179","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49697","24.062186","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49698","24.063545","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49699","24.067274","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49700","24.067284","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49701","24.068236","172.30.1.205","172.30.1.104","TCP","74","47356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927294 TSecr=0 WS=128" +"49702","24.068539","172.30.1.104","172.30.1.205","TCP","66","135 > 47356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49703","24.068551","172.30.1.205","172.30.1.104","TCP","54","47356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49704","24.068941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49705","24.069213","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49706","24.069222","172.30.1.205","172.30.1.104","TCP","54","47356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49707","24.071420","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49708","24.071819","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49709","24.071826","172.30.1.205","172.30.1.104","TCP","54","47356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49710","24.073664","172.30.1.205","172.30.1.104","TCP","54","47356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49711","24.073776","172.30.1.205","172.30.1.104","TCP","74","39994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927300 TSecr=0 WS=128" +"49712","24.073926","172.30.1.104","172.30.1.205","TCP","54","135 > 47356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49713","24.073938","172.30.1.104","172.30.1.205","TCP","54","135 > 47356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49714","24.073943","172.30.1.205","172.30.1.104","TCP","54","47356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49715","24.074043","172.30.1.104","172.30.1.205","TCP","66","49671 > 39994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49716","24.074052","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49717","24.074399","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49718","24.074740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49719","24.074747","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49720","24.076603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49721","24.076973","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49722","24.076981","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49723","24.078342","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49724","24.082069","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49725","24.082079","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49726","24.083037","172.30.1.205","172.30.1.104","TCP","74","47360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927309 TSecr=0 WS=128" +"49727","24.083354","172.30.1.104","172.30.1.205","TCP","66","135 > 47360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49728","24.083365","172.30.1.205","172.30.1.104","TCP","54","47360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49729","24.083715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49730","24.084010","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49731","24.084018","172.30.1.205","172.30.1.104","TCP","54","47360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49732","24.086253","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49733","24.086773","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49734","24.086779","172.30.1.205","172.30.1.104","TCP","54","47360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49735","24.088589","172.30.1.205","172.30.1.104","TCP","54","47360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49736","24.088706","172.30.1.205","172.30.1.104","TCP","74","39998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927315 TSecr=0 WS=128" +"49737","24.088881","172.30.1.104","172.30.1.205","TCP","54","135 > 47360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49738","24.088916","172.30.1.104","172.30.1.205","TCP","54","135 > 47360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49739","24.088922","172.30.1.205","172.30.1.104","TCP","54","47360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49740","24.089116","172.30.1.104","172.30.1.205","TCP","66","49671 > 39998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49741","24.089124","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49742","24.089480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49743","24.089781","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49744","24.089797","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49745","24.091878","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49746","24.092241","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49747","24.092248","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49748","24.093647","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49749","24.097240","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49750","24.097250","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49751","24.098216","172.30.1.205","172.30.1.104","TCP","74","47364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927324 TSecr=0 WS=128" +"49752","24.098578","172.30.1.104","172.30.1.205","TCP","66","135 > 47364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49753","24.098589","172.30.1.205","172.30.1.104","TCP","54","47364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49754","24.098962","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49755","24.099331","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49756","24.099340","172.30.1.205","172.30.1.104","TCP","54","47364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49757","24.101549","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49758","24.101999","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49759","24.102006","172.30.1.205","172.30.1.104","TCP","54","47364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49760","24.103812","172.30.1.205","172.30.1.104","TCP","54","47364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49761","24.103923","172.30.1.205","172.30.1.104","TCP","74","40002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927330 TSecr=0 WS=128" +"49762","24.104077","172.30.1.104","172.30.1.205","TCP","54","135 > 47364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49763","24.104101","172.30.1.104","172.30.1.205","TCP","54","135 > 47364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49764","24.104106","172.30.1.205","172.30.1.104","TCP","54","47364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49765","24.104191","172.30.1.104","172.30.1.205","TCP","66","49671 > 40002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49766","24.104200","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49767","24.104545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49768","24.104842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49769","24.104851","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49770","24.106737","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49771","24.107121","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49772","24.107127","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49773","24.108473","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49774","24.112172","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49775","24.112182","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49776","24.113154","172.30.1.205","172.30.1.104","TCP","74","47368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927339 TSecr=0 WS=128" +"49777","24.113463","172.30.1.104","172.30.1.205","TCP","66","135 > 47368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49778","24.113474","172.30.1.205","172.30.1.104","TCP","54","47368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49779","24.113823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49780","24.114102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49781","24.114111","172.30.1.205","172.30.1.104","TCP","54","47368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49782","24.116310","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49783","24.116728","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49784","24.116740","172.30.1.205","172.30.1.104","TCP","54","47368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49785","24.117856","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49786","24.117932","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49787","24.117982","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49788","24.118016","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49789","24.118045","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49790","24.118073","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49791","24.118107","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49792","24.118129","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49793","24.118155","172.30.1.104","172.30.1.205","TCP","54","49671 > 39962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49794","24.118167","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49795","24.118179","172.30.1.104","172.30.1.205","TCP","54","49671 > 39962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49796","24.118184","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49797","24.118214","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49798","24.118243","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49799","24.118315","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49800","24.118325","172.30.1.104","172.30.1.205","TCP","54","49671 > 39966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49801","24.118349","172.30.1.104","172.30.1.205","TCP","54","49671 > 39966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49802","24.118354","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49803","24.118376","172.30.1.104","172.30.1.205","TCP","54","49671 > 39970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49804","24.118403","172.30.1.104","172.30.1.205","TCP","54","49671 > 39974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49805","24.118609","172.30.1.104","172.30.1.205","TCP","54","49671 > 39978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49806","24.118616","172.30.1.104","172.30.1.205","TCP","54","49671 > 39982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49807","24.118635","172.30.1.104","172.30.1.205","TCP","54","49671 > 39970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49808","24.118641","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49809","24.118661","172.30.1.104","172.30.1.205","TCP","54","49671 > 39982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49810","24.118664","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49811","24.118692","172.30.1.104","172.30.1.205","TCP","54","49671 > 39974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49812","24.118695","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49813","24.118719","172.30.1.104","172.30.1.205","TCP","54","49671 > 39978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49814","24.118723","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49815","24.118748","172.30.1.104","172.30.1.205","TCP","54","49671 > 39990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49816","24.118773","172.30.1.104","172.30.1.205","TCP","54","49671 > 39986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49817","24.118801","172.30.1.104","172.30.1.205","TCP","54","49671 > 39990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49818","24.118806","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49819","24.118827","172.30.1.104","172.30.1.205","TCP","54","49671 > 39994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49820","24.118854","172.30.1.104","172.30.1.205","TCP","54","49671 > 39986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49821","24.118861","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49822","24.119015","172.30.1.104","172.30.1.205","TCP","54","49671 > 39994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49823","24.119020","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49824","24.119038","172.30.1.104","172.30.1.205","TCP","54","49671 > 39998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49825","24.119065","172.30.1.104","172.30.1.205","TCP","54","49671 > 39998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49826","24.119069","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49827","24.119141","172.30.1.104","172.30.1.205","TCP","54","49671 > 40002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49828","24.119168","172.30.1.104","172.30.1.205","TCP","54","49671 > 39958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49829","24.119195","172.30.1.104","172.30.1.205","TCP","54","49671 > 40002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49830","24.119199","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49831","24.119229","172.30.1.104","172.30.1.205","TCP","54","49671 > 39958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"49832","24.119233","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"49833","24.119869","172.30.1.205","172.30.1.104","TCP","54","47368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49834","24.119981","172.30.1.205","172.30.1.104","TCP","74","40006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927346 TSecr=0 WS=128" +"49835","24.120122","172.30.1.104","172.30.1.205","TCP","54","135 > 47368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49836","24.120147","172.30.1.104","172.30.1.205","TCP","54","135 > 47368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49837","24.120152","172.30.1.205","172.30.1.104","TCP","54","47368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49838","24.120300","172.30.1.104","172.30.1.205","TCP","66","49671 > 40006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49839","24.120308","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49840","24.120668","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49841","24.120998","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49842","24.121008","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49843","24.122916","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49844","24.123319","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49845","24.123325","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49846","24.124687","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49847","24.129430","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49848","24.129440","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49849","24.130389","172.30.1.205","172.30.1.104","TCP","74","47372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927356 TSecr=0 WS=128" +"49850","24.130713","172.30.1.104","172.30.1.205","TCP","66","135 > 47372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49851","24.130724","172.30.1.205","172.30.1.104","TCP","54","47372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49852","24.131086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49853","24.131398","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49854","24.131408","172.30.1.205","172.30.1.104","TCP","54","47372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49855","24.133623","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49856","24.134072","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49857","24.134079","172.30.1.205","172.30.1.104","TCP","54","47372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49858","24.135936","172.30.1.205","172.30.1.104","TCP","54","47372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49859","24.136074","172.30.1.205","172.30.1.104","TCP","74","40010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927362 TSecr=0 WS=128" +"49860","24.136253","172.30.1.104","172.30.1.205","TCP","54","135 > 47372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49861","24.136263","172.30.1.104","172.30.1.205","TCP","54","135 > 47372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49862","24.136268","172.30.1.205","172.30.1.104","TCP","54","47372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49863","24.136338","172.30.1.104","172.30.1.205","TCP","66","49671 > 40010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49864","24.136346","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49865","24.136694","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49866","24.136993","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49867","24.137002","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49868","24.138895","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49869","24.139279","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49870","24.139285","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49871","24.140646","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49872","24.144552","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49873","24.144562","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49874","24.145520","172.30.1.205","172.30.1.104","TCP","74","47376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927371 TSecr=0 WS=128" +"49875","24.145845","172.30.1.104","172.30.1.205","TCP","66","135 > 47376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49876","24.145858","172.30.1.205","172.30.1.104","TCP","54","47376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49877","24.146224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49878","24.146581","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49879","24.146590","172.30.1.205","172.30.1.104","TCP","54","47376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49880","24.148804","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49881","24.149268","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49882","24.149275","172.30.1.205","172.30.1.104","TCP","54","47376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49883","24.151087","172.30.1.205","172.30.1.104","TCP","54","47376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49884","24.151202","172.30.1.205","172.30.1.104","TCP","74","40014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927377 TSecr=0 WS=128" +"49885","24.151384","172.30.1.104","172.30.1.205","TCP","54","135 > 47376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49886","24.151394","172.30.1.104","172.30.1.205","TCP","54","135 > 47376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49887","24.151400","172.30.1.205","172.30.1.104","TCP","54","47376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49888","24.151490","172.30.1.104","172.30.1.205","TCP","66","49671 > 40014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49889","24.151499","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49890","24.151860","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49891","24.152133","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49892","24.152141","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49893","24.154047","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49894","24.154456","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49895","24.154462","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49896","24.155811","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49897","24.159372","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49898","24.159381","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49899","24.160343","172.30.1.205","172.30.1.104","TCP","74","47380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927386 TSecr=0 WS=128" +"49900","24.160738","172.30.1.104","172.30.1.205","TCP","66","135 > 47380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49901","24.160749","172.30.1.205","172.30.1.104","TCP","54","47380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49902","24.161108","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49903","24.163973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49904","24.163991","172.30.1.205","172.30.1.104","TCP","54","47380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49905","24.166273","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49906","24.166790","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49907","24.166797","172.30.1.205","172.30.1.104","TCP","54","47380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49908","24.168643","172.30.1.205","172.30.1.104","TCP","54","47380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49909","24.168752","172.30.1.205","172.30.1.104","TCP","74","40018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927395 TSecr=0 WS=128" +"49910","24.168964","172.30.1.104","172.30.1.205","TCP","54","135 > 47380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49911","24.169074","172.30.1.104","172.30.1.205","TCP","66","49671 > 40018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49912","24.169083","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49913","24.169430","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49914","24.169743","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49915","24.169752","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49916","24.170034","172.30.1.104","172.30.1.205","TCP","54","135 > 47380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49917","24.170041","172.30.1.205","172.30.1.104","TCP","54","47380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49918","24.171653","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49919","24.172107","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49920","24.172113","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49921","24.173496","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49922","24.177313","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49923","24.177323","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49924","24.178273","172.30.1.205","172.30.1.104","TCP","74","47384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927404 TSecr=0 WS=128" +"49925","24.178605","172.30.1.104","172.30.1.205","TCP","66","135 > 47384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49926","24.178617","172.30.1.205","172.30.1.104","TCP","54","47384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49927","24.178967","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49928","24.179250","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49929","24.179259","172.30.1.205","172.30.1.104","TCP","54","47384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49930","24.181459","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49931","24.181877","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49932","24.181883","172.30.1.205","172.30.1.104","TCP","54","47384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49933","24.183692","172.30.1.205","172.30.1.104","TCP","54","47384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49934","24.183802","172.30.1.205","172.30.1.104","TCP","74","40022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927410 TSecr=0 WS=128" +"49935","24.183956","172.30.1.104","172.30.1.205","TCP","54","135 > 47384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49936","24.184051","172.30.1.104","172.30.1.205","TCP","54","135 > 47384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49937","24.184057","172.30.1.205","172.30.1.104","TCP","54","47384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49938","24.184131","172.30.1.104","172.30.1.205","TCP","66","49671 > 40022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49939","24.184147","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49940","24.184538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49941","24.184852","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49942","24.184862","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49943","24.186763","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49944","24.187140","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49945","24.187147","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49946","24.188495","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49947","24.192283","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49948","24.192292","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49949","24.193273","172.30.1.205","172.30.1.104","TCP","74","47388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927419 TSecr=0 WS=128" +"49950","24.193575","172.30.1.104","172.30.1.205","TCP","66","135 > 47388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49951","24.193585","172.30.1.205","172.30.1.104","TCP","54","47388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49952","24.193940","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49953","24.194199","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49954","24.194208","172.30.1.205","172.30.1.104","TCP","54","47388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49955","24.196385","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49956","24.196805","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49957","24.196811","172.30.1.205","172.30.1.104","TCP","54","47388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49958","24.198726","172.30.1.205","172.30.1.104","TCP","54","47388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49959","24.198836","172.30.1.205","172.30.1.104","TCP","74","40026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927425 TSecr=0 WS=128" +"49960","24.198969","172.30.1.104","172.30.1.205","TCP","54","135 > 47388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49961","24.199059","172.30.1.104","172.30.1.205","TCP","54","135 > 47388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49962","24.199065","172.30.1.205","172.30.1.104","TCP","54","47388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49963","24.199128","172.30.1.104","172.30.1.205","TCP","66","49671 > 40026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49964","24.199136","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49965","24.199486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49966","24.199766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49967","24.199774","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49968","24.201690","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49969","24.202049","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49970","24.202069","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49971","24.203583","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49972","24.207322","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49973","24.207332","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49974","24.208269","172.30.1.205","172.30.1.104","TCP","74","47392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927434 TSecr=0 WS=128" +"49975","24.208597","172.30.1.104","172.30.1.205","TCP","66","135 > 47392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49976","24.208616","172.30.1.205","172.30.1.104","TCP","54","47392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49977","24.208996","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"49978","24.209267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49979","24.209276","172.30.1.205","172.30.1.104","TCP","54","47392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49980","24.211469","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"49981","24.211916","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"49982","24.211923","172.30.1.205","172.30.1.104","TCP","54","47392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49983","24.213752","172.30.1.205","172.30.1.104","TCP","54","47392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"49984","24.213862","172.30.1.205","172.30.1.104","TCP","74","40030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927440 TSecr=0 WS=128" +"49985","24.214063","172.30.1.104","172.30.1.205","TCP","54","135 > 47392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49986","24.214084","172.30.1.104","172.30.1.205","TCP","54","135 > 47392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"49987","24.214089","172.30.1.205","172.30.1.104","TCP","54","47392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"49988","24.214169","172.30.1.104","172.30.1.205","TCP","66","49671 > 40030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"49989","24.214178","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"49990","24.214522","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"49991","24.214828","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"49992","24.214836","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"49993","24.216746","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"49994","24.217130","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"49995","24.217136","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"49996","24.218496","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"49997","24.222216","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"49998","24.222225","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"49999","24.223215","172.30.1.205","172.30.1.104","TCP","74","47396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927449 TSecr=0 WS=128" +"50000","24.223509","172.30.1.104","172.30.1.205","TCP","66","135 > 47396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50001","24.223521","172.30.1.205","172.30.1.104","TCP","54","47396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50002","24.223870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50003","24.224221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50004","24.224230","172.30.1.205","172.30.1.104","TCP","54","47396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50005","24.226494","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50006","24.226932","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50007","24.226945","172.30.1.205","172.30.1.104","TCP","54","47396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50008","24.229023","172.30.1.205","172.30.1.104","TCP","54","47396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50009","24.229131","172.30.1.205","172.30.1.104","TCP","74","40034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927455 TSecr=0 WS=128" +"50010","24.229280","172.30.1.104","172.30.1.205","TCP","54","135 > 47396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50011","24.229291","172.30.1.104","172.30.1.205","TCP","54","135 > 47396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50012","24.229296","172.30.1.205","172.30.1.104","TCP","54","47396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50013","24.229388","172.30.1.104","172.30.1.205","TCP","66","49671 > 40034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50014","24.229396","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50015","24.229738","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50016","24.230983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50017","24.230992","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50018","24.232890","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50019","24.233258","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50020","24.233264","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50021","24.234611","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50022","24.238384","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50023","24.238403","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50024","24.239450","172.30.1.205","172.30.1.104","TCP","74","47400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927465 TSecr=0 WS=128" +"50025","24.239817","172.30.1.104","172.30.1.205","TCP","66","135 > 47400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50026","24.239829","172.30.1.205","172.30.1.104","TCP","54","47400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50027","24.240179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50028","24.240476","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50029","24.240485","172.30.1.205","172.30.1.104","TCP","54","47400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50030","24.242677","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50031","24.243081","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50032","24.243093","172.30.1.205","172.30.1.104","TCP","54","47400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50033","24.245086","172.30.1.205","172.30.1.104","TCP","54","47400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50034","24.245193","172.30.1.205","172.30.1.104","TCP","74","40038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927471 TSecr=0 WS=128" +"50035","24.245353","172.30.1.104","172.30.1.205","TCP","54","135 > 47400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50036","24.245384","172.30.1.104","172.30.1.205","TCP","54","135 > 47400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50037","24.245389","172.30.1.205","172.30.1.104","TCP","54","47400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50038","24.245473","172.30.1.104","172.30.1.205","TCP","66","49671 > 40038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50039","24.245487","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50040","24.245872","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50041","24.246178","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50042","24.246186","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50043","24.248089","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50044","24.248502","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50045","24.248508","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50046","24.249885","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50047","24.253601","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50048","24.253611","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50049","24.254561","172.30.1.205","172.30.1.104","TCP","74","47404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927480 TSecr=0 WS=128" +"50050","24.254860","172.30.1.104","172.30.1.205","TCP","66","135 > 47404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50051","24.254870","172.30.1.205","172.30.1.104","TCP","54","47404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50052","24.255224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50053","24.255505","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50054","24.255513","172.30.1.205","172.30.1.104","TCP","54","47404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50055","24.257727","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50056","24.258114","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50057","24.258124","172.30.1.205","172.30.1.104","TCP","54","47404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50058","24.260016","172.30.1.205","172.30.1.104","TCP","54","47404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50059","24.260140","172.30.1.205","172.30.1.104","TCP","74","40042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927486 TSecr=0 WS=128" +"50060","24.260281","172.30.1.104","172.30.1.205","TCP","54","135 > 47404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50061","24.260292","172.30.1.104","172.30.1.205","TCP","54","135 > 47404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50062","24.260297","172.30.1.205","172.30.1.104","TCP","54","47404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50063","24.260406","172.30.1.104","172.30.1.205","TCP","66","49671 > 40042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50064","24.260415","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50065","24.260771","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50066","24.261069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50067","24.261078","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50068","24.262975","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50069","24.264183","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50070","24.264199","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50071","24.265753","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50072","24.269454","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50073","24.269465","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50074","24.270450","172.30.1.205","172.30.1.104","TCP","74","47408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927496 TSecr=0 WS=128" +"50075","24.270771","172.30.1.104","172.30.1.205","TCP","66","135 > 47408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50076","24.270783","172.30.1.205","172.30.1.104","TCP","54","47408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50077","24.271150","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50078","24.271421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50079","24.271434","172.30.1.205","172.30.1.104","TCP","54","47408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50080","24.273731","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50081","24.274114","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50082","24.274120","172.30.1.205","172.30.1.104","TCP","54","47408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50083","24.275932","172.30.1.205","172.30.1.104","TCP","54","47408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50084","24.276050","172.30.1.205","172.30.1.104","TCP","74","40046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927502 TSecr=0 WS=128" +"50085","24.276264","172.30.1.104","172.30.1.205","TCP","54","135 > 47408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50086","24.276275","172.30.1.104","172.30.1.205","TCP","54","135 > 47408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50087","24.276281","172.30.1.205","172.30.1.104","TCP","54","47408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50088","24.276415","172.30.1.104","172.30.1.205","TCP","66","49671 > 40046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50089","24.276424","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50090","24.276812","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50091","24.277128","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50092","24.277138","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50093","24.279034","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50094","24.279397","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50095","24.279403","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50096","24.280756","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50097","24.284508","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50098","24.284519","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50099","24.285501","172.30.1.205","172.30.1.104","TCP","74","47412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927511 TSecr=0 WS=128" +"50100","24.285805","172.30.1.104","172.30.1.205","TCP","66","135 > 47412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50101","24.285816","172.30.1.205","172.30.1.104","TCP","54","47412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50102","24.286171","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50103","24.286466","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50104","24.286477","172.30.1.205","172.30.1.104","TCP","54","47412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50105","24.288672","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50106","24.289040","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50107","24.289047","172.30.1.205","172.30.1.104","TCP","54","47412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50108","24.290844","172.30.1.205","172.30.1.104","TCP","54","47412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50109","24.290954","172.30.1.205","172.30.1.104","TCP","74","40050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927517 TSecr=0 WS=128" +"50110","24.291103","172.30.1.104","172.30.1.205","TCP","54","135 > 47412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50111","24.291148","172.30.1.104","172.30.1.205","TCP","54","135 > 47412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50112","24.291154","172.30.1.205","172.30.1.104","TCP","54","47412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50113","24.291236","172.30.1.104","172.30.1.205","TCP","66","49671 > 40050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50114","24.291244","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50115","24.291587","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50116","24.291875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50117","24.291884","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50118","24.293803","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50119","24.294195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50120","24.294202","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50121","24.295542","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50122","24.299281","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50123","24.299290","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50124","24.300228","172.30.1.205","172.30.1.104","TCP","74","47416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927526 TSecr=0 WS=128" +"50125","24.300588","172.30.1.104","172.30.1.205","TCP","66","135 > 47416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50126","24.300599","172.30.1.205","172.30.1.104","TCP","54","47416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50127","24.300986","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50128","24.301287","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50129","24.301296","172.30.1.205","172.30.1.104","TCP","54","47416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50130","24.303465","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50131","24.303899","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50132","24.303905","172.30.1.205","172.30.1.104","TCP","54","47416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50133","24.304751","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50134","24.304820","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50135","24.304859","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50136","24.304892","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50137","24.304920","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50138","24.304951","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50139","24.304978","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50140","24.305000","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50141","24.305022","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50142","24.305029","172.30.1.104","172.30.1.205","TCP","54","49671 > 40010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50143","24.305040","172.30.1.104","172.30.1.205","TCP","54","49671 > 40010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50144","24.305049","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50145","24.305082","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50146","24.305113","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50147","24.305183","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50148","24.305267","172.30.1.104","172.30.1.205","TCP","54","49671 > 40014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50149","24.305283","172.30.1.104","172.30.1.205","TCP","54","49671 > 40014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50150","24.305288","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50151","24.305302","172.30.1.104","172.30.1.205","TCP","54","49671 > 40022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50152","24.305329","172.30.1.104","172.30.1.205","TCP","54","49671 > 40018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50153","24.305351","172.30.1.104","172.30.1.205","TCP","54","49671 > 40022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50154","24.305355","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50155","24.305370","172.30.1.104","172.30.1.205","TCP","54","49671 > 40026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50156","24.305726","172.30.1.104","172.30.1.205","TCP","54","49671 > 40030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50157","24.305734","172.30.1.104","172.30.1.205","TCP","54","49671 > 40030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50158","24.305739","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50159","24.305746","172.30.1.104","172.30.1.205","TCP","54","49671 > 40018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50160","24.305748","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50161","24.305749","172.30.1.104","172.30.1.205","TCP","54","49671 > 40026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50162","24.305751","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50163","24.305753","172.30.1.104","172.30.1.205","TCP","54","49671 > 40034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50164","24.305760","172.30.1.104","172.30.1.205","TCP","54","49671 > 40038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50165","24.305763","172.30.1.104","172.30.1.205","TCP","54","49671 > 40034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50166","24.305765","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50167","24.305767","172.30.1.104","172.30.1.205","TCP","54","49671 > 40042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50168","24.305769","172.30.1.104","172.30.1.205","TCP","54","49671 > 40046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50169","24.305772","172.30.1.104","172.30.1.205","TCP","54","49671 > 40038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50170","24.305773","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50171","24.305843","172.30.1.104","172.30.1.205","TCP","54","49671 > 40050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50172","24.305859","172.30.1.104","172.30.1.205","TCP","54","49671 > 40050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50173","24.305863","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50174","24.305881","172.30.1.104","172.30.1.205","TCP","54","49671 > 40042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50175","24.305884","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50176","24.305904","172.30.1.104","172.30.1.205","TCP","54","49671 > 40046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50177","24.305907","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50178","24.305925","172.30.1.104","172.30.1.205","TCP","54","49671 > 40006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50179","24.306081","172.30.1.104","172.30.1.205","TCP","54","49671 > 40006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50180","24.306085","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50181","24.306668","172.30.1.205","172.30.1.104","TCP","54","47416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50182","24.306776","172.30.1.205","172.30.1.104","TCP","74","40054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927533 TSecr=0 WS=128" +"50183","24.306928","172.30.1.104","172.30.1.205","TCP","54","135 > 47416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50184","24.306949","172.30.1.104","172.30.1.205","TCP","54","135 > 47416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50185","24.306954","172.30.1.205","172.30.1.104","TCP","54","47416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50186","24.307077","172.30.1.104","172.30.1.205","TCP","66","49671 > 40054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50187","24.307085","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50188","24.307441","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50189","24.307724","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50190","24.307731","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50191","24.309625","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50192","24.309975","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50193","24.309981","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50194","24.311322","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50195","24.315034","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50196","24.315044","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50197","24.315992","172.30.1.205","172.30.1.104","TCP","74","47420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927542 TSecr=0 WS=128" +"50198","24.316275","172.30.1.104","172.30.1.205","TCP","66","135 > 47420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50199","24.316286","172.30.1.205","172.30.1.104","TCP","54","47420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50200","24.316636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50201","24.316960","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50202","24.316969","172.30.1.205","172.30.1.104","TCP","54","47420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50203","24.319143","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50204","24.319545","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50205","24.319551","172.30.1.205","172.30.1.104","TCP","54","47420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50206","24.321375","172.30.1.205","172.30.1.104","TCP","54","47420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50207","24.321485","172.30.1.205","172.30.1.104","TCP","74","40058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927547 TSecr=0 WS=128" +"50208","24.321687","172.30.1.104","172.30.1.205","TCP","54","135 > 47420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50209","24.321710","172.30.1.104","172.30.1.205","TCP","54","135 > 47420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50210","24.321715","172.30.1.205","172.30.1.104","TCP","54","47420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50211","24.321806","172.30.1.104","172.30.1.205","TCP","66","49671 > 40058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50212","24.321814","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50213","24.322161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50214","24.322473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50215","24.322482","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50216","24.324346","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50217","24.324906","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50218","24.324913","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50219","24.326267","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50220","24.329991","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50221","24.330000","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50222","24.330957","172.30.1.205","172.30.1.104","TCP","74","47424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927557 TSecr=0 WS=128" +"50223","24.331290","172.30.1.104","172.30.1.205","TCP","66","135 > 47424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50224","24.331301","172.30.1.205","172.30.1.104","TCP","54","47424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50225","24.331647","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50226","24.331966","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50227","24.331974","172.30.1.205","172.30.1.104","TCP","54","47424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50228","24.334189","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50229","24.334649","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50230","24.334655","172.30.1.205","172.30.1.104","TCP","54","47424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50231","24.336455","172.30.1.205","172.30.1.104","TCP","54","47424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50232","24.336567","172.30.1.205","172.30.1.104","TCP","74","40062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927562 TSecr=0 WS=128" +"50233","24.336722","172.30.1.104","172.30.1.205","TCP","54","135 > 47424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50234","24.336743","172.30.1.104","172.30.1.205","TCP","54","135 > 47424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50235","24.336749","172.30.1.205","172.30.1.104","TCP","54","47424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50236","24.336866","172.30.1.104","172.30.1.205","TCP","66","49671 > 40062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50237","24.336875","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50238","24.337225","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50239","24.338111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50240","24.338121","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50241","24.339992","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50242","24.340446","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50243","24.340452","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50244","24.341819","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50245","24.345738","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50246","24.345748","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50247","24.346700","172.30.1.205","172.30.1.104","TCP","74","47428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927573 TSecr=0 WS=128" +"50248","24.347040","172.30.1.104","172.30.1.205","TCP","66","135 > 47428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50249","24.347051","172.30.1.205","172.30.1.104","TCP","54","47428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50250","24.347404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50251","24.347702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50252","24.347712","172.30.1.205","172.30.1.104","TCP","54","47428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50253","24.349922","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50254","24.350338","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50255","24.350345","172.30.1.205","172.30.1.104","TCP","54","47428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50256","24.352176","172.30.1.205","172.30.1.104","TCP","54","47428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50257","24.352293","172.30.1.205","172.30.1.104","TCP","74","40066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927578 TSecr=0 WS=128" +"50258","24.352477","172.30.1.104","172.30.1.205","TCP","54","135 > 47428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50259","24.352488","172.30.1.104","172.30.1.205","TCP","54","135 > 47428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50260","24.352493","172.30.1.205","172.30.1.104","TCP","54","47428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50261","24.352566","172.30.1.104","172.30.1.205","TCP","66","49671 > 40066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50262","24.352575","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50263","24.352948","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50264","24.353245","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50265","24.353254","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50266","24.355105","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50267","24.355513","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50268","24.355519","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50269","24.356899","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50270","24.361400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50271","24.361410","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50272","24.362360","172.30.1.205","172.30.1.104","TCP","74","47432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927588 TSecr=0 WS=128" +"50273","24.362713","172.30.1.104","172.30.1.205","TCP","66","135 > 47432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50274","24.362724","172.30.1.205","172.30.1.104","TCP","54","47432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50275","24.363078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50276","24.363376","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50277","24.363384","172.30.1.205","172.30.1.104","TCP","54","47432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50278","24.365573","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50279","24.366027","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50280","24.366039","172.30.1.205","172.30.1.104","TCP","54","47432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50281","24.368037","172.30.1.205","172.30.1.104","TCP","54","47432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50282","24.368146","172.30.1.205","172.30.1.104","TCP","74","40070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927594 TSecr=0 WS=128" +"50283","24.368326","172.30.1.104","172.30.1.205","TCP","54","135 > 47432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50284","24.368392","172.30.1.104","172.30.1.205","TCP","54","135 > 47432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50285","24.368397","172.30.1.205","172.30.1.104","TCP","54","47432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50286","24.368470","172.30.1.104","172.30.1.205","TCP","66","49671 > 40070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50287","24.368479","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50288","24.368844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50289","24.369134","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50290","24.369145","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50291","24.371291","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50292","24.371692","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50293","24.371699","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50294","24.373121","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50295","24.376901","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50296","24.376910","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50297","24.377852","172.30.1.205","172.30.1.104","TCP","74","47436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927604 TSecr=0 WS=128" +"50298","24.378170","172.30.1.104","172.30.1.205","TCP","66","135 > 47436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50299","24.378182","172.30.1.205","172.30.1.104","TCP","54","47436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50300","24.378537","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50301","24.378829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50302","24.378838","172.30.1.205","172.30.1.104","TCP","54","47436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50303","24.381026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50304","24.381416","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50305","24.381422","172.30.1.205","172.30.1.104","TCP","54","47436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50306","24.383237","172.30.1.205","172.30.1.104","TCP","54","47436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50307","24.383346","172.30.1.205","172.30.1.104","TCP","74","40074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927609 TSecr=0 WS=128" +"50308","24.383511","172.30.1.104","172.30.1.205","TCP","54","135 > 47436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50309","24.383526","172.30.1.104","172.30.1.205","TCP","54","135 > 47436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50310","24.383532","172.30.1.205","172.30.1.104","TCP","54","47436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50311","24.383604","172.30.1.104","172.30.1.205","TCP","66","49671 > 40074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50312","24.383612","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50313","24.383953","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50314","24.384270","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50315","24.384279","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50316","24.386189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50317","24.386554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50318","24.386560","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50319","24.387903","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50320","24.391642","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50321","24.391651","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50322","24.392594","172.30.1.205","172.30.1.104","TCP","74","47440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927619 TSecr=0 WS=128" +"50323","24.392928","172.30.1.104","172.30.1.205","TCP","66","135 > 47440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50324","24.392939","172.30.1.205","172.30.1.104","TCP","54","47440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50325","24.393292","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50326","24.393576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50327","24.393585","172.30.1.205","172.30.1.104","TCP","54","47440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50328","24.395776","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50329","24.396160","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50330","24.396166","172.30.1.205","172.30.1.104","TCP","54","47440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50331","24.397986","172.30.1.205","172.30.1.104","TCP","54","47440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50332","24.398098","172.30.1.205","172.30.1.104","TCP","74","40078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927624 TSecr=0 WS=128" +"50333","24.398261","172.30.1.104","172.30.1.205","TCP","54","135 > 47440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50334","24.398298","172.30.1.104","172.30.1.205","TCP","54","135 > 47440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50335","24.398303","172.30.1.205","172.30.1.104","TCP","54","47440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50336","24.398385","172.30.1.104","172.30.1.205","TCP","66","49671 > 40078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50337","24.398393","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50338","24.398733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50339","24.400351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50340","24.400358","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50341","24.402268","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50342","24.402681","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50343","24.402687","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50344","24.404035","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50345","24.407828","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50346","24.407837","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50347","24.408791","172.30.1.205","172.30.1.104","TCP","74","47444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927635 TSecr=0 WS=128" +"50348","24.409149","172.30.1.104","172.30.1.205","TCP","66","135 > 47444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50349","24.409159","172.30.1.205","172.30.1.104","TCP","54","47444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50350","24.409511","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50351","24.409814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50352","24.409822","172.30.1.205","172.30.1.104","TCP","54","47444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50353","24.411997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50354","24.412395","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50355","24.412401","172.30.1.205","172.30.1.104","TCP","54","47444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50356","24.414209","172.30.1.205","172.30.1.104","TCP","54","47444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50357","24.414316","172.30.1.205","172.30.1.104","TCP","74","40082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927640 TSecr=0 WS=128" +"50358","24.414463","172.30.1.104","172.30.1.205","TCP","54","135 > 47444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50359","24.414498","172.30.1.104","172.30.1.205","TCP","54","135 > 47444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50360","24.414504","172.30.1.205","172.30.1.104","TCP","54","47444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50361","24.414604","172.30.1.104","172.30.1.205","TCP","66","49671 > 40082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50362","24.414613","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50363","24.414952","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50364","24.415239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50365","24.415247","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50366","24.417149","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50367","24.417539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50368","24.417545","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50369","24.418890","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50370","24.422553","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50371","24.422562","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50372","24.423497","172.30.1.205","172.30.1.104","TCP","74","47448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927649 TSecr=0 WS=128" +"50373","24.423805","172.30.1.104","172.30.1.205","TCP","66","135 > 47448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50374","24.423815","172.30.1.205","172.30.1.104","TCP","54","47448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50375","24.424157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50376","24.424485","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50377","24.424493","172.30.1.205","172.30.1.104","TCP","54","47448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50378","24.426680","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50379","24.427103","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50380","24.427109","172.30.1.205","172.30.1.104","TCP","54","47448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50381","24.428926","172.30.1.205","172.30.1.104","TCP","54","47448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50382","24.429036","172.30.1.205","172.30.1.104","TCP","74","40086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927655 TSecr=0 WS=128" +"50383","24.429216","172.30.1.104","172.30.1.205","TCP","54","135 > 47448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50384","24.429262","172.30.1.104","172.30.1.205","TCP","54","135 > 47448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50385","24.429267","172.30.1.205","172.30.1.104","TCP","54","47448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50386","24.429337","172.30.1.104","172.30.1.205","TCP","66","49671 > 40086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50387","24.429345","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50388","24.429687","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50389","24.429961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50390","24.429970","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50391","24.431832","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50392","24.432229","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50393","24.432235","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50394","24.433598","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50395","24.437430","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50396","24.437440","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50397","24.438381","172.30.1.205","172.30.1.104","TCP","74","47452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927664 TSecr=0 WS=128" +"50398","24.438734","172.30.1.104","172.30.1.205","TCP","66","135 > 47452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50399","24.438744","172.30.1.205","172.30.1.104","TCP","54","47452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50400","24.439089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50401","24.440150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50402","24.440159","172.30.1.205","172.30.1.104","TCP","54","47452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50403","24.442359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50404","24.442726","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50405","24.442732","172.30.1.205","172.30.1.104","TCP","54","47452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50406","24.444530","172.30.1.205","172.30.1.104","TCP","54","47452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50407","24.444643","172.30.1.205","172.30.1.104","TCP","74","40090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927671 TSecr=0 WS=128" +"50408","24.444959","172.30.1.104","172.30.1.205","TCP","54","135 > 47452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50409","24.444967","172.30.1.104","172.30.1.205","TCP","54","135 > 47452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50410","24.444973","172.30.1.205","172.30.1.104","TCP","54","47452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50411","24.445046","172.30.1.104","172.30.1.205","TCP","66","49671 > 40090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50412","24.445055","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50413","24.445404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50414","24.445730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50415","24.445739","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50416","24.447585","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50417","24.447966","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50418","24.447978","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50419","24.449571","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50420","24.453368","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50421","24.453378","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50422","24.454322","172.30.1.205","172.30.1.104","TCP","74","47456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927680 TSecr=0 WS=128" +"50423","24.454707","172.30.1.104","172.30.1.205","TCP","66","135 > 47456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50424","24.454717","172.30.1.205","172.30.1.104","TCP","54","47456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50425","24.455070","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50426","24.455424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50427","24.455433","172.30.1.205","172.30.1.104","TCP","54","47456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50428","24.457638","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50429","24.458057","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50430","24.458069","172.30.1.205","172.30.1.104","TCP","54","47456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50431","24.460004","172.30.1.205","172.30.1.104","TCP","54","47456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50432","24.460112","172.30.1.205","172.30.1.104","TCP","74","40094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927686 TSecr=0 WS=128" +"50433","24.460278","172.30.1.104","172.30.1.205","TCP","54","135 > 47456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50434","24.460306","172.30.1.104","172.30.1.205","TCP","54","135 > 47456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50435","24.460312","172.30.1.205","172.30.1.104","TCP","54","47456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50436","24.460401","172.30.1.104","172.30.1.205","TCP","66","49671 > 40094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50437","24.460408","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50438","24.460757","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50439","24.461072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50440","24.461080","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50441","24.462938","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50442","24.463333","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50443","24.463340","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50444","24.464676","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50445","24.468414","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50446","24.468423","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50447","24.469379","172.30.1.205","172.30.1.104","TCP","74","47460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927695 TSecr=0 WS=128" +"50448","24.469718","172.30.1.104","172.30.1.205","TCP","66","135 > 47460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50449","24.469728","172.30.1.205","172.30.1.104","TCP","54","47460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50450","24.470082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50451","24.470447","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50452","24.470456","172.30.1.205","172.30.1.104","TCP","54","47460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50453","24.472684","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50454","24.473097","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50455","24.473104","172.30.1.205","172.30.1.104","TCP","54","47460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50456","24.474908","172.30.1.205","172.30.1.104","TCP","54","47460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50457","24.475017","172.30.1.205","172.30.1.104","TCP","74","40098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927701 TSecr=0 WS=128" +"50458","24.475244","172.30.1.104","172.30.1.205","TCP","54","135 > 47460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50459","24.475264","172.30.1.104","172.30.1.205","TCP","54","135 > 47460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50460","24.475270","172.30.1.205","172.30.1.104","TCP","54","47460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50461","24.475349","172.30.1.104","172.30.1.205","TCP","66","49671 > 40098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50462","24.475357","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50463","24.475697","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50464","24.476008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50465","24.476015","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50466","24.477899","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50467","24.478405","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50468","24.478412","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50469","24.479743","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50470","24.483570","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50471","24.483580","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50472","24.484536","172.30.1.205","172.30.1.104","TCP","74","47464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927710 TSecr=0 WS=128" +"50473","24.484848","172.30.1.104","172.30.1.205","TCP","66","135 > 47464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50474","24.484859","172.30.1.205","172.30.1.104","TCP","54","47464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50475","24.485215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50476","24.487098","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50477","24.487108","172.30.1.205","172.30.1.104","TCP","54","47464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50478","24.489299","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50479","24.489737","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50480","24.489743","172.30.1.205","172.30.1.104","TCP","54","47464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50481","24.490603","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50482","24.490651","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50483","24.490696","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50484","24.490745","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50485","24.490778","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50486","24.490809","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50487","24.490831","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50488","24.490852","172.30.1.104","172.30.1.205","TCP","54","49671 > 40058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50489","24.490878","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50490","24.490907","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50491","24.490934","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50492","24.490959","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50493","24.490997","172.30.1.104","172.30.1.205","TCP","54","49671 > 40058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50494","24.491016","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50495","24.491066","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50496","24.492321","172.30.1.205","172.30.1.104","TCP","54","47464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50497","24.492431","172.30.1.205","172.30.1.104","TCP","74","40102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927718 TSecr=0 WS=128" +"50498","24.497830","172.30.1.104","172.30.1.205","TCP","66","49671 > 40102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50499","24.497842","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50500","24.497854","172.30.1.104","172.30.1.205","TCP","54","49671 > 40062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50501","24.497894","172.30.1.104","172.30.1.205","TCP","54","49671 > 40066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50502","24.497926","172.30.1.104","172.30.1.205","TCP","54","49671 > 40070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50503","24.497949","172.30.1.104","172.30.1.205","TCP","54","49671 > 40074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50504","24.497970","172.30.1.104","172.30.1.205","TCP","54","49671 > 40078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50505","24.497991","172.30.1.104","172.30.1.205","TCP","54","49671 > 40082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50506","24.498022","172.30.1.104","172.30.1.205","TCP","54","49671 > 40086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50507","24.498041","172.30.1.104","172.30.1.205","TCP","54","49671 > 40090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50508","24.498069","172.30.1.104","172.30.1.205","TCP","54","49671 > 40094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50509","24.498089","172.30.1.104","172.30.1.205","TCP","54","49671 > 40098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50510","24.498120","172.30.1.104","172.30.1.205","TCP","54","49671 > 40054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50511","24.498141","172.30.1.104","172.30.1.205","TCP","54","135 > 47464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50512","24.498171","172.30.1.104","172.30.1.205","TCP","54","49671 > 40054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50513","24.498177","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50514","24.498200","172.30.1.104","172.30.1.205","TCP","54","49671 > 40098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50515","24.498203","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50516","24.498225","172.30.1.104","172.30.1.205","TCP","54","49671 > 40094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50517","24.498228","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50518","24.498254","172.30.1.104","172.30.1.205","TCP","54","49671 > 40090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50519","24.498256","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50520","24.498354","172.30.1.104","172.30.1.205","TCP","54","49671 > 40086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50521","24.498366","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50522","24.498385","172.30.1.104","172.30.1.205","TCP","54","49671 > 40082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50523","24.498388","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50524","24.498406","172.30.1.104","172.30.1.205","TCP","54","49671 > 40078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50525","24.498409","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50526","24.498427","172.30.1.104","172.30.1.205","TCP","54","49671 > 40074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50527","24.498429","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50528","24.498447","172.30.1.104","172.30.1.205","TCP","54","49671 > 40062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50529","24.498449","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50530","24.498467","172.30.1.104","172.30.1.205","TCP","54","49671 > 40066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50531","24.498469","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50532","24.498488","172.30.1.104","172.30.1.205","TCP","54","49671 > 40070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50533","24.498491","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50534","24.498498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50535","24.498509","172.30.1.104","172.30.1.205","TCP","54","135 > 47464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50536","24.498514","172.30.1.205","172.30.1.104","TCP","54","47464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50537","24.498992","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50538","24.498999","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50539","24.500901","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50540","24.501375","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50541","24.501381","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50542","24.502733","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50543","24.506526","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50544","24.506537","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50545","24.507492","172.30.1.205","172.30.1.104","TCP","74","47468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927733 TSecr=0 WS=128" +"50546","24.507843","172.30.1.104","172.30.1.205","TCP","66","135 > 47468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50547","24.507853","172.30.1.205","172.30.1.104","TCP","54","47468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50548","24.508202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50549","24.508522","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50550","24.508533","172.30.1.205","172.30.1.104","TCP","54","47468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50551","24.510721","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50552","24.511155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50553","24.511162","172.30.1.205","172.30.1.104","TCP","54","47468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50554","24.513004","172.30.1.205","172.30.1.104","TCP","54","47468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50555","24.513114","172.30.1.205","172.30.1.104","TCP","74","40106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927739 TSecr=0 WS=128" +"50556","24.513266","172.30.1.104","172.30.1.205","TCP","54","135 > 47468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50557","24.513300","172.30.1.104","172.30.1.205","TCP","54","135 > 47468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50558","24.513305","172.30.1.205","172.30.1.104","TCP","54","47468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50559","24.513398","172.30.1.104","172.30.1.205","TCP","66","49671 > 40106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50560","24.513406","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50561","24.513747","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50562","24.514015","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50563","24.514024","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50564","24.515923","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50565","24.516292","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50566","24.516298","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50567","24.517697","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50568","24.521313","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50569","24.521324","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50570","24.522282","172.30.1.205","172.30.1.104","TCP","74","47472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927748 TSecr=0 WS=128" +"50571","24.522658","172.30.1.104","172.30.1.205","TCP","66","135 > 47472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50572","24.522679","172.30.1.205","172.30.1.104","TCP","54","47472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50573","24.523161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50574","24.523461","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50575","24.523470","172.30.1.205","172.30.1.104","TCP","54","47472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50576","24.525684","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50577","24.526153","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50578","24.526160","172.30.1.205","172.30.1.104","TCP","54","47472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50579","24.527965","172.30.1.205","172.30.1.104","TCP","54","47472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50580","24.528073","172.30.1.205","172.30.1.104","TCP","74","40110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927754 TSecr=0 WS=128" +"50581","24.528280","172.30.1.104","172.30.1.205","TCP","54","135 > 47472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50582","24.528302","172.30.1.104","172.30.1.205","TCP","54","135 > 47472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50583","24.528309","172.30.1.205","172.30.1.104","TCP","54","47472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50584","24.528379","172.30.1.104","172.30.1.205","TCP","66","49671 > 40110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50585","24.528388","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50586","24.528734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50587","24.529036","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50588","24.529045","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50589","24.530939","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50590","24.531337","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50591","24.531343","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50592","24.532680","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50593","24.536416","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50594","24.536427","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50595","24.537401","172.30.1.205","172.30.1.104","TCP","74","47476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927763 TSecr=0 WS=128" +"50596","24.537792","172.30.1.104","172.30.1.205","TCP","66","135 > 47476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50597","24.537813","172.30.1.205","172.30.1.104","TCP","54","47476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50598","24.538306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50599","24.538676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50600","24.538684","172.30.1.205","172.30.1.104","TCP","54","47476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50601","24.540893","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50602","24.543434","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50603","24.543442","172.30.1.205","172.30.1.104","TCP","54","47476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50604","24.545302","172.30.1.205","172.30.1.104","TCP","54","47476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50605","24.545424","172.30.1.205","172.30.1.104","TCP","74","40114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927771 TSecr=0 WS=128" +"50606","24.545552","172.30.1.104","172.30.1.205","TCP","54","135 > 47476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50607","24.545587","172.30.1.104","172.30.1.205","TCP","54","135 > 47476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50608","24.545593","172.30.1.205","172.30.1.104","TCP","54","47476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50609","24.545696","172.30.1.104","172.30.1.205","TCP","66","49671 > 40114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50610","24.545705","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50611","24.546074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50612","24.546363","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50613","24.546371","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50614","24.548281","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50615","24.548660","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50616","24.548667","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50617","24.550031","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50618","24.553768","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50619","24.553778","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50620","24.554710","172.30.1.205","172.30.1.104","TCP","74","47480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927781 TSecr=0 WS=128" +"50621","24.555043","172.30.1.104","172.30.1.205","TCP","66","135 > 47480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50622","24.555054","172.30.1.205","172.30.1.104","TCP","54","47480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50623","24.555401","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50624","24.555732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50625","24.555741","172.30.1.205","172.30.1.104","TCP","54","47480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50626","24.557940","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50627","24.558360","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50628","24.558366","172.30.1.205","172.30.1.104","TCP","54","47480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50629","24.560168","172.30.1.205","172.30.1.104","TCP","54","47480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50630","24.560276","172.30.1.205","172.30.1.104","TCP","74","40118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927786 TSecr=0 WS=128" +"50631","24.560458","172.30.1.104","172.30.1.205","TCP","54","135 > 47480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50632","24.560480","172.30.1.104","172.30.1.205","TCP","54","135 > 47480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50633","24.560485","172.30.1.205","172.30.1.104","TCP","54","47480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50634","24.560593","172.30.1.104","172.30.1.205","TCP","66","49671 > 40118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50635","24.560601","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50636","24.560991","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50637","24.561267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50638","24.561276","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50639","24.563125","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50640","24.563543","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50641","24.563556","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50642","24.564942","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50643","24.568538","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50644","24.568547","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50645","24.569490","172.30.1.205","172.30.1.104","TCP","74","47484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927795 TSecr=0 WS=128" +"50646","24.569762","172.30.1.104","172.30.1.205","TCP","66","135 > 47484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50647","24.569773","172.30.1.205","172.30.1.104","TCP","54","47484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50648","24.570122","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50649","24.570387","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50650","24.570396","172.30.1.205","172.30.1.104","TCP","54","47484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50651","24.572599","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50652","24.572978","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50653","24.572984","172.30.1.205","172.30.1.104","TCP","54","47484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50654","24.574792","172.30.1.205","172.30.1.104","TCP","54","47484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50655","24.574902","172.30.1.205","172.30.1.104","TCP","74","40122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927801 TSecr=0 WS=128" +"50656","24.575144","172.30.1.104","172.30.1.205","TCP","54","135 > 47484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50657","24.575158","172.30.1.104","172.30.1.205","TCP","54","135 > 47484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50658","24.575163","172.30.1.205","172.30.1.104","TCP","54","47484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50659","24.575238","172.30.1.104","172.30.1.205","TCP","66","49671 > 40122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50660","24.575246","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50661","24.575587","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50662","24.575895","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50663","24.575903","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50664","24.577801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50665","24.578176","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50666","24.578183","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50667","24.579524","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50668","24.583093","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50669","24.583102","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50670","24.584030","172.30.1.205","172.30.1.104","TCP","74","47488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927810 TSecr=0 WS=128" +"50671","24.584335","172.30.1.104","172.30.1.205","TCP","66","135 > 47488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50672","24.584347","172.30.1.205","172.30.1.104","TCP","54","47488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50673","24.584706","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50674","24.584989","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50675","24.584998","172.30.1.205","172.30.1.104","TCP","54","47488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50676","24.587264","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50677","24.587638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50678","24.587644","172.30.1.205","172.30.1.104","TCP","54","47488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50679","24.589476","172.30.1.205","172.30.1.104","TCP","54","47488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50680","24.589586","172.30.1.205","172.30.1.104","TCP","74","40126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927816 TSecr=0 WS=128" +"50681","24.589748","172.30.1.104","172.30.1.205","TCP","54","135 > 47488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50682","24.589764","172.30.1.104","172.30.1.205","TCP","54","135 > 47488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50683","24.589769","172.30.1.205","172.30.1.104","TCP","54","47488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50684","24.589876","172.30.1.104","172.30.1.205","TCP","66","49671 > 40126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50685","24.589885","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50686","24.590226","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50687","24.590500","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50688","24.590508","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50689","24.592390","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50690","24.592749","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50691","24.592755","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50692","24.594117","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50693","24.597792","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50694","24.597802","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50695","24.598747","172.30.1.205","172.30.1.104","TCP","74","47492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927825 TSecr=0 WS=128" +"50696","24.599025","172.30.1.104","172.30.1.205","TCP","66","135 > 47492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50697","24.599035","172.30.1.205","172.30.1.104","TCP","54","47492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50698","24.599387","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50699","24.599689","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50700","24.599699","172.30.1.205","172.30.1.104","TCP","54","47492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50701","24.602083","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50702","24.602464","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50703","24.602472","172.30.1.205","172.30.1.104","TCP","54","47492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50704","24.604295","172.30.1.205","172.30.1.104","TCP","54","47492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50705","24.604416","172.30.1.205","172.30.1.104","TCP","74","40130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927830 TSecr=0 WS=128" +"50706","24.604530","172.30.1.104","172.30.1.205","TCP","54","135 > 47492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50707","24.604571","172.30.1.104","172.30.1.205","TCP","54","135 > 47492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50708","24.604577","172.30.1.205","172.30.1.104","TCP","54","47492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50709","24.604700","172.30.1.104","172.30.1.205","TCP","66","49671 > 40130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50710","24.604715","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50711","24.605119","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50712","24.605400","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50713","24.605410","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50714","24.607353","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50715","24.607716","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50716","24.607723","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50717","24.609148","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50718","24.612805","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50719","24.612816","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50720","24.613800","172.30.1.205","172.30.1.104","TCP","74","47496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927840 TSecr=0 WS=128" +"50721","24.614109","172.30.1.104","172.30.1.205","TCP","66","135 > 47496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50722","24.614120","172.30.1.205","172.30.1.104","TCP","54","47496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50723","24.614475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50724","24.614750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50725","24.614759","172.30.1.205","172.30.1.104","TCP","54","47496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50726","24.616976","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50727","24.617348","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50728","24.617354","172.30.1.205","172.30.1.104","TCP","54","47496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50729","24.619231","172.30.1.205","172.30.1.104","TCP","54","47496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50730","24.619343","172.30.1.205","172.30.1.104","TCP","74","40134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927845 TSecr=0 WS=128" +"50731","24.619491","172.30.1.104","172.30.1.205","TCP","54","135 > 47496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50732","24.619513","172.30.1.104","172.30.1.205","TCP","54","135 > 47496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50733","24.619518","172.30.1.205","172.30.1.104","TCP","54","47496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50734","24.619619","172.30.1.104","172.30.1.205","TCP","66","49671 > 40134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50735","24.619632","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50736","24.619977","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50737","24.620257","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50738","24.620266","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50739","24.622191","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50740","24.622548","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50741","24.622555","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50742","24.623906","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50743","24.627533","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50744","24.627542","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50745","24.628497","172.30.1.205","172.30.1.104","TCP","74","47500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927854 TSecr=0 WS=128" +"50746","24.628793","172.30.1.104","172.30.1.205","TCP","66","135 > 47500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50747","24.628805","172.30.1.205","172.30.1.104","TCP","54","47500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50748","24.629167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50749","24.629452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50750","24.629462","172.30.1.205","172.30.1.104","TCP","54","47500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50751","24.631665","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50752","24.632036","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50753","24.632043","172.30.1.205","172.30.1.104","TCP","54","47500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50754","24.633889","172.30.1.205","172.30.1.104","TCP","54","47500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50755","24.634002","172.30.1.205","172.30.1.104","TCP","74","40138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927860 TSecr=0 WS=128" +"50756","24.634140","172.30.1.104","172.30.1.205","TCP","54","135 > 47500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50757","24.634153","172.30.1.104","172.30.1.205","TCP","54","135 > 47500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50758","24.634159","172.30.1.205","172.30.1.104","TCP","54","47500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50759","24.634276","172.30.1.104","172.30.1.205","TCP","66","49671 > 40138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50760","24.634285","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50761","24.634641","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50762","24.634906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50763","24.634915","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50764","24.636851","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50765","24.637300","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50766","24.637306","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50767","24.638677","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50768","24.642364","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50769","24.642376","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50770","24.643376","172.30.1.205","172.30.1.104","TCP","74","47504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927869 TSecr=0 WS=128" +"50771","24.643657","172.30.1.104","172.30.1.205","TCP","66","135 > 47504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50772","24.643668","172.30.1.205","172.30.1.104","TCP","54","47504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50773","24.644023","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50774","24.644329","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50775","24.644338","172.30.1.205","172.30.1.104","TCP","54","47504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50776","24.646593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50777","24.646994","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50778","24.647002","172.30.1.205","172.30.1.104","TCP","54","47504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50779","24.648879","172.30.1.205","172.30.1.104","TCP","54","47504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50780","24.649000","172.30.1.205","172.30.1.104","TCP","74","40142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927875 TSecr=0 WS=128" +"50781","24.649136","172.30.1.104","172.30.1.205","TCP","54","135 > 47504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50782","24.649169","172.30.1.104","172.30.1.205","TCP","54","135 > 47504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50783","24.649176","172.30.1.205","172.30.1.104","TCP","54","47504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50784","24.649261","172.30.1.104","172.30.1.205","TCP","66","49671 > 40142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50785","24.649270","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50786","24.649621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50787","24.649894","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50788","24.649903","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50789","24.651817","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50790","24.652187","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50791","24.652205","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50792","24.653696","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50793","24.657382","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50794","24.657393","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50795","24.658416","172.30.1.205","172.30.1.104","TCP","74","47508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927884 TSecr=0 WS=128" +"50796","24.658744","172.30.1.104","172.30.1.205","TCP","66","135 > 47508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50797","24.658757","172.30.1.205","172.30.1.104","TCP","54","47508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50798","24.659123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50799","24.659403","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50800","24.659412","172.30.1.205","172.30.1.104","TCP","54","47508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50801","24.661693","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50802","24.662087","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50803","24.662094","172.30.1.205","172.30.1.104","TCP","54","47508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50804","24.663940","172.30.1.205","172.30.1.104","TCP","54","47508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50805","24.664088","172.30.1.205","172.30.1.104","TCP","74","40146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927890 TSecr=0 WS=128" +"50806","24.664196","172.30.1.104","172.30.1.205","TCP","54","135 > 47508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50807","24.664210","172.30.1.104","172.30.1.205","TCP","54","135 > 47508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50808","24.664218","172.30.1.205","172.30.1.104","TCP","54","47508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50809","24.664397","172.30.1.104","172.30.1.205","TCP","66","49671 > 40146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50810","24.664406","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50811","24.664793","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50812","24.666149","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50813","24.666161","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50814","24.668098","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50815","24.668533","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50816","24.668540","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50817","24.669962","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50818","24.673760","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50819","24.673779","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50820","24.674933","172.30.1.205","172.30.1.104","TCP","74","47512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927901 TSecr=0 WS=128" +"50821","24.675237","172.30.1.104","172.30.1.205","TCP","66","135 > 47512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50822","24.675250","172.30.1.205","172.30.1.104","TCP","54","47512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50823","24.675631","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50824","24.675903","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50825","24.675912","172.30.1.205","172.30.1.104","TCP","54","47512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50826","24.678190","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50827","24.678581","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50828","24.678588","172.30.1.205","172.30.1.104","TCP","54","47512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50829","24.679477","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50830","24.679528","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50831","24.679566","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50832","24.679601","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50833","24.679635","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50834","24.679664","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50835","24.679696","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50836","24.679729","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50837","24.679757","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50838","24.679768","172.30.1.104","172.30.1.205","TCP","54","49671 > 40106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50839","24.679785","172.30.1.104","172.30.1.205","TCP","54","49671 > 40106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50840","24.679793","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50841","24.679824","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50842","24.679857","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50843","24.679928","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50844","24.680042","172.30.1.104","172.30.1.205","TCP","54","49671 > 40110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50845","24.680061","172.30.1.104","172.30.1.205","TCP","54","49671 > 40114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50846","24.680080","172.30.1.104","172.30.1.205","TCP","54","49671 > 40118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50847","24.680099","172.30.1.104","172.30.1.205","TCP","54","49671 > 40122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50848","24.680119","172.30.1.104","172.30.1.205","TCP","54","49671 > 40126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50849","24.680139","172.30.1.104","172.30.1.205","TCP","54","49671 > 40130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50850","24.680169","172.30.1.104","172.30.1.205","TCP","54","49671 > 40130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50851","24.680175","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50852","24.680189","172.30.1.104","172.30.1.205","TCP","54","49671 > 40126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50853","24.680191","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50854","24.680222","172.30.1.104","172.30.1.205","TCP","54","49671 > 40122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50855","24.680225","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50856","24.680262","172.30.1.104","172.30.1.205","TCP","54","49671 > 40110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50857","24.680266","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50858","24.680281","172.30.1.104","172.30.1.205","TCP","54","49671 > 40114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50859","24.680284","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50860","24.680300","172.30.1.104","172.30.1.205","TCP","54","49671 > 40118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50861","24.680307","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50862","24.680429","172.30.1.104","172.30.1.205","TCP","54","49671 > 40134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50863","24.680450","172.30.1.104","172.30.1.205","TCP","54","49671 > 40138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50864","24.680470","172.30.1.104","172.30.1.205","TCP","54","49671 > 40142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50865","24.680490","172.30.1.104","172.30.1.205","TCP","54","49671 > 40146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50866","24.680509","172.30.1.104","172.30.1.205","TCP","54","49671 > 40102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50867","24.680708","172.30.1.104","172.30.1.205","TCP","54","49671 > 40102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50868","24.680714","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50869","24.680726","172.30.1.104","172.30.1.205","TCP","54","49671 > 40146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50870","24.680728","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50871","24.680747","172.30.1.104","172.30.1.205","TCP","54","49671 > 40134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50872","24.680749","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50873","24.680787","172.30.1.104","172.30.1.205","TCP","54","49671 > 40138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50874","24.680791","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50875","24.680807","172.30.1.104","172.30.1.205","TCP","54","49671 > 40142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"50876","24.680810","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"50877","24.681536","172.30.1.205","172.30.1.104","TCP","54","47512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50878","24.681670","172.30.1.205","172.30.1.104","TCP","74","40150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927908 TSecr=0 WS=128" +"50879","24.681792","172.30.1.104","172.30.1.205","TCP","54","135 > 47512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50880","24.681802","172.30.1.104","172.30.1.205","TCP","54","135 > 47512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50881","24.681807","172.30.1.205","172.30.1.104","TCP","54","47512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50882","24.681934","172.30.1.104","172.30.1.205","TCP","66","49671 > 40150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50883","24.681943","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50884","24.682296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50885","24.682588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50886","24.682596","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50887","24.684480","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50888","24.684833","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50889","24.684840","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50890","24.686225","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50891","24.689924","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50892","24.689934","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50893","24.690925","172.30.1.205","172.30.1.104","TCP","74","47516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927917 TSecr=0 WS=128" +"50894","24.691233","172.30.1.104","172.30.1.205","TCP","66","135 > 47516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50895","24.691245","172.30.1.205","172.30.1.104","TCP","54","47516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50896","24.691603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50897","24.691902","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50898","24.691912","172.30.1.205","172.30.1.104","TCP","54","47516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50899","24.694132","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50900","24.694509","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50901","24.694515","172.30.1.205","172.30.1.104","TCP","54","47516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50902","24.696373","172.30.1.205","172.30.1.104","TCP","54","47516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50903","24.696495","172.30.1.205","172.30.1.104","TCP","74","40154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927922 TSecr=0 WS=128" +"50904","24.696646","172.30.1.104","172.30.1.205","TCP","54","135 > 47516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50905","24.696676","172.30.1.104","172.30.1.205","TCP","54","135 > 47516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50906","24.696683","172.30.1.205","172.30.1.104","TCP","54","47516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50907","24.696791","172.30.1.104","172.30.1.205","TCP","66","49671 > 40154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50908","24.696801","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50909","24.697182","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50910","24.697440","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50911","24.697448","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50912","24.699324","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50913","24.699798","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50914","24.699804","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50915","24.701195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50916","24.704867","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50917","24.704877","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50918","24.705856","172.30.1.205","172.30.1.104","TCP","74","47520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927932 TSecr=0 WS=128" +"50919","24.706165","172.30.1.104","172.30.1.205","TCP","66","135 > 47520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50920","24.706176","172.30.1.205","172.30.1.104","TCP","54","47520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50921","24.706532","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50922","24.706824","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50923","24.706837","172.30.1.205","172.30.1.104","TCP","54","47520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50924","24.709068","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50925","24.709434","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50926","24.709440","172.30.1.205","172.30.1.104","TCP","54","47520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50927","24.711260","172.30.1.205","172.30.1.104","TCP","54","47520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50928","24.711372","172.30.1.205","172.30.1.104","TCP","74","40158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927937 TSecr=0 WS=128" +"50929","24.711514","172.30.1.104","172.30.1.205","TCP","54","135 > 47520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50930","24.711543","172.30.1.104","172.30.1.205","TCP","54","135 > 47520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50931","24.711548","172.30.1.205","172.30.1.104","TCP","54","47520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50932","24.711646","172.30.1.104","172.30.1.205","TCP","66","49671 > 40158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50933","24.711655","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50934","24.712001","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50935","24.712295","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50936","24.712305","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50937","24.714217","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50938","24.714630","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50939","24.714634","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50940","24.715996","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50941","24.719644","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50942","24.719662","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50943","24.720881","172.30.1.205","172.30.1.104","TCP","74","47524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927947 TSecr=0 WS=128" +"50944","24.721198","172.30.1.104","172.30.1.205","TCP","66","135 > 47524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50945","24.721210","172.30.1.205","172.30.1.104","TCP","54","47524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50946","24.721572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50947","24.721848","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50948","24.721857","172.30.1.205","172.30.1.104","TCP","54","47524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50949","24.724095","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50950","24.724469","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50951","24.724476","172.30.1.205","172.30.1.104","TCP","54","47524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50952","24.726345","172.30.1.205","172.30.1.104","TCP","54","47524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50953","24.726458","172.30.1.205","172.30.1.104","TCP","74","40162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927952 TSecr=0 WS=128" +"50954","24.726615","172.30.1.104","172.30.1.205","TCP","54","135 > 47524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50955","24.726649","172.30.1.104","172.30.1.205","TCP","54","135 > 47524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50956","24.726654","172.30.1.205","172.30.1.104","TCP","54","47524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50957","24.726787","172.30.1.104","172.30.1.205","TCP","66","49671 > 40162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50958","24.726795","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50959","24.727149","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50960","24.727473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50961","24.727481","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50962","24.729403","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50963","24.729776","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50964","24.729782","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50965","24.731139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50966","24.734823","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50967","24.734832","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50968","24.735788","172.30.1.205","172.30.1.104","TCP","74","47528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927962 TSecr=0 WS=128" +"50969","24.736106","172.30.1.104","172.30.1.205","TCP","66","135 > 47528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50970","24.736118","172.30.1.205","172.30.1.104","TCP","54","47528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50971","24.736481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50972","24.736784","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50973","24.736793","172.30.1.205","172.30.1.104","TCP","54","47528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50974","24.738993","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"50975","24.739375","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"50976","24.739381","172.30.1.205","172.30.1.104","TCP","54","47528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50977","24.741224","172.30.1.205","172.30.1.104","TCP","54","47528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"50978","24.741336","172.30.1.205","172.30.1.104","TCP","74","40166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927967 TSecr=0 WS=128" +"50979","24.741492","172.30.1.104","172.30.1.205","TCP","54","135 > 47528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50980","24.741504","172.30.1.104","172.30.1.205","TCP","54","135 > 47528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"50981","24.741509","172.30.1.205","172.30.1.104","TCP","54","47528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"50982","24.741628","172.30.1.104","172.30.1.205","TCP","66","49671 > 40166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50983","24.741636","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50984","24.741986","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"50985","24.742390","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50986","24.742399","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50987","24.744285","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"50988","24.744648","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"50989","24.744654","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"50990","24.746032","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"50991","24.749872","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"50992","24.749897","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"50993","24.750869","172.30.1.205","172.30.1.104","TCP","74","47532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927977 TSecr=0 WS=128" +"50994","24.751149","172.30.1.104","172.30.1.205","TCP","66","135 > 47532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"50995","24.751160","172.30.1.205","172.30.1.104","TCP","54","47532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"50996","24.751508","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"50997","24.751798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"50998","24.751807","172.30.1.205","172.30.1.104","TCP","54","47532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"50999","24.754026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51000","24.754399","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51001","24.754406","172.30.1.205","172.30.1.104","TCP","54","47532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51002","24.756219","172.30.1.205","172.30.1.104","TCP","54","47532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51003","24.756331","172.30.1.205","172.30.1.104","TCP","74","40170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927982 TSecr=0 WS=128" +"51004","24.756496","172.30.1.104","172.30.1.205","TCP","54","135 > 47532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51005","24.756527","172.30.1.104","172.30.1.205","TCP","54","135 > 47532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51006","24.756533","172.30.1.205","172.30.1.104","TCP","54","47532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51007","24.756603","172.30.1.104","172.30.1.205","TCP","66","49671 > 40170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51008","24.756612","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51009","24.756996","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51010","24.757273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51011","24.757282","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51012","24.759186","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51013","24.759554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51014","24.759561","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51015","24.761006","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51016","24.764838","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51017","24.764848","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51018","24.765804","172.30.1.205","172.30.1.104","TCP","74","47536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927992 TSecr=0 WS=128" +"51019","24.766119","172.30.1.104","172.30.1.205","TCP","66","135 > 47536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51020","24.766130","172.30.1.205","172.30.1.104","TCP","54","47536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51021","24.766478","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51022","24.766792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51023","24.766801","172.30.1.205","172.30.1.104","TCP","54","47536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51024","24.769008","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51025","24.769404","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51026","24.769411","172.30.1.205","172.30.1.104","TCP","54","47536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51027","24.771248","172.30.1.205","172.30.1.104","TCP","54","47536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51028","24.771359","172.30.1.205","172.30.1.104","TCP","74","40174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927997 TSecr=0 WS=128" +"51029","24.771527","172.30.1.104","172.30.1.205","TCP","54","135 > 47536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51030","24.771557","172.30.1.104","172.30.1.205","TCP","54","135 > 47536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51031","24.771562","172.30.1.205","172.30.1.104","TCP","54","47536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51032","24.771643","172.30.1.104","172.30.1.205","TCP","66","49671 > 40174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51033","24.771651","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51034","24.771998","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51035","24.772294","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51036","24.772303","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51037","24.774217","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51038","24.774592","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51039","24.774598","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51040","24.775950","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51041","24.780676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51042","24.780705","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51043","24.781908","172.30.1.205","172.30.1.104","TCP","74","47540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928008 TSecr=0 WS=128" +"51044","24.782294","172.30.1.104","172.30.1.205","TCP","66","135 > 47540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51045","24.782307","172.30.1.205","172.30.1.104","TCP","54","47540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51046","24.782669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51047","24.783000","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51048","24.783018","172.30.1.205","172.30.1.104","TCP","54","47540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51049","24.785437","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51050","24.785868","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51051","24.785881","172.30.1.205","172.30.1.104","TCP","54","47540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51052","24.787923","172.30.1.205","172.30.1.104","TCP","54","47540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51053","24.788047","172.30.1.205","172.30.1.104","TCP","74","40178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928014 TSecr=0 WS=128" +"51054","24.788194","172.30.1.104","172.30.1.205","TCP","54","135 > 47540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51055","24.788224","172.30.1.104","172.30.1.205","TCP","54","135 > 47540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51056","24.788230","172.30.1.205","172.30.1.104","TCP","54","47540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51057","24.788337","172.30.1.104","172.30.1.205","TCP","66","49671 > 40178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51058","24.788345","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51059","24.788690","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51060","24.788999","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51061","24.789008","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51062","24.790877","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51063","24.791498","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51064","24.791504","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51065","24.792880","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51066","24.796841","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51067","24.796855","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51068","24.797899","172.30.1.205","172.30.1.104","TCP","74","47544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928024 TSecr=0 WS=128" +"51069","24.798250","172.30.1.104","172.30.1.205","TCP","66","135 > 47544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51070","24.798262","172.30.1.205","172.30.1.104","TCP","54","47544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51071","24.798622","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51072","24.798923","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51073","24.798933","172.30.1.205","172.30.1.104","TCP","54","47544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51074","24.801153","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51075","24.801594","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51076","24.801601","172.30.1.205","172.30.1.104","TCP","54","47544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51077","24.803422","172.30.1.205","172.30.1.104","TCP","54","47544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51078","24.803532","172.30.1.205","172.30.1.104","TCP","74","40182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928029 TSecr=0 WS=128" +"51079","24.803690","172.30.1.104","172.30.1.205","TCP","54","135 > 47544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51080","24.803701","172.30.1.104","172.30.1.205","TCP","54","135 > 47544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51081","24.803707","172.30.1.205","172.30.1.104","TCP","54","47544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51082","24.803815","172.30.1.104","172.30.1.205","TCP","66","49671 > 40182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51083","24.803828","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51084","24.804185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51085","24.804465","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51086","24.804475","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51087","24.806371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51088","24.806772","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51089","24.806778","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51090","24.808161","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51091","24.811960","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51092","24.811969","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51093","24.812923","172.30.1.205","172.30.1.104","TCP","74","47548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928039 TSecr=0 WS=128" +"51094","24.813317","172.30.1.104","172.30.1.205","TCP","66","135 > 47548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51095","24.813328","172.30.1.205","172.30.1.104","TCP","54","47548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51096","24.813696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51097","24.813988","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51098","24.813998","172.30.1.205","172.30.1.104","TCP","54","47548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51099","24.816177","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51100","24.816639","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51101","24.816646","172.30.1.205","172.30.1.104","TCP","54","47548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51102","24.818476","172.30.1.205","172.30.1.104","TCP","54","47548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51103","24.818588","172.30.1.205","172.30.1.104","TCP","74","40186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928045 TSecr=0 WS=128" +"51104","24.818760","172.30.1.104","172.30.1.205","TCP","54","135 > 47548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51105","24.818771","172.30.1.104","172.30.1.205","TCP","54","135 > 47548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51106","24.818785","172.30.1.205","172.30.1.104","TCP","54","47548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51107","24.818931","172.30.1.104","172.30.1.205","TCP","66","49671 > 40186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51108","24.818939","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51109","24.819298","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51110","24.820748","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51111","24.820755","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51112","24.822633","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51113","24.823006","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51114","24.823013","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51115","24.824370","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51116","24.828178","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51117","24.828189","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51118","24.829174","172.30.1.205","172.30.1.104","TCP","74","47552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928055 TSecr=0 WS=128" +"51119","24.829469","172.30.1.104","172.30.1.205","TCP","66","135 > 47552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51120","24.829480","172.30.1.205","172.30.1.104","TCP","54","47552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51121","24.829840","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51122","24.830148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51123","24.830157","172.30.1.205","172.30.1.104","TCP","54","47552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51124","24.832347","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51125","24.832788","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51126","24.832795","172.30.1.205","172.30.1.104","TCP","54","47552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51127","24.834603","172.30.1.205","172.30.1.104","TCP","54","47552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51128","24.834714","172.30.1.205","172.30.1.104","TCP","74","40190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928061 TSecr=0 WS=128" +"51129","24.834859","172.30.1.104","172.30.1.205","TCP","54","135 > 47552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51130","24.834914","172.30.1.104","172.30.1.205","TCP","54","135 > 47552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51131","24.834919","172.30.1.205","172.30.1.104","TCP","54","47552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51132","24.835005","172.30.1.104","172.30.1.205","TCP","66","49671 > 40190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51133","24.835014","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51134","24.835363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51135","24.835665","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51136","24.835674","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51137","24.837596","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51138","24.837981","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51139","24.837987","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51140","24.839336","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51141","24.843106","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51142","24.843115","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51143","24.844056","172.30.1.205","172.30.1.104","TCP","74","47556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928070 TSecr=0 WS=128" +"51144","24.844421","172.30.1.104","172.30.1.205","TCP","66","135 > 47556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51145","24.844433","172.30.1.205","172.30.1.104","TCP","54","47556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51146","24.844809","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51147","24.845111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51148","24.845120","172.30.1.205","172.30.1.104","TCP","54","47556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51149","24.847313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51150","24.847726","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51151","24.847732","172.30.1.205","172.30.1.104","TCP","54","47556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51152","24.849563","172.30.1.205","172.30.1.104","TCP","54","47556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51153","24.849675","172.30.1.205","172.30.1.104","TCP","74","40194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928076 TSecr=0 WS=128" +"51154","24.850047","172.30.1.104","172.30.1.205","TCP","54","135 > 47556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51155","24.850056","172.30.1.104","172.30.1.205","TCP","54","135 > 47556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51156","24.850061","172.30.1.205","172.30.1.104","TCP","54","47556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51157","24.850067","172.30.1.104","172.30.1.205","TCP","66","49671 > 40194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51158","24.850078","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51159","24.850425","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51160","24.850738","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51161","24.850747","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51162","24.852620","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51163","24.852987","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51164","24.852993","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51165","24.854350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51166","24.858279","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51167","24.858289","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51168","24.859236","172.30.1.205","172.30.1.104","TCP","74","47560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928085 TSecr=0 WS=128" +"51169","24.859629","172.30.1.104","172.30.1.205","TCP","66","135 > 47560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51170","24.859640","172.30.1.205","172.30.1.104","TCP","54","47560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51171","24.860000","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51172","24.860314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51173","24.860326","172.30.1.205","172.30.1.104","TCP","54","47560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51174","24.862558","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51175","24.863010","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51176","24.863017","172.30.1.205","172.30.1.104","TCP","54","47560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51177","24.863861","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51178","24.863911","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51179","24.863948","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51180","24.863982","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51181","24.864016","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51182","24.864048","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51183","24.864080","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51184","24.864106","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51185","24.864133","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51186","24.864155","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51187","24.864182","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51188","24.864252","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51189","24.864344","172.30.1.104","172.30.1.205","TCP","54","49671 > 40154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51190","24.864353","172.30.1.104","172.30.1.205","TCP","54","49671 > 40158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51191","24.864356","172.30.1.104","172.30.1.205","TCP","54","49671 > 40154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51192","24.864362","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51193","24.864369","172.30.1.104","172.30.1.205","TCP","54","49671 > 40162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51194","24.864379","172.30.1.104","172.30.1.205","TCP","54","49671 > 40166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51195","24.865033","172.30.1.104","172.30.1.205","TCP","54","49671 > 40166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51196","24.865040","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51197","24.865047","172.30.1.104","172.30.1.205","TCP","54","49671 > 40170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51198","24.865054","172.30.1.104","172.30.1.205","TCP","54","49671 > 40170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51199","24.865061","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51200","24.865062","172.30.1.104","172.30.1.205","TCP","54","49671 > 40158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51201","24.865064","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51202","24.865066","172.30.1.104","172.30.1.205","TCP","54","49671 > 40162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51203","24.865067","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51204","24.865069","172.30.1.104","172.30.1.205","TCP","54","49671 > 40174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51205","24.865072","172.30.1.104","172.30.1.205","TCP","54","49671 > 40178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51206","24.865075","172.30.1.104","172.30.1.205","TCP","54","49671 > 40174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51207","24.865077","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51208","24.865079","172.30.1.104","172.30.1.205","TCP","54","49671 > 40182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51209","24.865082","172.30.1.104","172.30.1.205","TCP","54","49671 > 40190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51210","24.865084","172.30.1.104","172.30.1.205","TCP","54","49671 > 40178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51211","24.865086","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51212","24.865088","172.30.1.104","172.30.1.205","TCP","54","49671 > 40186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51213","24.865091","172.30.1.104","172.30.1.205","TCP","54","49671 > 40186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51214","24.865092","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51215","24.865094","172.30.1.104","172.30.1.205","TCP","54","49671 > 40194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51216","24.865096","172.30.1.104","172.30.1.205","TCP","54","49671 > 40194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51217","24.865098","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51218","24.865099","172.30.1.104","172.30.1.205","TCP","54","49671 > 40150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51219","24.865102","172.30.1.104","172.30.1.205","TCP","54","49671 > 40150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51220","24.865104","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51221","24.865105","172.30.1.104","172.30.1.205","TCP","54","49671 > 40182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51222","24.865107","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51223","24.865108","172.30.1.104","172.30.1.205","TCP","54","49671 > 40190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51224","24.865109","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51225","24.865740","172.30.1.205","172.30.1.104","TCP","54","47560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51226","24.865856","172.30.1.205","172.30.1.104","TCP","74","40198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928092 TSecr=0 WS=128" +"51227","24.865988","172.30.1.104","172.30.1.205","TCP","54","135 > 47560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51228","24.866022","172.30.1.104","172.30.1.205","TCP","54","135 > 47560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51229","24.866027","172.30.1.205","172.30.1.104","TCP","54","47560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51230","24.866129","172.30.1.104","172.30.1.205","TCP","66","49671 > 40198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51231","24.866137","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51232","24.866492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51233","24.866782","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51234","24.866791","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51235","24.868690","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51236","24.869448","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51237","24.869455","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51238","24.870837","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51239","24.874646","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51240","24.874656","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51241","24.875627","172.30.1.205","172.30.1.104","TCP","74","47564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928102 TSecr=0 WS=128" +"51242","24.875957","172.30.1.104","172.30.1.205","TCP","66","135 > 47564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51243","24.875970","172.30.1.205","172.30.1.104","TCP","54","47564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51244","24.876339","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51245","24.876635","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51246","24.876644","172.30.1.205","172.30.1.104","TCP","54","47564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51247","24.878836","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51248","24.879253","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51249","24.879260","172.30.1.205","172.30.1.104","TCP","54","47564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51250","24.881104","172.30.1.205","172.30.1.104","TCP","54","47564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51251","24.881219","172.30.1.205","172.30.1.104","TCP","74","40202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928107 TSecr=0 WS=128" +"51252","24.881379","172.30.1.104","172.30.1.205","TCP","54","135 > 47564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51253","24.881391","172.30.1.104","172.30.1.205","TCP","54","135 > 47564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51254","24.881397","172.30.1.205","172.30.1.104","TCP","54","47564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51255","24.881522","172.30.1.104","172.30.1.205","TCP","66","49671 > 40202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51256","24.881530","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51257","24.881880","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51258","24.882198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51259","24.882207","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51260","24.884107","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51261","24.884470","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51262","24.884476","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51263","24.885888","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51264","24.889751","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51265","24.889762","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51266","24.890749","172.30.1.205","172.30.1.104","TCP","74","47568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928117 TSecr=0 WS=128" +"51267","24.891073","172.30.1.104","172.30.1.205","TCP","66","135 > 47568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51268","24.891085","172.30.1.205","172.30.1.104","TCP","54","47568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51269","24.891441","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51270","24.891795","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51271","24.891805","172.30.1.205","172.30.1.104","TCP","54","47568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51272","24.894047","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51273","24.894454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51274","24.894461","172.30.1.205","172.30.1.104","TCP","54","47568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51275","24.896279","172.30.1.205","172.30.1.104","TCP","54","47568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51276","24.896397","172.30.1.205","172.30.1.104","TCP","74","40206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928122 TSecr=0 WS=128" +"51277","24.896547","172.30.1.104","172.30.1.205","TCP","54","135 > 47568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51278","24.896558","172.30.1.104","172.30.1.205","TCP","54","135 > 47568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51279","24.896565","172.30.1.205","172.30.1.104","TCP","54","47568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51280","24.896670","172.30.1.104","172.30.1.205","TCP","66","49671 > 40206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51281","24.896678","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51282","24.897053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51283","24.897347","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51284","24.897355","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51285","24.899253","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51286","24.900435","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51287","24.900442","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51288","24.901821","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51289","24.905704","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51290","24.905714","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51291","24.906678","172.30.1.205","172.30.1.104","TCP","74","47572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928133 TSecr=0 WS=128" +"51292","24.906994","172.30.1.104","172.30.1.205","TCP","66","135 > 47572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51293","24.907004","172.30.1.205","172.30.1.104","TCP","54","47572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51294","24.907359","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51295","24.907699","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51296","24.907708","172.30.1.205","172.30.1.104","TCP","54","47572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51297","24.909937","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51298","24.910341","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51299","24.910347","172.30.1.205","172.30.1.104","TCP","54","47572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51300","24.912181","172.30.1.205","172.30.1.104","TCP","54","47572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51301","24.912304","172.30.1.205","172.30.1.104","TCP","74","40210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928138 TSecr=0 WS=128" +"51302","24.912439","172.30.1.104","172.30.1.205","TCP","54","135 > 47572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51303","24.912461","172.30.1.104","172.30.1.205","TCP","54","135 > 47572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51304","24.912467","172.30.1.205","172.30.1.104","TCP","54","47572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51305","24.912650","172.30.1.104","172.30.1.205","TCP","66","49671 > 40210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51306","24.912658","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51307","24.913038","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51308","24.913332","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51309","24.913341","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51310","24.915224","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51311","24.915606","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51312","24.915612","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51313","24.917000","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51314","24.920942","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51315","24.920951","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51316","24.921900","172.30.1.205","172.30.1.104","TCP","74","47576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928148 TSecr=0 WS=128" +"51317","24.922212","172.30.1.104","172.30.1.205","TCP","66","135 > 47576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51318","24.922222","172.30.1.205","172.30.1.104","TCP","54","47576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51319","24.922573","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51320","24.922876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51321","24.922885","172.30.1.205","172.30.1.104","TCP","54","47576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51322","24.925085","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51323","24.925531","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51324","24.925537","172.30.1.205","172.30.1.104","TCP","54","47576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51325","24.927358","172.30.1.205","172.30.1.104","TCP","54","47576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51326","24.927470","172.30.1.205","172.30.1.104","TCP","74","40214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928153 TSecr=0 WS=128" +"51327","24.927665","172.30.1.104","172.30.1.205","TCP","54","135 > 47576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51328","24.927784","172.30.1.104","172.30.1.205","TCP","66","49671 > 40214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51329","24.927793","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51330","24.927922","172.30.1.104","172.30.1.205","TCP","54","135 > 47576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51331","24.927929","172.30.1.205","172.30.1.104","TCP","54","47576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51332","24.928186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51333","24.928472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51334","24.928480","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51335","24.930439","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51336","24.930835","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51337","24.930841","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51338","24.932237","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51339","24.936219","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51340","24.936229","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51341","24.937203","172.30.1.205","172.30.1.104","TCP","74","47580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928163 TSecr=0 WS=128" +"51342","24.937617","172.30.1.104","172.30.1.205","TCP","66","135 > 47580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51343","24.937629","172.30.1.205","172.30.1.104","TCP","54","47580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51344","24.937995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51345","24.938295","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51346","24.938304","172.30.1.205","172.30.1.104","TCP","54","47580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51347","24.940495","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51348","24.940897","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51349","24.940904","172.30.1.205","172.30.1.104","TCP","54","47580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51350","24.942726","172.30.1.205","172.30.1.104","TCP","54","47580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51351","24.942838","172.30.1.205","172.30.1.104","TCP","74","40218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928169 TSecr=0 WS=128" +"51352","24.942987","172.30.1.104","172.30.1.205","TCP","54","135 > 47580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51353","24.943028","172.30.1.104","172.30.1.205","TCP","54","135 > 47580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51354","24.943034","172.30.1.205","172.30.1.104","TCP","54","47580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51355","24.943128","172.30.1.104","172.30.1.205","TCP","66","49671 > 40218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51356","24.943136","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51357","24.943503","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51358","24.943800","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51359","24.943809","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51360","24.945714","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51361","24.946110","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51362","24.946117","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51363","24.947483","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51364","24.952533","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51365","24.952544","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51366","24.953526","172.30.1.205","172.30.1.104","TCP","74","47584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928179 TSecr=0 WS=128" +"51367","24.953866","172.30.1.104","172.30.1.205","TCP","66","135 > 47584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51368","24.953878","172.30.1.205","172.30.1.104","TCP","54","47584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51369","24.954249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51370","24.954598","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51371","24.954608","172.30.1.205","172.30.1.104","TCP","54","47584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51372","24.956836","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51373","24.957237","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51374","24.957243","172.30.1.205","172.30.1.104","TCP","54","47584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51375","24.959060","172.30.1.205","172.30.1.104","TCP","54","47584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51376","24.959175","172.30.1.205","172.30.1.104","TCP","74","40222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928185 TSecr=0 WS=128" +"51377","24.959324","172.30.1.104","172.30.1.205","TCP","54","135 > 47584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51378","24.959334","172.30.1.104","172.30.1.205","TCP","54","135 > 47584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51379","24.959339","172.30.1.205","172.30.1.104","TCP","54","47584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51380","24.959467","172.30.1.104","172.30.1.205","TCP","66","49671 > 40222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51381","24.959475","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51382","24.959822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51383","24.960114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51384","24.960123","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51385","24.962059","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51386","24.963392","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51387","24.963399","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51388","24.964818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51389","24.968696","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51390","24.968705","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51391","24.969696","172.30.1.205","172.30.1.104","TCP","74","47588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928196 TSecr=0 WS=128" +"51392","24.970037","172.30.1.104","172.30.1.205","TCP","66","135 > 47588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51393","24.970049","172.30.1.205","172.30.1.104","TCP","54","47588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51394","24.970411","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51395","24.970694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51396","24.970703","172.30.1.205","172.30.1.104","TCP","54","47588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51397","24.972957","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51398","24.973347","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51399","24.973353","172.30.1.205","172.30.1.104","TCP","54","47588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51400","24.975169","172.30.1.205","172.30.1.104","TCP","54","47588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51401","24.975282","172.30.1.205","172.30.1.104","TCP","74","40226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928201 TSecr=0 WS=128" +"51402","24.975442","172.30.1.104","172.30.1.205","TCP","54","135 > 47588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51403","24.975452","172.30.1.104","172.30.1.205","TCP","54","135 > 47588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51404","24.975458","172.30.1.205","172.30.1.104","TCP","54","47588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51405","24.975555","172.30.1.104","172.30.1.205","TCP","66","49671 > 40226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51406","24.975564","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51407","24.975929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51408","24.976213","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51409","24.976225","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51410","24.978180","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51411","24.978606","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51412","24.978613","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51413","24.979976","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51414","24.983885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51415","24.983894","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51416","24.984871","172.30.1.205","172.30.1.104","TCP","74","47592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928211 TSecr=0 WS=128" +"51417","24.985258","172.30.1.104","172.30.1.205","TCP","66","135 > 47592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51418","24.985270","172.30.1.205","172.30.1.104","TCP","54","47592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51419","24.985629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51420","24.985944","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51421","24.985954","172.30.1.205","172.30.1.104","TCP","54","47592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51422","24.988170","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51423","24.988625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51424","24.988632","172.30.1.205","172.30.1.104","TCP","54","47592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51425","24.990487","172.30.1.205","172.30.1.104","TCP","54","47592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51426","24.990599","172.30.1.205","172.30.1.104","TCP","74","40230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928217 TSecr=0 WS=128" +"51427","24.990770","172.30.1.104","172.30.1.205","TCP","54","135 > 47592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51428","24.990829","172.30.1.104","172.30.1.205","TCP","54","135 > 47592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51429","24.990834","172.30.1.205","172.30.1.104","TCP","54","47592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51430","24.990925","172.30.1.104","172.30.1.205","TCP","66","49671 > 40230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51431","24.990933","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51432","24.991283","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51433","24.992510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51434","24.992517","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51435","24.994408","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51436","24.994798","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51437","24.994804","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51438","24.996150","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51439","25.000120","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51440","25.000142","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51441","25.001268","172.30.1.205","172.30.1.104","TCP","74","47596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928227 TSecr=0 WS=128" +"51442","25.001670","172.30.1.104","172.30.1.205","TCP","66","135 > 47596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51443","25.001681","172.30.1.205","172.30.1.104","TCP","54","47596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51444","25.002035","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51445","25.002378","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51446","25.002396","172.30.1.205","172.30.1.104","TCP","54","47596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51447","25.004587","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51448","25.007790","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51449","25.007796","172.30.1.205","172.30.1.104","TCP","54","47596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51450","25.009658","172.30.1.205","172.30.1.104","TCP","54","47596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51451","25.009773","172.30.1.205","172.30.1.104","TCP","74","40234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928236 TSecr=0 WS=128" +"51452","25.009954","172.30.1.104","172.30.1.205","TCP","54","135 > 47596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51453","25.010023","172.30.1.104","172.30.1.205","TCP","54","135 > 47596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51454","25.010034","172.30.1.205","172.30.1.104","TCP","54","47596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51455","25.010052","172.30.1.104","172.30.1.205","TCP","66","49671 > 40234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51456","25.010064","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51457","25.010469","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51458","25.010850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51459","25.010864","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51460","25.012878","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51461","25.013272","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51462","25.013279","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51463","25.014656","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51464","25.018563","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51465","25.018576","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51466","25.019644","172.30.1.205","172.30.1.104","TCP","74","47600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928246 TSecr=0 WS=128" +"51467","25.020030","172.30.1.104","172.30.1.205","TCP","66","135 > 47600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51468","25.020044","172.30.1.205","172.30.1.104","TCP","54","47600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51469","25.020426","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51470","25.020736","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51471","25.020747","172.30.1.205","172.30.1.104","TCP","54","47600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51472","25.023036","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51473","25.023515","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51474","25.023523","172.30.1.205","172.30.1.104","TCP","54","47600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51475","25.025389","172.30.1.205","172.30.1.104","TCP","54","47600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51476","25.025530","172.30.1.205","172.30.1.104","TCP","74","40238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928251 TSecr=0 WS=128" +"51477","25.025722","172.30.1.104","172.30.1.205","TCP","54","135 > 47600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51478","25.025733","172.30.1.104","172.30.1.205","TCP","54","135 > 47600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51479","25.025741","172.30.1.205","172.30.1.104","TCP","54","47600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51480","25.025818","172.30.1.104","172.30.1.205","TCP","66","49671 > 40238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51481","25.025827","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51482","25.026180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51483","25.026493","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51484","25.026502","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51485","25.028401","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51486","25.028840","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51487","25.028847","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51488","25.030218","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51489","25.034184","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51490","25.034195","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51491","25.035221","172.30.1.205","172.30.1.104","TCP","74","47604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928261 TSecr=0 WS=128" +"51492","25.035567","172.30.1.104","172.30.1.205","TCP","66","135 > 47604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51493","25.035580","172.30.1.205","172.30.1.104","TCP","54","47604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51494","25.035940","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51495","25.036266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51496","25.036277","172.30.1.205","172.30.1.104","TCP","54","47604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51497","25.038554","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51498","25.039015","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51499","25.039022","172.30.1.205","172.30.1.104","TCP","54","47604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51500","25.040866","172.30.1.205","172.30.1.104","TCP","54","47604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51501","25.040991","172.30.1.205","172.30.1.104","TCP","74","40242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928267 TSecr=0 WS=128" +"51502","25.041174","172.30.1.104","172.30.1.205","TCP","54","135 > 47604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51503","25.041205","172.30.1.104","172.30.1.205","TCP","54","135 > 47604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51504","25.041213","172.30.1.205","172.30.1.104","TCP","54","47604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51505","25.041378","172.30.1.104","172.30.1.205","TCP","66","49671 > 40242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51506","25.041387","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51507","25.041738","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51508","25.042069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51509","25.042080","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51510","25.043999","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51511","25.044792","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51512","25.044799","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51513","25.046174","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51514","25.050089","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51515","25.050101","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51516","25.051118","172.30.1.205","172.30.1.104","TCP","74","47608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928277 TSecr=0 WS=128" +"51517","25.051450","172.30.1.104","172.30.1.205","TCP","66","135 > 47608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51518","25.051462","172.30.1.205","172.30.1.104","TCP","54","47608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51519","25.051814","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51520","25.052126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51521","25.052135","172.30.1.205","172.30.1.104","TCP","54","47608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51522","25.054371","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51523","25.054794","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51524","25.054801","172.30.1.205","172.30.1.104","TCP","54","47608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51525","25.055660","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51526","25.055712","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51527","25.055749","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51528","25.055782","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51529","25.055815","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51530","25.055843","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51531","25.055875","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51532","25.055901","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51533","25.055923","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51534","25.055949","172.30.1.104","172.30.1.205","TCP","54","49671 > 40202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51535","25.055965","172.30.1.104","172.30.1.205","TCP","54","49671 > 40206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51536","25.055970","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51537","25.056002","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51538","25.056076","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51539","25.056086","172.30.1.104","172.30.1.205","TCP","54","49671 > 40210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51540","25.056109","172.30.1.104","172.30.1.205","TCP","54","49671 > 40210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51541","25.056117","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51542","25.056130","172.30.1.104","172.30.1.205","TCP","54","49671 > 40202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51543","25.056133","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51544","25.056151","172.30.1.104","172.30.1.205","TCP","54","49671 > 40214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51545","25.056171","172.30.1.104","172.30.1.205","TCP","54","49671 > 40218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51546","25.056192","172.30.1.104","172.30.1.205","TCP","54","49671 > 40218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51547","25.056196","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51548","25.056214","172.30.1.104","172.30.1.205","TCP","54","49671 > 40222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51549","25.056338","172.30.1.104","172.30.1.205","TCP","54","49671 > 40222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51550","25.056344","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51551","25.056359","172.30.1.104","172.30.1.205","TCP","54","49671 > 40226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51552","25.056383","172.30.1.104","172.30.1.205","TCP","54","49671 > 40226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51553","25.056387","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51554","25.056449","172.30.1.104","172.30.1.205","TCP","54","49671 > 40206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51555","25.056453","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51556","25.056459","172.30.1.104","172.30.1.205","TCP","54","49671 > 40214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51557","25.056460","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51558","25.056491","172.30.1.104","172.30.1.205","TCP","54","49671 > 40230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51559","25.056510","172.30.1.104","172.30.1.205","TCP","54","49671 > 40234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51560","25.056531","172.30.1.104","172.30.1.205","TCP","54","49671 > 40238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51561","25.056732","172.30.1.104","172.30.1.205","TCP","54","49671 > 40230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51562","25.056738","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51563","25.056788","172.30.1.104","172.30.1.205","TCP","54","49671 > 40242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51564","25.056802","172.30.1.104","172.30.1.205","TCP","54","49671 > 40242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51565","25.056806","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51566","25.056822","172.30.1.104","172.30.1.205","TCP","54","49671 > 40234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51567","25.056825","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51568","25.056849","172.30.1.104","172.30.1.205","TCP","54","49671 > 40238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51569","25.056852","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51570","25.056870","172.30.1.104","172.30.1.205","TCP","54","49671 > 40198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51571","25.056891","172.30.1.104","172.30.1.205","TCP","54","49671 > 40198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51572","25.056895","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51573","25.057668","172.30.1.205","172.30.1.104","TCP","54","47608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51574","25.057791","172.30.1.205","172.30.1.104","TCP","74","40246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928284 TSecr=0 WS=128" +"51575","25.057914","172.30.1.104","172.30.1.205","TCP","54","135 > 47608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51576","25.057934","172.30.1.104","172.30.1.205","TCP","54","135 > 47608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51577","25.057938","172.30.1.205","172.30.1.104","TCP","54","47608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51578","25.058070","172.30.1.104","172.30.1.205","TCP","66","49671 > 40246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51579","25.058078","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51580","25.058428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51581","25.058735","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51582","25.058744","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51583","25.060619","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51584","25.060979","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51585","25.060986","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51586","25.062356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51587","25.066192","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51588","25.066201","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51589","25.067178","172.30.1.205","172.30.1.104","TCP","74","47612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928293 TSecr=0 WS=128" +"51590","25.067472","172.30.1.104","172.30.1.205","TCP","66","135 > 47612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51591","25.067482","172.30.1.205","172.30.1.104","TCP","54","47612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51592","25.067836","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51593","25.068135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51594","25.068143","172.30.1.205","172.30.1.104","TCP","54","47612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51595","25.070359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51596","25.070714","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51597","25.070721","172.30.1.205","172.30.1.104","TCP","54","47612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51598","25.072532","172.30.1.205","172.30.1.104","TCP","54","47612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51599","25.072647","172.30.1.205","172.30.1.104","TCP","74","40250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928299 TSecr=0 WS=128" +"51600","25.072802","172.30.1.104","172.30.1.205","TCP","54","135 > 47612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51601","25.072812","172.30.1.104","172.30.1.205","TCP","54","135 > 47612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51602","25.072818","172.30.1.205","172.30.1.104","TCP","54","47612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51603","25.072937","172.30.1.104","172.30.1.205","TCP","66","49671 > 40250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51604","25.072946","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51605","25.073296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51606","25.073599","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51607","25.073608","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51608","25.075489","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51609","25.075848","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51610","25.075854","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51611","25.077236","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51612","25.080945","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51613","25.080954","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51614","25.081924","172.30.1.205","172.30.1.104","TCP","74","47616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928308 TSecr=0 WS=128" +"51615","25.082251","172.30.1.104","172.30.1.205","TCP","66","135 > 47616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51616","25.082262","172.30.1.205","172.30.1.104","TCP","54","47616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51617","25.082617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51618","25.082925","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51619","25.082934","172.30.1.205","172.30.1.104","TCP","54","47616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51620","25.085160","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51621","25.085585","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51622","25.085591","172.30.1.205","172.30.1.104","TCP","54","47616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51623","25.087411","172.30.1.205","172.30.1.104","TCP","54","47616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51624","25.087532","172.30.1.205","172.30.1.104","TCP","74","40254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928313 TSecr=0 WS=128" +"51625","25.087705","172.30.1.104","172.30.1.205","TCP","54","135 > 47616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51626","25.087751","172.30.1.104","172.30.1.205","TCP","54","135 > 47616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51627","25.087758","172.30.1.205","172.30.1.104","TCP","54","47616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51628","25.087832","172.30.1.104","172.30.1.205","TCP","66","49671 > 40254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51629","25.087841","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51630","25.088185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51631","25.088464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51632","25.088473","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51633","25.090388","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51634","25.090761","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51635","25.090767","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51636","25.092119","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51637","25.095965","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51638","25.095976","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51639","25.096989","172.30.1.205","172.30.1.104","TCP","74","47620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928323 TSecr=0 WS=128" +"51640","25.097324","172.30.1.104","172.30.1.205","TCP","66","135 > 47620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51641","25.097336","172.30.1.205","172.30.1.104","TCP","54","47620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51642","25.097703","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51643","25.097993","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51644","25.098002","172.30.1.205","172.30.1.104","TCP","54","47620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51645","25.100214","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51646","25.100665","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51647","25.100672","172.30.1.205","172.30.1.104","TCP","54","47620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51648","25.102528","172.30.1.205","172.30.1.104","TCP","54","47620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51649","25.102647","172.30.1.205","172.30.1.104","TCP","74","40258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928329 TSecr=0 WS=128" +"51650","25.102811","172.30.1.104","172.30.1.205","TCP","54","135 > 47620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51651","25.102837","172.30.1.104","172.30.1.205","TCP","54","135 > 47620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51652","25.102844","172.30.1.205","172.30.1.104","TCP","54","47620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51653","25.102949","172.30.1.104","172.30.1.205","TCP","66","49671 > 40258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51654","25.102957","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51655","25.103305","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51656","25.103577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51657","25.103584","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51658","25.105490","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51659","25.105857","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51660","25.105864","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51661","25.107216","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51662","25.111070","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51663","25.111081","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51664","25.112078","172.30.1.205","172.30.1.104","TCP","74","47624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928338 TSecr=0 WS=128" +"51665","25.112374","172.30.1.104","172.30.1.205","TCP","66","135 > 47624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51666","25.112385","172.30.1.205","172.30.1.104","TCP","54","47624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51667","25.112734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51668","25.113005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51669","25.113014","172.30.1.205","172.30.1.104","TCP","54","47624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51670","25.115227","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51671","25.115625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51672","25.115632","172.30.1.205","172.30.1.104","TCP","54","47624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51673","25.117472","172.30.1.205","172.30.1.104","TCP","54","47624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51674","25.117584","172.30.1.205","172.30.1.104","TCP","74","40262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928344 TSecr=0 WS=128" +"51675","25.117741","172.30.1.104","172.30.1.205","TCP","54","135 > 47624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51676","25.117827","172.30.1.104","172.30.1.205","TCP","54","135 > 47624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51677","25.117834","172.30.1.205","172.30.1.104","TCP","54","47624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51678","25.117916","172.30.1.104","172.30.1.205","TCP","66","49671 > 40262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51679","25.117924","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51680","25.118265","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51681","25.118551","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51682","25.118560","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51683","25.120445","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51684","25.120835","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51685","25.120842","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51686","25.122207","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51687","25.126200","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51688","25.126209","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51689","25.127172","172.30.1.205","172.30.1.104","TCP","74","47628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928353 TSecr=0 WS=128" +"51690","25.127547","172.30.1.104","172.30.1.205","TCP","66","135 > 47628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51691","25.127559","172.30.1.205","172.30.1.104","TCP","54","47628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51692","25.127911","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51693","25.128225","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51694","25.128234","172.30.1.205","172.30.1.104","TCP","54","47628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51695","25.130494","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51696","25.130943","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51697","25.130950","172.30.1.205","172.30.1.104","TCP","54","47628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51698","25.132791","172.30.1.205","172.30.1.104","TCP","54","47628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51699","25.132915","172.30.1.205","172.30.1.104","TCP","74","40266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928359 TSecr=0 WS=128" +"51700","25.133146","172.30.1.104","172.30.1.205","TCP","54","135 > 47628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51701","25.133157","172.30.1.104","172.30.1.205","TCP","54","135 > 47628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51702","25.133163","172.30.1.205","172.30.1.104","TCP","54","47628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51703","25.133287","172.30.1.104","172.30.1.205","TCP","66","49671 > 40266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51704","25.133295","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51705","25.133648","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51706","25.133973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51707","25.133983","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51708","25.135877","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51709","25.136265","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51710","25.136271","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51711","25.137664","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51712","25.141549","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51713","25.141558","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51714","25.142532","172.30.1.205","172.30.1.104","TCP","74","47632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928368 TSecr=0 WS=128" +"51715","25.142838","172.30.1.104","172.30.1.205","TCP","66","135 > 47632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51716","25.142849","172.30.1.205","172.30.1.104","TCP","54","47632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51717","25.143200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51718","25.143494","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51719","25.143503","172.30.1.205","172.30.1.104","TCP","54","47632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51720","25.145722","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51721","25.146177","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51722","25.146184","172.30.1.205","172.30.1.104","TCP","54","47632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51723","25.147993","172.30.1.205","172.30.1.104","TCP","54","47632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51724","25.148106","172.30.1.205","172.30.1.104","TCP","74","40270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928374 TSecr=0 WS=128" +"51725","25.148259","172.30.1.104","172.30.1.205","TCP","54","135 > 47632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51726","25.148283","172.30.1.104","172.30.1.205","TCP","54","135 > 47632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51727","25.148289","172.30.1.205","172.30.1.104","TCP","54","47632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51728","25.148392","172.30.1.104","172.30.1.205","TCP","66","49671 > 40270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51729","25.148401","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51730","25.148765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51731","25.149058","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51732","25.149066","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51733","25.150926","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51734","25.151308","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51735","25.151315","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51736","25.152662","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51737","25.156553","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51738","25.156562","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51739","25.157529","172.30.1.205","172.30.1.104","TCP","74","47636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928383 TSecr=0 WS=128" +"51740","25.157862","172.30.1.104","172.30.1.205","TCP","66","135 > 47636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51741","25.157874","172.30.1.205","172.30.1.104","TCP","54","47636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51742","25.158230","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51743","25.158523","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51744","25.158532","172.30.1.205","172.30.1.104","TCP","54","47636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51745","25.160712","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51746","25.161177","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51747","25.161184","172.30.1.205","172.30.1.104","TCP","54","47636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51748","25.162982","172.30.1.205","172.30.1.104","TCP","54","47636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51749","25.163095","172.30.1.205","172.30.1.104","TCP","74","40274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928389 TSecr=0 WS=128" +"51750","25.163284","172.30.1.104","172.30.1.205","TCP","54","135 > 47636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51751","25.163300","172.30.1.104","172.30.1.205","TCP","54","135 > 47636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51752","25.163305","172.30.1.205","172.30.1.104","TCP","54","47636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51753","25.163379","172.30.1.104","172.30.1.205","TCP","66","49671 > 40274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51754","25.163388","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51755","25.163731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51756","25.165247","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51757","25.165265","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51758","25.167317","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51759","25.167708","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51760","25.167717","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51761","25.169379","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51762","25.173267","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51763","25.173277","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51764","25.174240","172.30.1.205","172.30.1.104","TCP","74","47640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928400 TSecr=0 WS=128" +"51765","25.174577","172.30.1.104","172.30.1.205","TCP","66","135 > 47640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51766","25.174588","172.30.1.205","172.30.1.104","TCP","54","47640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51767","25.174937","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51768","25.175239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51769","25.175248","172.30.1.205","172.30.1.104","TCP","54","47640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51770","25.177441","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51771","25.177847","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51772","25.177854","172.30.1.205","172.30.1.104","TCP","54","47640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51773","25.179656","172.30.1.205","172.30.1.104","TCP","54","47640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51774","25.179767","172.30.1.205","172.30.1.104","TCP","74","40278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928406 TSecr=0 WS=128" +"51775","25.179946","172.30.1.104","172.30.1.205","TCP","54","135 > 47640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51776","25.179992","172.30.1.104","172.30.1.205","TCP","54","135 > 47640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51777","25.179999","172.30.1.205","172.30.1.104","TCP","54","47640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51778","25.180105","172.30.1.104","172.30.1.205","TCP","66","49671 > 40278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51779","25.180114","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51780","25.180462","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51781","25.181212","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51782","25.181222","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51783","25.183107","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51784","25.183509","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51785","25.183516","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51786","25.184881","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51787","25.188787","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51788","25.188798","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51789","25.189794","172.30.1.205","172.30.1.104","TCP","74","47644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928416 TSecr=0 WS=128" +"51790","25.190228","172.30.1.104","172.30.1.205","TCP","66","135 > 47644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51791","25.190240","172.30.1.205","172.30.1.104","TCP","54","47644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51792","25.190599","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51793","25.190896","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51794","25.190905","172.30.1.205","172.30.1.104","TCP","54","47644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51795","25.193124","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51796","25.193560","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51797","25.193566","172.30.1.205","172.30.1.104","TCP","54","47644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51798","25.195385","172.30.1.205","172.30.1.104","TCP","54","47644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51799","25.195509","172.30.1.205","172.30.1.104","TCP","74","40282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928421 TSecr=0 WS=128" +"51800","25.195706","172.30.1.104","172.30.1.205","TCP","54","135 > 47644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51801","25.195719","172.30.1.104","172.30.1.205","TCP","54","135 > 47644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51802","25.195726","172.30.1.205","172.30.1.104","TCP","54","47644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51803","25.195827","172.30.1.104","172.30.1.205","TCP","66","49671 > 40282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51804","25.195836","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51805","25.196186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51806","25.196554","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51807","25.196562","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51808","25.198479","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51809","25.198870","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51810","25.198879","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51811","25.200302","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51812","25.203976","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51813","25.203988","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51814","25.204993","172.30.1.205","172.30.1.104","TCP","74","47648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928431 TSecr=0 WS=128" +"51815","25.205317","172.30.1.104","172.30.1.205","TCP","66","135 > 47648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51816","25.205329","172.30.1.205","172.30.1.104","TCP","54","47648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51817","25.205699","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51818","25.205961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51819","25.205971","172.30.1.205","172.30.1.104","TCP","54","47648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51820","25.208171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51821","25.208545","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51822","25.208552","172.30.1.205","172.30.1.104","TCP","54","47648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51823","25.210399","172.30.1.205","172.30.1.104","TCP","54","47648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51824","25.210514","172.30.1.205","172.30.1.104","TCP","74","40286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928436 TSecr=0 WS=128" +"51825","25.210647","172.30.1.104","172.30.1.205","TCP","54","135 > 47648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51826","25.210659","172.30.1.104","172.30.1.205","TCP","54","135 > 47648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51827","25.210666","172.30.1.205","172.30.1.104","TCP","54","47648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51828","25.210785","172.30.1.104","172.30.1.205","TCP","66","49671 > 40286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51829","25.210794","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51830","25.211172","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51831","25.211482","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51832","25.211491","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51833","25.213411","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51834","25.213750","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51835","25.213757","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51836","25.215107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51837","25.218904","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51838","25.218913","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51839","25.219885","172.30.1.205","172.30.1.104","TCP","74","47652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928446 TSecr=0 WS=128" +"51840","25.220211","172.30.1.104","172.30.1.205","TCP","66","135 > 47652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51841","25.220227","172.30.1.205","172.30.1.104","TCP","54","47652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51842","25.220628","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51843","25.220926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51844","25.220935","172.30.1.205","172.30.1.104","TCP","54","47652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51845","25.223188","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51846","25.223609","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51847","25.223616","172.30.1.205","172.30.1.104","TCP","54","47652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51848","25.225474","172.30.1.205","172.30.1.104","TCP","54","47652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51849","25.225594","172.30.1.205","172.30.1.104","TCP","74","40290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928452 TSecr=0 WS=128" +"51850","25.225759","172.30.1.104","172.30.1.205","TCP","54","135 > 47652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51851","25.225804","172.30.1.104","172.30.1.205","TCP","54","135 > 47652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51852","25.225811","172.30.1.205","172.30.1.104","TCP","54","47652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51853","25.225911","172.30.1.104","172.30.1.205","TCP","66","49671 > 40290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51854","25.225919","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51855","25.226266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51856","25.227472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51857","25.227481","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51858","25.229408","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51859","25.229859","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51860","25.229866","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51861","25.231234","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51862","25.235198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51863","25.235208","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51864","25.236210","172.30.1.205","172.30.1.104","TCP","74","47656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928462 TSecr=0 WS=128" +"51865","25.236576","172.30.1.104","172.30.1.205","TCP","66","135 > 47656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51866","25.236587","172.30.1.205","172.30.1.104","TCP","54","47656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51867","25.236997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51868","25.237298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51869","25.237307","172.30.1.205","172.30.1.104","TCP","54","47656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51870","25.239515","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51871","25.239953","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51872","25.239960","172.30.1.205","172.30.1.104","TCP","54","47656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51873","25.240831","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51874","25.240879","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51875","25.240922","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51876","25.240957","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51877","25.240990","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51878","25.241022","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51879","25.241051","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51880","25.241079","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51881","25.241106","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51882","25.241132","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51883","25.241158","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51884","25.241189","172.30.1.104","172.30.1.205","TCP","54","49671 > 40250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51885","25.241209","172.30.1.104","172.30.1.205","TCP","54","49671 > 40254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51886","25.241232","172.30.1.104","172.30.1.205","TCP","54","49671 > 40258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51887","25.241253","172.30.1.104","172.30.1.205","TCP","54","49671 > 40250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51888","25.241260","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51889","25.241271","172.30.1.104","172.30.1.205","TCP","54","49671 > 40262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51890","25.241301","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51891","25.241507","172.30.1.104","172.30.1.205","TCP","54","49671 > 40266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51892","25.241532","172.30.1.104","172.30.1.205","TCP","54","49671 > 40266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51893","25.241538","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51894","25.241555","172.30.1.104","172.30.1.205","TCP","54","49671 > 40262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51895","25.241557","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51896","25.241577","172.30.1.104","172.30.1.205","TCP","54","49671 > 40254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51897","25.241580","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51898","25.241598","172.30.1.104","172.30.1.205","TCP","54","49671 > 40258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51899","25.241601","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51900","25.241618","172.30.1.104","172.30.1.205","TCP","54","49671 > 40270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51901","25.241640","172.30.1.104","172.30.1.205","TCP","54","49671 > 40274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51902","25.241660","172.30.1.104","172.30.1.205","TCP","54","49671 > 40270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51903","25.241664","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51904","25.241681","172.30.1.104","172.30.1.205","TCP","54","49671 > 40278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51905","25.241700","172.30.1.104","172.30.1.205","TCP","54","49671 > 40282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51906","25.241721","172.30.1.104","172.30.1.205","TCP","54","49671 > 40274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51907","25.241725","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51908","25.241741","172.30.1.104","172.30.1.205","TCP","54","49671 > 40286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51909","25.241763","172.30.1.104","172.30.1.205","TCP","54","49671 > 40286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51910","25.241767","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51911","25.241917","172.30.1.104","172.30.1.205","TCP","54","49671 > 40290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51912","25.241940","172.30.1.104","172.30.1.205","TCP","54","49671 > 40290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51913","25.241944","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51914","25.241959","172.30.1.104","172.30.1.205","TCP","54","49671 > 40278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51915","25.241962","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51916","25.241979","172.30.1.104","172.30.1.205","TCP","54","49671 > 40282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51917","25.241981","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51918","25.242099","172.30.1.104","172.30.1.205","TCP","54","49671 > 40246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51919","25.242128","172.30.1.104","172.30.1.205","TCP","54","49671 > 40246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"51920","25.242132","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"51921","25.242832","172.30.1.205","172.30.1.104","TCP","54","47656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51922","25.242956","172.30.1.205","172.30.1.104","TCP","74","40294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928469 TSecr=0 WS=128" +"51923","25.243129","172.30.1.104","172.30.1.205","TCP","54","135 > 47656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51924","25.243183","172.30.1.104","172.30.1.205","TCP","54","135 > 47656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51925","25.243188","172.30.1.205","172.30.1.104","TCP","54","47656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51926","25.243262","172.30.1.104","172.30.1.205","TCP","66","49671 > 40294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51927","25.243269","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51928","25.243625","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51929","25.243909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51930","25.243916","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51931","25.245833","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51932","25.246258","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51933","25.246265","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51934","25.247632","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51935","25.253563","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51936","25.253574","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51937","25.254537","172.30.1.205","172.30.1.104","TCP","74","47660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928480 TSecr=0 WS=128" +"51938","25.254905","172.30.1.104","172.30.1.205","TCP","66","135 > 47660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51939","25.254915","172.30.1.205","172.30.1.104","TCP","54","47660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51940","25.255269","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51941","25.255650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51942","25.255660","172.30.1.205","172.30.1.104","TCP","54","47660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51943","25.257857","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51944","25.258454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51945","25.258466","172.30.1.205","172.30.1.104","TCP","54","47660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51946","25.260563","172.30.1.205","172.30.1.104","TCP","54","47660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51947","25.260683","172.30.1.205","172.30.1.104","TCP","74","40298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928487 TSecr=0 WS=128" +"51948","25.260877","172.30.1.104","172.30.1.205","TCP","54","135 > 47660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51949","25.260914","172.30.1.104","172.30.1.205","TCP","54","135 > 47660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51950","25.260920","172.30.1.205","172.30.1.104","TCP","54","47660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51951","25.261075","172.30.1.104","172.30.1.205","TCP","66","49671 > 40298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51952","25.261083","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51953","25.261448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51954","25.261757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51955","25.261768","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51956","25.263698","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51957","25.264074","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51958","25.264080","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51959","25.265458","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51960","25.269306","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51961","25.269317","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51962","25.270277","172.30.1.205","172.30.1.104","TCP","74","47664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928496 TSecr=0 WS=128" +"51963","25.270623","172.30.1.104","172.30.1.205","TCP","66","135 > 47664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51964","25.270634","172.30.1.205","172.30.1.104","TCP","54","47664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51965","25.271022","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51966","25.271312","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51967","25.271321","172.30.1.205","172.30.1.104","TCP","54","47664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51968","25.273535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51969","25.273927","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51970","25.273933","172.30.1.205","172.30.1.104","TCP","54","47664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51971","25.275761","172.30.1.205","172.30.1.104","TCP","54","47664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51972","25.275872","172.30.1.205","172.30.1.104","TCP","74","40302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928502 TSecr=0 WS=128" +"51973","25.276086","172.30.1.104","172.30.1.205","TCP","54","135 > 47664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51974","25.276097","172.30.1.104","172.30.1.205","TCP","54","135 > 47664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51975","25.276102","172.30.1.205","172.30.1.104","TCP","54","47664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"51976","25.276146","172.30.1.104","172.30.1.205","TCP","66","49671 > 40302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51977","25.276154","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51978","25.276506","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"51979","25.276771","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51980","25.276788","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51981","25.278659","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"51982","25.279022","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"51983","25.279029","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"51984","25.280403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"51985","25.284235","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"51986","25.284245","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"51987","25.285224","172.30.1.205","172.30.1.104","TCP","74","47668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928511 TSecr=0 WS=128" +"51988","25.285544","172.30.1.104","172.30.1.205","TCP","66","135 > 47668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"51989","25.285554","172.30.1.205","172.30.1.104","TCP","54","47668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"51990","25.285909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"51991","25.286197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"51992","25.286207","172.30.1.205","172.30.1.104","TCP","54","47668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"51993","25.288397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"51994","25.288824","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"51995","25.288831","172.30.1.205","172.30.1.104","TCP","54","47668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51996","25.290669","172.30.1.205","172.30.1.104","TCP","54","47668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"51997","25.290781","172.30.1.205","172.30.1.104","TCP","74","40306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928517 TSecr=0 WS=128" +"51998","25.290909","172.30.1.104","172.30.1.205","TCP","54","135 > 47668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"51999","25.290937","172.30.1.104","172.30.1.205","TCP","54","135 > 47668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52000","25.290942","172.30.1.205","172.30.1.104","TCP","54","47668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52001","25.291048","172.30.1.104","172.30.1.205","TCP","66","49671 > 40306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52002","25.291057","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52003","25.291405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52004","25.291701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52005","25.291708","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52006","25.293626","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52007","25.293986","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52008","25.293992","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52009","25.295349","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52010","25.299181","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52011","25.299191","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52012","25.300132","172.30.1.205","172.30.1.104","TCP","74","47672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928526 TSecr=0 WS=128" +"52013","25.300459","172.30.1.104","172.30.1.205","TCP","66","135 > 47672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52014","25.300480","172.30.1.205","172.30.1.104","TCP","54","47672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52015","25.301099","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52016","25.301382","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52017","25.301391","172.30.1.205","172.30.1.104","TCP","54","47672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52018","25.303570","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52019","25.304062","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52020","25.304069","172.30.1.205","172.30.1.104","TCP","54","47672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52021","25.305909","172.30.1.205","172.30.1.104","TCP","54","47672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52022","25.306020","172.30.1.205","172.30.1.104","TCP","74","40310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928532 TSecr=0 WS=128" +"52023","25.306268","172.30.1.104","172.30.1.205","TCP","54","135 > 47672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52024","25.306276","172.30.1.104","172.30.1.205","TCP","54","135 > 47672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52025","25.306290","172.30.1.205","172.30.1.104","TCP","54","47672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52026","25.306380","172.30.1.104","172.30.1.205","TCP","66","49671 > 40310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52027","25.306388","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52028","25.306735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52029","25.306999","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52030","25.307008","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52031","25.308923","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52032","25.309375","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52033","25.309384","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52034","25.310731","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52035","25.314658","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52036","25.314668","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52037","25.315655","172.30.1.205","172.30.1.104","TCP","74","47676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928542 TSecr=0 WS=128" +"52038","25.316001","172.30.1.104","172.30.1.205","TCP","66","135 > 47676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52039","25.316014","172.30.1.205","172.30.1.104","TCP","54","47676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52040","25.316375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52041","25.316697","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52042","25.316706","172.30.1.205","172.30.1.104","TCP","54","47676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52043","25.318912","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52044","25.319382","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52045","25.319389","172.30.1.205","172.30.1.104","TCP","54","47676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52046","25.321242","172.30.1.205","172.30.1.104","TCP","54","47676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52047","25.321354","172.30.1.205","172.30.1.104","TCP","74","40314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928547 TSecr=0 WS=128" +"52048","25.321585","172.30.1.104","172.30.1.205","TCP","54","135 > 47676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52049","25.321596","172.30.1.104","172.30.1.205","TCP","54","135 > 47676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52050","25.321610","172.30.1.205","172.30.1.104","TCP","54","47676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52051","25.321701","172.30.1.104","172.30.1.205","TCP","66","49671 > 40314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52052","25.321713","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52053","25.322071","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52054","25.322364","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52055","25.322373","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52056","25.324276","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52057","25.324791","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52058","25.324798","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52059","25.326174","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52060","25.329996","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52061","25.330006","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52062","25.330962","172.30.1.205","172.30.1.104","TCP","74","47680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928557 TSecr=0 WS=128" +"52063","25.331266","172.30.1.104","172.30.1.205","TCP","66","135 > 47680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52064","25.331277","172.30.1.205","172.30.1.104","TCP","54","47680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52065","25.331642","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52066","25.331934","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52067","25.331943","172.30.1.205","172.30.1.104","TCP","54","47680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52068","25.334175","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52069","25.334602","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52070","25.334609","172.30.1.205","172.30.1.104","TCP","54","47680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52071","25.336431","172.30.1.205","172.30.1.104","TCP","54","47680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52072","25.336542","172.30.1.205","172.30.1.104","TCP","74","40318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928562 TSecr=0 WS=128" +"52073","25.336709","172.30.1.104","172.30.1.205","TCP","54","135 > 47680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52074","25.336737","172.30.1.104","172.30.1.205","TCP","54","135 > 47680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52075","25.336743","172.30.1.205","172.30.1.104","TCP","54","47680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52076","25.336827","172.30.1.104","172.30.1.205","TCP","66","49671 > 40318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52077","25.336836","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52078","25.337191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52079","25.337463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52080","25.337472","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52081","25.339366","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52082","25.339717","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52083","25.339723","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52084","25.341119","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52085","25.344955","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52086","25.344966","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52087","25.346008","172.30.1.205","172.30.1.104","TCP","74","47684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928572 TSecr=0 WS=128" +"52088","25.346317","172.30.1.104","172.30.1.205","TCP","66","135 > 47684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52089","25.346329","172.30.1.205","172.30.1.104","TCP","54","47684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52090","25.346690","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52091","25.346967","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52092","25.346976","172.30.1.205","172.30.1.104","TCP","54","47684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52093","25.349223","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52094","25.349606","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52095","25.349612","172.30.1.205","172.30.1.104","TCP","54","47684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52096","25.351437","172.30.1.205","172.30.1.104","TCP","54","47684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52097","25.351555","172.30.1.205","172.30.1.104","TCP","74","40322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928577 TSecr=0 WS=128" +"52098","25.351710","172.30.1.104","172.30.1.205","TCP","54","135 > 47684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52099","25.351723","172.30.1.104","172.30.1.205","TCP","54","135 > 47684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52100","25.351730","172.30.1.205","172.30.1.104","TCP","54","47684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52101","25.351816","172.30.1.104","172.30.1.205","TCP","66","49671 > 40322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52102","25.351825","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52103","25.352172","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52104","25.352466","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52105","25.352475","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52106","25.354422","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52107","25.354816","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52108","25.354825","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52109","25.356191","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52110","25.360057","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52111","25.360068","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52112","25.361064","172.30.1.205","172.30.1.104","TCP","74","47688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928587 TSecr=0 WS=128" +"52113","25.361369","172.30.1.104","172.30.1.205","TCP","66","135 > 47688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52114","25.361380","172.30.1.205","172.30.1.104","TCP","54","47688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52115","25.361740","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52116","25.362003","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52117","25.362012","172.30.1.205","172.30.1.104","TCP","54","47688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52118","25.364193","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52119","25.364570","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52120","25.364578","172.30.1.205","172.30.1.104","TCP","54","47688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52121","25.366405","172.30.1.205","172.30.1.104","TCP","54","47688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52122","25.366517","172.30.1.205","172.30.1.104","TCP","74","40326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928592 TSecr=0 WS=128" +"52123","25.366714","172.30.1.104","172.30.1.205","TCP","54","135 > 47688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52124","25.366728","172.30.1.104","172.30.1.205","TCP","54","135 > 47688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52125","25.366734","172.30.1.205","172.30.1.104","TCP","54","47688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52126","25.366815","172.30.1.104","172.30.1.205","TCP","66","49671 > 40326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52127","25.366823","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52128","25.367175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52129","25.367463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52130","25.367474","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52131","25.369400","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52132","25.369750","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52133","25.369756","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52134","25.371105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52135","25.375160","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52136","25.375176","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52137","25.376187","172.30.1.205","172.30.1.104","TCP","74","47692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928602 TSecr=0 WS=128" +"52138","25.376508","172.30.1.104","172.30.1.205","TCP","66","135 > 47692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52139","25.376519","172.30.1.205","172.30.1.104","TCP","54","47692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52140","25.376902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52141","25.377194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52142","25.377204","172.30.1.205","172.30.1.104","TCP","54","47692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52143","25.379402","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52144","25.379802","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52145","25.379809","172.30.1.205","172.30.1.104","TCP","54","47692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52146","25.381648","172.30.1.205","172.30.1.104","TCP","54","47692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52147","25.381760","172.30.1.205","172.30.1.104","TCP","74","40330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928608 TSecr=0 WS=128" +"52148","25.381940","172.30.1.104","172.30.1.205","TCP","54","135 > 47692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52149","25.382020","172.30.1.104","172.30.1.205","TCP","54","135 > 47692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52150","25.382031","172.30.1.205","172.30.1.104","TCP","54","47692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52151","25.382100","172.30.1.104","172.30.1.205","TCP","66","49671 > 40330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52152","25.382112","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52153","25.382526","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52154","25.382818","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52155","25.382827","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52156","25.384772","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52157","25.385215","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52158","25.385222","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52159","25.386588","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52160","25.390431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52161","25.390447","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52162","25.391471","172.30.1.205","172.30.1.104","TCP","74","47696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928617 TSecr=0 WS=128" +"52163","25.391799","172.30.1.104","172.30.1.205","TCP","66","135 > 47696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52164","25.391810","172.30.1.205","172.30.1.104","TCP","54","47696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52165","25.392168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52166","25.392470","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52167","25.392479","172.30.1.205","172.30.1.104","TCP","54","47696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52168","25.394742","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52169","25.395138","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52170","25.395146","172.30.1.205","172.30.1.104","TCP","54","47696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52171","25.397021","172.30.1.205","172.30.1.104","TCP","54","47696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52172","25.397138","172.30.1.205","172.30.1.104","TCP","74","40334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928623 TSecr=0 WS=128" +"52173","25.397311","172.30.1.104","172.30.1.205","TCP","54","135 > 47696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52174","25.397337","172.30.1.104","172.30.1.205","TCP","54","135 > 47696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52175","25.397343","172.30.1.205","172.30.1.104","TCP","54","47696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52176","25.397488","172.30.1.104","172.30.1.205","TCP","66","49671 > 40334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52177","25.397497","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52178","25.397854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52179","25.398156","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52180","25.398165","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52181","25.400044","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52182","25.400419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52183","25.400425","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52184","25.401835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52185","25.405753","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52186","25.405763","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52187","25.406717","172.30.1.205","172.30.1.104","TCP","74","47700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928633 TSecr=0 WS=128" +"52188","25.407013","172.30.1.104","172.30.1.205","TCP","66","135 > 47700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52189","25.407023","172.30.1.205","172.30.1.104","TCP","54","47700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52190","25.407375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52191","25.407694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52192","25.407702","172.30.1.205","172.30.1.104","TCP","54","47700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52193","25.409944","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52194","25.410455","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52195","25.410461","172.30.1.205","172.30.1.104","TCP","54","47700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52196","25.412274","172.30.1.205","172.30.1.104","TCP","54","47700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52197","25.412387","172.30.1.205","172.30.1.104","TCP","74","40338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928638 TSecr=0 WS=128" +"52198","25.412559","172.30.1.104","172.30.1.205","TCP","54","135 > 47700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52199","25.412608","172.30.1.104","172.30.1.205","TCP","54","135 > 47700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52200","25.412613","172.30.1.205","172.30.1.104","TCP","54","47700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52201","25.412683","172.30.1.104","172.30.1.205","TCP","66","49671 > 40338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52202","25.412691","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52203","25.413068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52204","25.413370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52205","25.413377","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52206","25.415258","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52207","25.417072","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52208","25.417086","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52209","25.418634","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52210","25.422605","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52211","25.422615","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52212","25.423567","172.30.1.205","172.30.1.104","TCP","74","47704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928649 TSecr=0 WS=128" +"52213","25.423888","172.30.1.104","172.30.1.205","TCP","66","135 > 47704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52214","25.423900","172.30.1.205","172.30.1.104","TCP","54","47704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52215","25.424271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52216","25.424551","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52217","25.424560","172.30.1.205","172.30.1.104","TCP","54","47704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52218","25.426752","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52219","25.427170","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52220","25.427176","172.30.1.205","172.30.1.104","TCP","54","47704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52221","25.428034","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52222","25.428081","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52223","25.428134","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52224","25.428169","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52225","25.428193","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52226","25.428216","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52227","25.428252","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52228","25.428276","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52229","25.428303","172.30.1.104","172.30.1.205","TCP","54","49671 > 40298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52230","25.428315","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52231","25.428351","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52232","25.428374","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52233","25.428398","172.30.1.104","172.30.1.205","TCP","54","49671 > 40302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52234","25.428422","172.30.1.104","172.30.1.205","TCP","54","49671 > 40298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52235","25.428428","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52236","25.428452","172.30.1.104","172.30.1.205","TCP","54","49671 > 40302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52237","25.428455","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52238","25.428488","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52239","25.428566","172.30.1.104","172.30.1.205","TCP","54","49671 > 40306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52240","25.428590","172.30.1.104","172.30.1.205","TCP","54","49671 > 40306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52241","25.428595","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52242","25.428616","172.30.1.104","172.30.1.205","TCP","54","49671 > 40310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52243","25.428642","172.30.1.104","172.30.1.205","TCP","54","49671 > 40314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52244","25.428668","172.30.1.104","172.30.1.205","TCP","54","49671 > 40318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52245","25.428695","172.30.1.104","172.30.1.205","TCP","54","49671 > 40310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52246","25.428700","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52247","25.428805","172.30.1.104","172.30.1.205","TCP","54","49671 > 40322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52248","25.428830","172.30.1.104","172.30.1.205","TCP","54","49671 > 40326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52249","25.428872","172.30.1.104","172.30.1.205","TCP","54","49671 > 40326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52250","25.428878","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52251","25.428909","172.30.1.104","172.30.1.205","TCP","54","49671 > 40322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52252","25.428912","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52253","25.428935","172.30.1.104","172.30.1.205","TCP","54","49671 > 40314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52254","25.428938","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52255","25.428962","172.30.1.104","172.30.1.205","TCP","54","49671 > 40318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52256","25.428967","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52257","25.428990","172.30.1.104","172.30.1.205","TCP","54","49671 > 40330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52258","25.429019","172.30.1.104","172.30.1.205","TCP","54","49671 > 40334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52259","25.429045","172.30.1.104","172.30.1.205","TCP","54","49671 > 40330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52260","25.429049","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52261","25.429096","172.30.1.104","172.30.1.205","TCP","54","49671 > 40334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52262","25.429101","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52263","25.429121","172.30.1.104","172.30.1.205","TCP","54","49671 > 40338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52264","25.429148","172.30.1.104","172.30.1.205","TCP","54","49671 > 40338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52265","25.429152","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52266","25.429174","172.30.1.104","172.30.1.205","TCP","54","49671 > 40294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52267","25.429201","172.30.1.104","172.30.1.205","TCP","54","49671 > 40294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52268","25.429204","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52269","25.430075","172.30.1.205","172.30.1.104","TCP","54","47704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52270","25.430187","172.30.1.205","172.30.1.104","TCP","74","40342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928656 TSecr=0 WS=128" +"52271","25.430339","172.30.1.104","172.30.1.205","TCP","54","135 > 47704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52272","25.430366","172.30.1.104","172.30.1.205","TCP","54","135 > 47704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52273","25.430370","172.30.1.205","172.30.1.104","TCP","54","47704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52274","25.430458","172.30.1.104","172.30.1.205","TCP","66","49671 > 40342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52275","25.430466","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52276","25.430822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52277","25.431112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52278","25.431120","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52279","25.433026","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52280","25.433412","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52281","25.433418","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52282","25.434781","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52283","25.438627","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52284","25.438636","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52285","25.439589","172.30.1.205","172.30.1.104","TCP","74","47708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928666 TSecr=0 WS=128" +"52286","25.439894","172.30.1.104","172.30.1.205","TCP","66","135 > 47708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52287","25.439905","172.30.1.205","172.30.1.104","TCP","54","47708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52288","25.440262","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52289","25.440603","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52290","25.440612","172.30.1.205","172.30.1.104","TCP","54","47708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52291","25.442807","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52292","25.443211","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52293","25.443218","172.30.1.205","172.30.1.104","TCP","54","47708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52294","25.445065","172.30.1.205","172.30.1.104","TCP","54","47708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52295","25.445177","172.30.1.205","172.30.1.104","TCP","74","40346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928671 TSecr=0 WS=128" +"52296","25.445359","172.30.1.104","172.30.1.205","TCP","54","135 > 47708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52297","25.445392","172.30.1.104","172.30.1.205","TCP","54","135 > 47708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52298","25.445398","172.30.1.205","172.30.1.104","TCP","54","47708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52299","25.445464","172.30.1.104","172.30.1.205","TCP","66","49671 > 40346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52300","25.445480","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52301","25.445889","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52302","25.446224","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52303","25.446237","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52304","25.448128","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52305","25.448494","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52306","25.448501","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52307","25.449898","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52308","25.453747","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52309","25.453758","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52310","25.454716","172.30.1.205","172.30.1.104","TCP","74","47712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928681 TSecr=0 WS=128" +"52311","25.455021","172.30.1.104","172.30.1.205","TCP","66","135 > 47712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52312","25.455032","172.30.1.205","172.30.1.104","TCP","54","47712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52313","25.455390","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52314","25.455677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52315","25.455687","172.30.1.205","172.30.1.104","TCP","54","47712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52316","25.457924","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52317","25.458357","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52318","25.458364","172.30.1.205","172.30.1.104","TCP","54","47712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52319","25.460181","172.30.1.205","172.30.1.104","TCP","54","47712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52320","25.460298","172.30.1.205","172.30.1.104","TCP","74","40350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928686 TSecr=0 WS=128" +"52321","25.460534","172.30.1.104","172.30.1.205","TCP","54","135 > 47712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52322","25.460568","172.30.1.104","172.30.1.205","TCP","54","135 > 47712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52323","25.460574","172.30.1.205","172.30.1.104","TCP","54","47712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52324","25.460613","172.30.1.104","172.30.1.205","TCP","66","49671 > 40350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52325","25.460621","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52326","25.460996","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52327","25.461358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52328","25.461366","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52329","25.463264","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52330","25.463702","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52331","25.463709","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52332","25.465105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52333","25.468970","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52334","25.468979","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52335","25.469939","172.30.1.205","172.30.1.104","TCP","74","47716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928696 TSecr=0 WS=128" +"52336","25.470255","172.30.1.104","172.30.1.205","TCP","66","135 > 47716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52337","25.470265","172.30.1.205","172.30.1.104","TCP","54","47716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52338","25.470619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52339","25.470909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52340","25.470918","172.30.1.205","172.30.1.104","TCP","54","47716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52341","25.473150","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52342","25.473839","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52343","25.473846","172.30.1.205","172.30.1.104","TCP","54","47716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52344","25.475666","172.30.1.205","172.30.1.104","TCP","54","47716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52345","25.475777","172.30.1.205","172.30.1.104","TCP","74","40354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928702 TSecr=0 WS=128" +"52346","25.477237","172.30.1.104","172.30.1.205","TCP","66","49671 > 40354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52347","25.477252","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52348","25.477257","172.30.1.104","172.30.1.205","TCP","54","135 > 47716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52349","25.477304","172.30.1.104","172.30.1.205","TCP","54","135 > 47716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52350","25.477310","172.30.1.205","172.30.1.104","TCP","54","47716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52351","25.477645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52352","25.478359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52353","25.478367","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52354","25.480243","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52355","25.480648","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52356","25.480654","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52357","25.482058","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52358","25.485934","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52359","25.485954","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52360","25.487027","172.30.1.205","172.30.1.104","TCP","74","47720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928713 TSecr=0 WS=128" +"52361","25.487322","172.30.1.104","172.30.1.205","TCP","66","135 > 47720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52362","25.487333","172.30.1.205","172.30.1.104","TCP","54","47720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52363","25.487685","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52364","25.487970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52365","25.487979","172.30.1.205","172.30.1.104","TCP","54","47720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52366","25.490189","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52367","25.490593","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52368","25.490600","172.30.1.205","172.30.1.104","TCP","54","47720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52369","25.492429","172.30.1.205","172.30.1.104","TCP","54","47720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52370","25.492539","172.30.1.205","172.30.1.104","TCP","74","40358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928718 TSecr=0 WS=128" +"52371","25.492700","172.30.1.104","172.30.1.205","TCP","54","135 > 47720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52372","25.492772","172.30.1.104","172.30.1.205","TCP","54","135 > 47720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52373","25.492787","172.30.1.205","172.30.1.104","TCP","54","47720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52374","25.492908","172.30.1.104","172.30.1.205","TCP","66","49671 > 40358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52375","25.492917","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52376","25.493263","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52377","25.493579","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52378","25.493588","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52379","25.495496","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52380","25.495924","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52381","25.495931","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52382","25.497318","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52383","25.501736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52384","25.501746","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52385","25.502690","172.30.1.205","172.30.1.104","TCP","74","47724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928729 TSecr=0 WS=128" +"52386","25.503011","172.30.1.104","172.30.1.205","TCP","66","135 > 47724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52387","25.503022","172.30.1.205","172.30.1.104","TCP","54","47724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52388","25.503375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52389","25.503724","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52390","25.503734","172.30.1.205","172.30.1.104","TCP","54","47724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52391","25.505949","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52392","25.506334","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52393","25.506341","172.30.1.205","172.30.1.104","TCP","54","47724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52394","25.508172","172.30.1.205","172.30.1.104","TCP","54","47724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52395","25.508294","172.30.1.205","172.30.1.104","TCP","74","40362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928734 TSecr=0 WS=128" +"52396","25.508447","172.30.1.104","172.30.1.205","TCP","54","135 > 47724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52397","25.508523","172.30.1.104","172.30.1.205","TCP","54","135 > 47724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52398","25.508529","172.30.1.205","172.30.1.104","TCP","54","47724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52399","25.508639","172.30.1.104","172.30.1.205","TCP","66","49671 > 40362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52400","25.508647","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52401","25.509024","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52402","25.509283","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52403","25.509291","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52404","25.511175","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52405","25.511544","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52406","25.511551","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52407","25.512940","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52408","25.516665","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52409","25.516683","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52410","25.517758","172.30.1.205","172.30.1.104","TCP","74","47728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928744 TSecr=0 WS=128" +"52411","25.518097","172.30.1.104","172.30.1.205","TCP","66","135 > 47728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52412","25.518108","172.30.1.205","172.30.1.104","TCP","54","47728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52413","25.518454","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52414","25.518755","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52415","25.518765","172.30.1.205","172.30.1.104","TCP","54","47728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52416","25.520974","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52417","25.521370","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52418","25.521376","172.30.1.205","172.30.1.104","TCP","54","47728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52419","25.523192","172.30.1.205","172.30.1.104","TCP","54","47728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52420","25.523307","172.30.1.205","172.30.1.104","TCP","74","40366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928749 TSecr=0 WS=128" +"52421","25.523501","172.30.1.104","172.30.1.205","TCP","54","135 > 47728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52422","25.523512","172.30.1.104","172.30.1.205","TCP","54","135 > 47728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52423","25.523518","172.30.1.205","172.30.1.104","TCP","54","47728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52424","25.523589","172.30.1.104","172.30.1.205","TCP","66","49671 > 40366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52425","25.523598","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52426","25.523943","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52427","25.524226","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52428","25.524234","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52429","25.526152","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52430","25.526547","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52431","25.526555","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52432","25.527930","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52433","25.531956","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52434","25.531967","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52435","25.532952","172.30.1.205","172.30.1.104","TCP","74","47732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928759 TSecr=0 WS=128" +"52436","25.533257","172.30.1.104","172.30.1.205","TCP","66","135 > 47732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52437","25.533268","172.30.1.205","172.30.1.104","TCP","54","47732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52438","25.533634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52439","25.533961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52440","25.533970","172.30.1.205","172.30.1.104","TCP","54","47732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52441","25.536166","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52442","25.536564","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52443","25.536570","172.30.1.205","172.30.1.104","TCP","54","47732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52444","25.538392","172.30.1.205","172.30.1.104","TCP","54","47732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52445","25.538502","172.30.1.205","172.30.1.104","TCP","74","40370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928764 TSecr=0 WS=128" +"52446","25.538710","172.30.1.104","172.30.1.205","TCP","54","135 > 47732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52447","25.538750","172.30.1.104","172.30.1.205","TCP","54","135 > 47732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52448","25.538756","172.30.1.205","172.30.1.104","TCP","54","47732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52449","25.538791","172.30.1.104","172.30.1.205","TCP","66","49671 > 40370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52450","25.538800","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52451","25.539146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52452","25.541503","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52453","25.541511","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52454","25.543407","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52455","25.543811","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52456","25.543818","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52457","25.545226","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52458","25.549169","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52459","25.549179","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52460","25.550158","172.30.1.205","172.30.1.104","TCP","74","47736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928776 TSecr=0 WS=128" +"52461","25.550464","172.30.1.104","172.30.1.205","TCP","66","135 > 47736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52462","25.550475","172.30.1.205","172.30.1.104","TCP","54","47736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52463","25.550830","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52464","25.551122","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52465","25.551131","172.30.1.205","172.30.1.104","TCP","54","47736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52466","25.553344","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52467","25.553741","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52468","25.553748","172.30.1.205","172.30.1.104","TCP","54","47736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52469","25.555582","172.30.1.205","172.30.1.104","TCP","54","47736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52470","25.555704","172.30.1.205","172.30.1.104","TCP","74","40374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928782 TSecr=0 WS=128" +"52471","25.555877","172.30.1.104","172.30.1.205","TCP","54","135 > 47736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52472","25.555926","172.30.1.104","172.30.1.205","TCP","54","135 > 47736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52473","25.555933","172.30.1.205","172.30.1.104","TCP","54","47736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52474","25.556043","172.30.1.104","172.30.1.205","TCP","66","49671 > 40374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52475","25.556051","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52476","25.556400","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52477","25.556721","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52478","25.556730","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52479","25.558647","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52480","25.559137","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52481","25.559147","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52482","25.560587","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52483","25.564428","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52484","25.564440","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52485","25.565462","172.30.1.205","172.30.1.104","TCP","74","47740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928791 TSecr=0 WS=128" +"52486","25.565804","172.30.1.104","172.30.1.205","TCP","66","135 > 47740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52487","25.565818","172.30.1.205","172.30.1.104","TCP","54","47740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52488","25.566180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52489","25.566562","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52490","25.566571","172.30.1.205","172.30.1.104","TCP","54","47740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52491","25.568771","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52492","25.569162","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52493","25.569171","172.30.1.205","172.30.1.104","TCP","54","47740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52494","25.571097","172.30.1.205","172.30.1.104","TCP","54","47740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52495","25.571224","172.30.1.205","172.30.1.104","TCP","74","40378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928797 TSecr=0 WS=128" +"52496","25.571524","172.30.1.104","172.30.1.205","TCP","54","135 > 47740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52497","25.571547","172.30.1.104","172.30.1.205","TCP","54","135 > 47740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52498","25.571558","172.30.1.205","172.30.1.104","TCP","54","47740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52499","25.571606","172.30.1.104","172.30.1.205","TCP","66","49671 > 40378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52500","25.571623","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52501","25.572177","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52502","25.572493","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52503","25.572502","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52504","25.574425","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52505","25.574887","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52506","25.574894","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52507","25.576245","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52508","25.580015","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52509","25.580028","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52510","25.581104","172.30.1.205","172.30.1.104","TCP","74","47744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928807 TSecr=0 WS=128" +"52511","25.581431","172.30.1.104","172.30.1.205","TCP","66","135 > 47744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52512","25.581442","172.30.1.205","172.30.1.104","TCP","54","47744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52513","25.581804","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52514","25.582080","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52515","25.582089","172.30.1.205","172.30.1.104","TCP","54","47744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52516","25.584294","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52517","25.584681","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52518","25.584688","172.30.1.205","172.30.1.104","TCP","54","47744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52519","25.586518","172.30.1.205","172.30.1.104","TCP","54","47744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52520","25.586633","172.30.1.205","172.30.1.104","TCP","74","40382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928813 TSecr=0 WS=128" +"52521","25.586776","172.30.1.104","172.30.1.205","TCP","54","135 > 47744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52522","25.586788","172.30.1.104","172.30.1.205","TCP","54","135 > 47744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52523","25.586794","172.30.1.205","172.30.1.104","TCP","54","47744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52524","25.586881","172.30.1.104","172.30.1.205","TCP","66","49671 > 40382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52525","25.586890","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52526","25.587246","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52527","25.587531","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52528","25.587540","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52529","25.589464","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52530","25.589831","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52531","25.589837","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52532","25.591192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52533","25.595149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52534","25.595160","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52535","25.596209","172.30.1.205","172.30.1.104","TCP","74","47748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928822 TSecr=0 WS=128" +"52536","25.596584","172.30.1.104","172.30.1.205","TCP","66","135 > 47748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52537","25.596595","172.30.1.205","172.30.1.104","TCP","54","47748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52538","25.596976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52539","25.597281","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52540","25.597291","172.30.1.205","172.30.1.104","TCP","54","47748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52541","25.599505","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52542","25.599971","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52543","25.599977","172.30.1.205","172.30.1.104","TCP","54","47748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52544","25.601829","172.30.1.205","172.30.1.104","TCP","54","47748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52545","25.601942","172.30.1.205","172.30.1.104","TCP","74","40386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928828 TSecr=0 WS=128" +"52546","25.602111","172.30.1.104","172.30.1.205","TCP","54","135 > 47748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52547","25.602145","172.30.1.104","172.30.1.205","TCP","54","135 > 47748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52548","25.602151","172.30.1.205","172.30.1.104","TCP","54","47748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52549","25.602221","172.30.1.104","172.30.1.205","TCP","66","49671 > 40386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52550","25.602229","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52551","25.602574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52552","25.602876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52553","25.602885","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52554","25.604749","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52555","25.605137","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52556","25.605143","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52557","25.606519","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52558","25.610378","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52559","25.610390","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52560","25.611405","172.30.1.205","172.30.1.104","TCP","74","47752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928837 TSecr=0 WS=128" +"52561","25.611747","172.30.1.104","172.30.1.205","TCP","66","135 > 47752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52562","25.611757","172.30.1.205","172.30.1.104","TCP","54","47752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52563","25.612130","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52564","25.612404","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52565","25.612413","172.30.1.205","172.30.1.104","TCP","54","47752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52566","25.614623","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52567","25.615044","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52568","25.615051","172.30.1.205","172.30.1.104","TCP","54","47752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52569","25.615903","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52570","25.615953","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52571","25.615981","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52572","25.616009","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52573","25.616037","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52574","25.616060","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52575","25.616083","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52576","25.616110","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52577","25.616138","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52578","25.616173","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52579","25.616199","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52580","25.616216","172.30.1.104","172.30.1.205","TCP","54","49671 > 40346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52581","25.616301","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52582","25.616371","172.30.1.104","172.30.1.205","TCP","54","49671 > 40350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52583","25.616389","172.30.1.104","172.30.1.205","TCP","54","49671 > 40350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52584","25.616396","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52585","25.616409","172.30.1.104","172.30.1.205","TCP","54","49671 > 40346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52586","25.616411","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52587","25.616431","172.30.1.104","172.30.1.205","TCP","54","49671 > 40354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52588","25.616450","172.30.1.104","172.30.1.205","TCP","54","49671 > 40358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52589","25.616469","172.30.1.104","172.30.1.205","TCP","54","49671 > 40358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52590","25.616473","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52591","25.616496","172.30.1.104","172.30.1.205","TCP","54","49671 > 40362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52592","25.616801","172.30.1.104","172.30.1.205","TCP","54","49671 > 40362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52593","25.616808","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52594","25.616814","172.30.1.104","172.30.1.205","TCP","54","49671 > 40366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52595","25.616823","172.30.1.104","172.30.1.205","TCP","54","49671 > 40366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52596","25.616825","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52597","25.616845","172.30.1.104","172.30.1.205","TCP","54","49671 > 40354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52598","25.616848","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52599","25.616863","172.30.1.104","172.30.1.205","TCP","54","49671 > 40370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52600","25.616892","172.30.1.104","172.30.1.205","TCP","54","49671 > 40374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52601","25.616916","172.30.1.104","172.30.1.205","TCP","54","49671 > 40370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52602","25.616919","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52603","25.616946","172.30.1.104","172.30.1.205","TCP","54","49671 > 40378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52604","25.616966","172.30.1.104","172.30.1.205","TCP","54","49671 > 40382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52605","25.616986","172.30.1.104","172.30.1.205","TCP","54","49671 > 40382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52606","25.616990","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52607","25.617006","172.30.1.104","172.30.1.205","TCP","54","49671 > 40386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52608","25.617025","172.30.1.104","172.30.1.205","TCP","54","49671 > 40386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52609","25.617029","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52610","25.617044","172.30.1.104","172.30.1.205","TCP","54","49671 > 40342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52611","25.617074","172.30.1.104","172.30.1.205","TCP","54","49671 > 40342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52612","25.617078","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52613","25.617092","172.30.1.104","172.30.1.205","TCP","54","49671 > 40374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52614","25.617096","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52615","25.617114","172.30.1.104","172.30.1.205","TCP","54","49671 > 40378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52616","25.617121","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52617","25.617886","172.30.1.205","172.30.1.104","TCP","54","47752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52618","25.618001","172.30.1.205","172.30.1.104","TCP","74","40390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928844 TSecr=0 WS=128" +"52619","25.618145","172.30.1.104","172.30.1.205","TCP","54","135 > 47752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52620","25.618174","172.30.1.104","172.30.1.205","TCP","54","135 > 47752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52621","25.618179","172.30.1.205","172.30.1.104","TCP","54","47752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52622","25.618277","172.30.1.104","172.30.1.205","TCP","66","49671 > 40390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52623","25.618285","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52624","25.618637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52625","25.619074","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52626","25.619083","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52627","25.621012","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52628","25.621444","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52629","25.621456","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52630","25.623045","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52631","25.626832","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52632","25.626843","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52633","25.627787","172.30.1.205","172.30.1.104","TCP","74","47756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928854 TSecr=0 WS=128" +"52634","25.628119","172.30.1.104","172.30.1.205","TCP","66","135 > 47756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52635","25.628131","172.30.1.205","172.30.1.104","TCP","54","47756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52636","25.628494","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52637","25.628774","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52638","25.628786","172.30.1.205","172.30.1.104","TCP","54","47756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52639","25.630980","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52640","25.631377","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52641","25.631384","172.30.1.205","172.30.1.104","TCP","54","47756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52642","25.633209","172.30.1.205","172.30.1.104","TCP","54","47756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52643","25.633320","172.30.1.205","172.30.1.104","TCP","74","40394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928859 TSecr=0 WS=128" +"52644","25.633553","172.30.1.104","172.30.1.205","TCP","54","135 > 47756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52645","25.633630","172.30.1.104","172.30.1.205","TCP","54","135 > 47756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52646","25.633637","172.30.1.205","172.30.1.104","TCP","54","47756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52647","25.633713","172.30.1.104","172.30.1.205","TCP","66","49671 > 40394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52648","25.633722","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52649","25.634065","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52650","25.634373","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52651","25.634382","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52652","25.636261","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52653","25.636618","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52654","25.636625","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52655","25.638010","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52656","25.641900","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52657","25.641912","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52658","25.642906","172.30.1.205","172.30.1.104","TCP","74","47760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928869 TSecr=0 WS=128" +"52659","25.643261","172.30.1.104","172.30.1.205","TCP","66","135 > 47760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52660","25.643273","172.30.1.205","172.30.1.104","TCP","54","47760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52661","25.643627","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52662","25.643906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52663","25.643916","172.30.1.205","172.30.1.104","TCP","54","47760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52664","25.646160","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52665","25.646529","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52666","25.646536","172.30.1.205","172.30.1.104","TCP","54","47760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52667","25.648362","172.30.1.205","172.30.1.104","TCP","54","47760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52668","25.648477","172.30.1.205","172.30.1.104","TCP","74","40398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928874 TSecr=0 WS=128" +"52669","25.648615","172.30.1.104","172.30.1.205","TCP","54","135 > 47760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52670","25.648651","172.30.1.104","172.30.1.205","TCP","54","135 > 47760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52671","25.648656","172.30.1.205","172.30.1.104","TCP","54","47760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52672","25.648752","172.30.1.104","172.30.1.205","TCP","66","49671 > 40398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52673","25.648760","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52674","25.649125","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52675","25.649397","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52676","25.649406","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52677","25.651309","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52678","25.651653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52679","25.651659","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52680","25.653042","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52681","25.656870","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52682","25.656880","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52683","25.657835","172.30.1.205","172.30.1.104","TCP","74","47764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928884 TSecr=0 WS=128" +"52684","25.658147","172.30.1.104","172.30.1.205","TCP","66","135 > 47764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52685","25.658158","172.30.1.205","172.30.1.104","TCP","54","47764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52686","25.658513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52687","25.658991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52688","25.659000","172.30.1.205","172.30.1.104","TCP","54","47764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52689","25.661216","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52690","25.661593","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52691","25.661600","172.30.1.205","172.30.1.104","TCP","54","47764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52692","25.663431","172.30.1.205","172.30.1.104","TCP","54","47764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52693","25.663540","172.30.1.205","172.30.1.104","TCP","74","40402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928889 TSecr=0 WS=128" +"52694","25.663707","172.30.1.104","172.30.1.205","TCP","54","135 > 47764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52695","25.663729","172.30.1.104","172.30.1.205","TCP","54","135 > 47764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52696","25.663735","172.30.1.205","172.30.1.104","TCP","54","47764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52697","25.663840","172.30.1.104","172.30.1.205","TCP","66","49671 > 40402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52698","25.663851","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52699","25.664205","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52700","25.664715","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52701","25.664724","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52702","25.666654","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52703","25.667012","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52704","25.667019","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52705","25.668383","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52706","25.672295","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52707","25.672306","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52708","25.673293","172.30.1.205","172.30.1.104","TCP","74","47768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928899 TSecr=0 WS=128" +"52709","25.673593","172.30.1.104","172.30.1.205","TCP","66","135 > 47768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52710","25.673606","172.30.1.205","172.30.1.104","TCP","54","47768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52711","25.673977","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52712","25.674247","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52713","25.674256","172.30.1.205","172.30.1.104","TCP","54","47768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52714","25.676444","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52715","25.676867","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52716","25.676877","172.30.1.205","172.30.1.104","TCP","54","47768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52717","25.678777","172.30.1.205","172.30.1.104","TCP","54","47768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52718","25.678906","172.30.1.205","172.30.1.104","TCP","74","40406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928905 TSecr=0 WS=128" +"52719","25.679045","172.30.1.104","172.30.1.205","TCP","54","135 > 47768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52720","25.679057","172.30.1.104","172.30.1.205","TCP","54","135 > 47768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52721","25.679062","172.30.1.205","172.30.1.104","TCP","54","47768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52722","25.679203","172.30.1.104","172.30.1.205","TCP","66","49671 > 40406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52723","25.679216","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52724","25.679585","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52725","25.679867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52726","25.679874","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52727","25.681801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52728","25.682158","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52729","25.682165","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52730","25.683526","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52731","25.687470","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52732","25.687480","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52733","25.688431","172.30.1.205","172.30.1.104","TCP","74","47772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928914 TSecr=0 WS=128" +"52734","25.688876","172.30.1.104","172.30.1.205","TCP","66","135 > 47772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52735","25.688890","172.30.1.205","172.30.1.104","TCP","54","47772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52736","25.689252","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52737","25.689517","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52738","25.689526","172.30.1.205","172.30.1.104","TCP","54","47772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52739","25.691766","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52740","25.692219","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52741","25.692225","172.30.1.205","172.30.1.104","TCP","54","47772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52742","25.694075","172.30.1.205","172.30.1.104","TCP","54","47772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52743","25.694186","172.30.1.205","172.30.1.104","TCP","74","40410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928920 TSecr=0 WS=128" +"52744","25.694301","172.30.1.104","172.30.1.205","TCP","54","135 > 47772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52745","25.694328","172.30.1.104","172.30.1.205","TCP","54","135 > 47772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52746","25.694334","172.30.1.205","172.30.1.104","TCP","54","47772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52747","25.694466","172.30.1.104","172.30.1.205","TCP","66","49671 > 40410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52748","25.694474","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52749","25.694829","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52750","25.695108","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52751","25.695117","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52752","25.697038","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52753","25.697361","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52754","25.697367","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52755","25.698723","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52756","25.702450","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52757","25.702465","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52758","25.703511","172.30.1.205","172.30.1.104","TCP","74","47776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928929 TSecr=0 WS=128" +"52759","25.703823","172.30.1.104","172.30.1.205","TCP","66","135 > 47776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52760","25.703836","172.30.1.205","172.30.1.104","TCP","54","47776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52761","25.704203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52762","25.704488","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52763","25.704497","172.30.1.205","172.30.1.104","TCP","54","47776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52764","25.706769","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52765","25.707144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52766","25.707151","172.30.1.205","172.30.1.104","TCP","54","47776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52767","25.709012","172.30.1.205","172.30.1.104","TCP","54","47776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52768","25.709124","172.30.1.205","172.30.1.104","TCP","74","40414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928935 TSecr=0 WS=128" +"52769","25.709309","172.30.1.104","172.30.1.205","TCP","54","135 > 47776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52770","25.709352","172.30.1.104","172.30.1.205","TCP","54","135 > 47776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52771","25.709357","172.30.1.205","172.30.1.104","TCP","54","47776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52772","25.709458","172.30.1.104","172.30.1.205","TCP","66","49671 > 40414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52773","25.709467","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52774","25.709816","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52775","25.710100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52776","25.710109","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52777","25.712003","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52778","25.712379","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52779","25.712386","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52780","25.713787","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52781","25.717652","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52782","25.717663","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52783","25.718614","172.30.1.205","172.30.1.104","TCP","74","47780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928945 TSecr=0 WS=128" +"52784","25.718944","172.30.1.104","172.30.1.205","TCP","66","135 > 47780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52785","25.718955","172.30.1.205","172.30.1.104","TCP","54","47780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52786","25.719307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52787","25.719594","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52788","25.719605","172.30.1.205","172.30.1.104","TCP","54","47780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52789","25.721858","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52790","25.722226","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52791","25.722233","172.30.1.205","172.30.1.104","TCP","54","47780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52792","25.724051","172.30.1.205","172.30.1.104","TCP","54","47780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52793","25.724162","172.30.1.205","172.30.1.104","TCP","74","40418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928950 TSecr=0 WS=128" +"52794","25.724311","172.30.1.104","172.30.1.205","TCP","54","135 > 47780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52795","25.724322","172.30.1.104","172.30.1.205","TCP","54","135 > 47780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52796","25.724327","172.30.1.205","172.30.1.104","TCP","54","47780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52797","25.724421","172.30.1.104","172.30.1.205","TCP","66","49671 > 40418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52798","25.724429","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52799","25.724793","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52800","25.725058","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52801","25.725067","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52802","25.726968","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52803","25.727362","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52804","25.727368","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52805","25.728752","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52806","25.732656","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52807","25.732665","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52808","25.733629","172.30.1.205","172.30.1.104","TCP","74","47784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928960 TSecr=0 WS=128" +"52809","25.733894","172.30.1.104","172.30.1.205","TCP","66","135 > 47784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52810","25.733905","172.30.1.205","172.30.1.104","TCP","54","47784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52811","25.734270","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52812","25.734529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52813","25.734537","172.30.1.205","172.30.1.104","TCP","54","47784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52814","25.736738","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52815","25.737140","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52816","25.737150","172.30.1.205","172.30.1.104","TCP","54","47784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52817","25.739045","172.30.1.205","172.30.1.104","TCP","54","47784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52818","25.739169","172.30.1.205","172.30.1.104","TCP","74","40422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928965 TSecr=0 WS=128" +"52819","25.739332","172.30.1.104","172.30.1.205","TCP","54","135 > 47784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52820","25.739342","172.30.1.104","172.30.1.205","TCP","54","135 > 47784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52821","25.739347","172.30.1.205","172.30.1.104","TCP","54","47784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52822","25.739459","172.30.1.104","172.30.1.205","TCP","66","49671 > 40422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52823","25.739467","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52824","25.739816","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52825","25.740074","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52826","25.740081","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52827","25.742036","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52828","25.742417","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52829","25.742423","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52830","25.743777","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52831","25.747676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52832","25.747687","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52833","25.748650","172.30.1.205","172.30.1.104","TCP","74","47788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928975 TSecr=0 WS=128" +"52834","25.748968","172.30.1.104","172.30.1.205","TCP","66","135 > 47788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52835","25.748980","172.30.1.205","172.30.1.104","TCP","54","47788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52836","25.749341","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52837","25.749626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52838","25.749636","172.30.1.205","172.30.1.104","TCP","54","47788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52839","25.751844","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52840","25.752240","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52841","25.752247","172.30.1.205","172.30.1.104","TCP","54","47788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52842","25.754106","172.30.1.205","172.30.1.104","TCP","54","47788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52843","25.754218","172.30.1.205","172.30.1.104","TCP","74","40426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928980 TSecr=0 WS=128" +"52844","25.754361","172.30.1.104","172.30.1.205","TCP","54","135 > 47788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52845","25.754375","172.30.1.104","172.30.1.205","TCP","54","135 > 47788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52846","25.754380","172.30.1.205","172.30.1.104","TCP","54","47788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52847","25.754476","172.30.1.104","172.30.1.205","TCP","66","49671 > 40426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52848","25.754484","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52849","25.754845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52850","25.755174","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52851","25.755183","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52852","25.757102","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52853","25.757456","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52854","25.757463","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52855","25.758819","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52856","25.762637","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52857","25.762649","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52858","25.763613","172.30.1.205","172.30.1.104","TCP","74","47792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928990 TSecr=0 WS=128" +"52859","25.763962","172.30.1.104","172.30.1.205","TCP","66","135 > 47792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52860","25.763973","172.30.1.205","172.30.1.104","TCP","54","47792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52861","25.764330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52862","25.764614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52863","25.764623","172.30.1.205","172.30.1.104","TCP","54","47792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52864","25.766868","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52865","25.767236","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52866","25.767242","172.30.1.205","172.30.1.104","TCP","54","47792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52867","25.769093","172.30.1.205","172.30.1.104","TCP","54","47792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52868","25.769205","172.30.1.205","172.30.1.104","TCP","74","40430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928995 TSecr=0 WS=128" +"52869","25.769341","172.30.1.104","172.30.1.205","TCP","54","135 > 47792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52870","25.769355","172.30.1.104","172.30.1.205","TCP","54","135 > 47792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52871","25.769361","172.30.1.205","172.30.1.104","TCP","54","47792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52872","25.769482","172.30.1.104","172.30.1.205","TCP","66","49671 > 40430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52873","25.769490","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52874","25.769839","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52875","25.770137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52876","25.770146","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52877","25.772047","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52878","25.772411","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52879","25.772417","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52880","25.773854","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52881","25.777706","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52882","25.777720","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52883","25.778773","172.30.1.205","172.30.1.104","TCP","74","47796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929005 TSecr=0 WS=128" +"52884","25.779085","172.30.1.104","172.30.1.205","TCP","66","135 > 47796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52885","25.779096","172.30.1.205","172.30.1.104","TCP","54","47796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52886","25.779460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52887","25.782893","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52888","25.782903","172.30.1.205","172.30.1.104","TCP","54","47796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52889","25.785173","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52890","25.785603","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52891","25.785610","172.30.1.205","172.30.1.104","TCP","54","47796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52892","25.787450","172.30.1.205","172.30.1.104","TCP","54","47796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52893","25.787562","172.30.1.205","172.30.1.104","TCP","74","40434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929013 TSecr=0 WS=128" +"52894","25.787779","172.30.1.104","172.30.1.205","TCP","54","135 > 47796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52895","25.787921","172.30.1.104","172.30.1.205","TCP","54","135 > 47796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52896","25.787927","172.30.1.205","172.30.1.104","TCP","54","47796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52897","25.787932","172.30.1.104","172.30.1.205","TCP","66","49671 > 40434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52898","25.787941","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52899","25.788301","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52900","25.788622","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52901","25.788631","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52902","25.790529","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52903","25.791335","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52904","25.791342","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52905","25.792702","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52906","25.797704","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52907","25.797718","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52908","25.798792","172.30.1.205","172.30.1.104","TCP","74","47800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929025 TSecr=0 WS=128" +"52909","25.799273","172.30.1.104","172.30.1.205","TCP","66","135 > 47800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52910","25.799287","172.30.1.205","172.30.1.104","TCP","54","47800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52911","25.799650","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52912","25.799931","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52913","25.799940","172.30.1.205","172.30.1.104","TCP","54","47800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52914","25.802204","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52915","25.803119","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52916","25.803126","172.30.1.205","172.30.1.104","TCP","54","47800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52917","25.803996","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52918","25.804046","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52919","25.804073","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52920","25.804114","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52921","25.804147","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52922","25.804171","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52923","25.804199","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52924","25.804222","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52925","25.804244","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52926","25.804271","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52927","25.804293","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52928","25.804376","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52929","25.804747","172.30.1.104","172.30.1.205","TCP","54","49671 > 40394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52930","25.804789","172.30.1.104","172.30.1.205","TCP","54","49671 > 40398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52931","25.804804","172.30.1.104","172.30.1.205","TCP","54","49671 > 40394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52932","25.804812","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52933","25.804822","172.30.1.104","172.30.1.205","TCP","54","49671 > 40402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52934","25.804835","172.30.1.104","172.30.1.205","TCP","54","49671 > 40398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52935","25.804837","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52936","25.804907","172.30.1.104","172.30.1.205","TCP","54","49671 > 40406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52937","25.804913","172.30.1.104","172.30.1.205","TCP","54","49671 > 40410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52938","25.804926","172.30.1.104","172.30.1.205","TCP","54","49671 > 40414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52939","25.804940","172.30.1.104","172.30.1.205","TCP","54","49671 > 40418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52940","25.804990","172.30.1.104","172.30.1.205","TCP","54","49671 > 40422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52941","25.805053","172.30.1.104","172.30.1.205","TCP","54","49671 > 40426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52942","25.805083","172.30.1.104","172.30.1.205","TCP","54","49671 > 40430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52943","25.805119","172.30.1.104","172.30.1.205","TCP","54","49671 > 40434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52944","25.805148","172.30.1.104","172.30.1.205","TCP","54","49671 > 40390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52945","25.805232","172.30.1.104","172.30.1.205","TCP","54","49671 > 40390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52946","25.805237","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52947","25.805246","172.30.1.104","172.30.1.205","TCP","54","49671 > 40434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52948","25.805248","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52949","25.805250","172.30.1.104","172.30.1.205","TCP","54","49671 > 40430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52950","25.805251","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52951","25.805253","172.30.1.104","172.30.1.205","TCP","54","49671 > 40426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52952","25.805257","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52953","25.805309","172.30.1.104","172.30.1.205","TCP","54","49671 > 40422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52954","25.805312","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52955","25.805417","172.30.1.104","172.30.1.205","TCP","54","49671 > 40418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52956","25.805422","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52957","25.805437","172.30.1.104","172.30.1.205","TCP","54","49671 > 40414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52958","25.805439","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52959","25.805458","172.30.1.104","172.30.1.205","TCP","54","49671 > 40410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52960","25.805461","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52961","25.805479","172.30.1.104","172.30.1.205","TCP","54","49671 > 40402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52962","25.805482","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52963","25.805499","172.30.1.104","172.30.1.205","TCP","54","49671 > 40406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"52964","25.805502","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"52965","25.805971","172.30.1.205","172.30.1.104","TCP","54","47800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52966","25.806099","172.30.1.205","172.30.1.104","TCP","74","40438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929032 TSecr=0 WS=128" +"52967","25.806271","172.30.1.104","172.30.1.205","TCP","54","135 > 47800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52968","25.806302","172.30.1.104","172.30.1.205","TCP","54","135 > 47800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52969","25.806307","172.30.1.205","172.30.1.104","TCP","54","47800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52970","25.806413","172.30.1.104","172.30.1.205","TCP","66","49671 > 40438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52971","25.806422","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52972","25.806776","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52973","25.807130","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52974","25.807139","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52975","25.809056","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"52976","25.809423","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"52977","25.809430","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"52978","25.810800","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"52979","25.815047","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"52980","25.815057","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"52981","25.816015","172.30.1.205","172.30.1.104","TCP","74","47804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929042 TSecr=0 WS=128" +"52982","25.816385","172.30.1.104","172.30.1.205","TCP","66","135 > 47804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52983","25.816398","172.30.1.205","172.30.1.104","TCP","54","47804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52984","25.816761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"52985","25.817102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52986","25.817111","172.30.1.205","172.30.1.104","TCP","54","47804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"52987","25.819295","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"52988","25.819750","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"52989","25.819756","172.30.1.205","172.30.1.104","TCP","54","47804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52990","25.821593","172.30.1.205","172.30.1.104","TCP","54","47804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"52991","25.821705","172.30.1.205","172.30.1.104","TCP","74","40442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929048 TSecr=0 WS=128" +"52992","25.821896","172.30.1.104","172.30.1.205","TCP","54","135 > 47804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52993","25.821907","172.30.1.104","172.30.1.205","TCP","54","135 > 47804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"52994","25.821913","172.30.1.205","172.30.1.104","TCP","54","47804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"52995","25.822032","172.30.1.104","172.30.1.205","TCP","66","49671 > 40442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"52996","25.822041","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"52997","25.822404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"52998","25.822710","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"52999","25.822720","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53000","25.824611","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53001","25.825032","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53002","25.825039","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53003","25.826410","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53004","25.830353","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53005","25.830363","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53006","25.831306","172.30.1.205","172.30.1.104","TCP","74","47808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929057 TSecr=0 WS=128" +"53007","25.831588","172.30.1.104","172.30.1.205","TCP","66","135 > 47808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53008","25.831599","172.30.1.205","172.30.1.104","TCP","54","47808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53009","25.831950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53010","25.832240","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53011","25.832249","172.30.1.205","172.30.1.104","TCP","54","47808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53012","25.834477","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53013","25.834898","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53014","25.834905","172.30.1.205","172.30.1.104","TCP","54","47808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53015","25.836729","172.30.1.205","172.30.1.104","TCP","54","47808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53016","25.836864","172.30.1.205","172.30.1.104","TCP","74","40446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929063 TSecr=0 WS=128" +"53017","25.836995","172.30.1.104","172.30.1.205","TCP","54","135 > 47808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53018","25.837021","172.30.1.104","172.30.1.205","TCP","54","135 > 47808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53019","25.837026","172.30.1.205","172.30.1.104","TCP","54","47808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53020","25.837133","172.30.1.104","172.30.1.205","TCP","66","49671 > 40446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53021","25.837142","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53022","25.837494","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53023","25.837758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53024","25.837767","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53025","25.839641","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53026","25.840419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53027","25.840425","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53028","25.841832","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53029","25.847350","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53030","25.847365","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53031","25.848453","172.30.1.205","172.30.1.104","TCP","74","47812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929074 TSecr=0 WS=128" +"53032","25.848812","172.30.1.104","172.30.1.205","TCP","66","135 > 47812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53033","25.848824","172.30.1.205","172.30.1.104","TCP","54","47812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53034","25.849191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53035","25.849494","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53036","25.849503","172.30.1.205","172.30.1.104","TCP","54","47812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53037","25.851742","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53038","25.852168","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53039","25.852174","172.30.1.205","172.30.1.104","TCP","54","47812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53040","25.854039","172.30.1.205","172.30.1.104","TCP","54","47812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53041","25.854166","172.30.1.205","172.30.1.104","TCP","74","40450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929080 TSecr=0 WS=128" +"53042","25.854326","172.30.1.104","172.30.1.205","TCP","54","135 > 47812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53043","25.854336","172.30.1.104","172.30.1.205","TCP","54","135 > 47812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53044","25.854344","172.30.1.205","172.30.1.104","TCP","54","47812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53045","25.854471","172.30.1.104","172.30.1.205","TCP","66","49671 > 40450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53046","25.854480","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53047","25.854857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53048","25.855859","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53049","25.855868","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53050","25.857794","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53051","25.858179","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53052","25.858186","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53053","25.859584","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53054","25.863578","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53055","25.863589","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53056","25.864614","172.30.1.205","172.30.1.104","TCP","74","47816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929091 TSecr=0 WS=128" +"53057","25.864991","172.30.1.104","172.30.1.205","TCP","66","135 > 47816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53058","25.865003","172.30.1.205","172.30.1.104","TCP","54","47816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53059","25.865371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53060","25.865693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53061","25.865702","172.30.1.205","172.30.1.104","TCP","54","47816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53062","25.867934","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53063","25.868344","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53064","25.868352","172.30.1.205","172.30.1.104","TCP","54","47816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53065","25.870219","172.30.1.205","172.30.1.104","TCP","54","47816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53066","25.870360","172.30.1.205","172.30.1.104","TCP","74","40454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929096 TSecr=0 WS=128" +"53067","25.870603","172.30.1.104","172.30.1.205","TCP","54","135 > 47816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53068","25.870614","172.30.1.104","172.30.1.205","TCP","54","135 > 47816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53069","25.870622","172.30.1.205","172.30.1.104","TCP","54","47816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53070","25.870700","172.30.1.104","172.30.1.205","TCP","66","49671 > 40454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53071","25.870708","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53072","25.871062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53073","25.871349","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53074","25.871358","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53075","25.873295","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53076","25.873655","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53077","25.873661","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53078","25.875061","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53079","25.879082","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53080","25.879097","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53081","25.880215","172.30.1.205","172.30.1.104","TCP","74","47820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929106 TSecr=0 WS=128" +"53082","25.880559","172.30.1.104","172.30.1.205","TCP","66","135 > 47820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53083","25.880572","172.30.1.205","172.30.1.104","TCP","54","47820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53084","25.880974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53085","25.881366","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53086","25.881376","172.30.1.205","172.30.1.104","TCP","54","47820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53087","25.883668","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53088","25.884082","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53089","25.884089","172.30.1.205","172.30.1.104","TCP","54","47820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53090","25.885967","172.30.1.205","172.30.1.104","TCP","54","47820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53091","25.886109","172.30.1.205","172.30.1.104","TCP","74","40458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929112 TSecr=0 WS=128" +"53092","25.886257","172.30.1.104","172.30.1.205","TCP","54","135 > 47820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53093","25.886268","172.30.1.104","172.30.1.205","TCP","54","135 > 47820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53094","25.886276","172.30.1.205","172.30.1.104","TCP","54","47820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53095","25.886394","172.30.1.104","172.30.1.205","TCP","66","49671 > 40458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53096","25.886403","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53097","25.886751","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53098","25.887022","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53099","25.887031","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53100","25.888966","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53101","25.889322","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53102","25.889329","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53103","25.890707","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53104","25.894712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53105","25.894723","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53106","25.895721","172.30.1.205","172.30.1.104","TCP","74","47824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929122 TSecr=0 WS=128" +"53107","25.896015","172.30.1.104","172.30.1.205","TCP","66","135 > 47824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53108","25.896026","172.30.1.205","172.30.1.104","TCP","54","47824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53109","25.896380","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53110","25.896663","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53111","25.896672","172.30.1.205","172.30.1.104","TCP","54","47824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53112","25.898909","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53113","25.899356","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53114","25.899366","172.30.1.205","172.30.1.104","TCP","54","47824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53115","25.901306","172.30.1.205","172.30.1.104","TCP","54","47824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53116","25.901438","172.30.1.205","172.30.1.104","TCP","74","40462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929127 TSecr=0 WS=128" +"53117","25.901654","172.30.1.104","172.30.1.205","TCP","54","135 > 47824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53118","25.901664","172.30.1.104","172.30.1.205","TCP","54","135 > 47824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53119","25.901671","172.30.1.205","172.30.1.104","TCP","54","47824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53120","25.901814","172.30.1.104","172.30.1.205","TCP","66","49671 > 40462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53121","25.901831","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53122","25.902181","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53123","25.902441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53124","25.902451","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53125","25.904359","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53126","25.904738","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53127","25.904745","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53128","25.906130","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53129","25.910080","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53130","25.910091","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53131","25.911102","172.30.1.205","172.30.1.104","TCP","74","47828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929137 TSecr=0 WS=128" +"53132","25.911453","172.30.1.104","172.30.1.205","TCP","66","135 > 47828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53133","25.911464","172.30.1.205","172.30.1.104","TCP","54","47828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53134","25.911828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53135","25.912162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53136","25.912170","172.30.1.205","172.30.1.104","TCP","54","47828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53137","25.914422","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53138","25.914838","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53139","25.914845","172.30.1.205","172.30.1.104","TCP","54","47828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53140","25.916649","172.30.1.205","172.30.1.104","TCP","54","47828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53141","25.916762","172.30.1.205","172.30.1.104","TCP","74","40466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929143 TSecr=0 WS=128" +"53142","25.916947","172.30.1.104","172.30.1.205","TCP","54","135 > 47828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53143","25.916957","172.30.1.104","172.30.1.205","TCP","54","135 > 47828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53144","25.916963","172.30.1.205","172.30.1.104","TCP","54","47828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53145","25.917081","172.30.1.104","172.30.1.205","TCP","66","49671 > 40466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53146","25.917089","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53147","25.917446","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53148","25.917763","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53149","25.917774","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53150","25.919670","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53151","25.921251","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53152","25.921258","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53153","25.922634","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53154","25.926494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53155","25.926505","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53156","25.927481","172.30.1.205","172.30.1.104","TCP","74","47832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929153 TSecr=0 WS=128" +"53157","25.927769","172.30.1.104","172.30.1.205","TCP","66","135 > 47832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53158","25.927779","172.30.1.205","172.30.1.104","TCP","54","47832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53159","25.928136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53160","25.928418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53161","25.928427","172.30.1.205","172.30.1.104","TCP","54","47832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53162","25.930632","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53163","25.931050","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53164","25.931057","172.30.1.205","172.30.1.104","TCP","54","47832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53165","25.932891","172.30.1.205","172.30.1.104","TCP","54","47832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53166","25.933003","172.30.1.205","172.30.1.104","TCP","74","40470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929159 TSecr=0 WS=128" +"53167","25.933169","172.30.1.104","172.30.1.205","TCP","54","135 > 47832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53168","25.933179","172.30.1.104","172.30.1.205","TCP","54","135 > 47832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53169","25.933185","172.30.1.205","172.30.1.104","TCP","54","47832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53170","25.933280","172.30.1.104","172.30.1.205","TCP","66","49671 > 40470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53171","25.933288","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53172","25.933637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53173","25.933937","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53174","25.933946","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53175","25.935804","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53176","25.936244","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53177","25.936254","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53178","25.937737","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53179","25.942404","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53180","25.942415","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53181","25.943403","172.30.1.205","172.30.1.104","TCP","74","47836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929169 TSecr=0 WS=128" +"53182","25.943721","172.30.1.104","172.30.1.205","TCP","66","135 > 47836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53183","25.943732","172.30.1.205","172.30.1.104","TCP","54","47836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53184","25.944082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53185","25.944410","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53186","25.944420","172.30.1.205","172.30.1.104","TCP","54","47836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53187","25.946638","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53188","25.947070","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53189","25.947077","172.30.1.205","172.30.1.104","TCP","54","47836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53190","25.948896","172.30.1.205","172.30.1.104","TCP","54","47836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53191","25.949005","172.30.1.205","172.30.1.104","TCP","74","40474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929175 TSecr=0 WS=128" +"53192","25.949161","172.30.1.104","172.30.1.205","TCP","54","135 > 47836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53193","25.949214","172.30.1.104","172.30.1.205","TCP","54","135 > 47836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53194","25.949220","172.30.1.205","172.30.1.104","TCP","54","47836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53195","25.949296","172.30.1.104","172.30.1.205","TCP","66","49671 > 40474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53196","25.949304","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53197","25.949655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53198","25.949937","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53199","25.949946","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53200","25.951843","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53201","25.952200","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53202","25.952206","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53203","25.953623","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53204","25.957576","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53205","25.957586","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53206","25.958543","172.30.1.205","172.30.1.104","TCP","74","47840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929184 TSecr=0 WS=128" +"53207","25.958859","172.30.1.104","172.30.1.205","TCP","66","135 > 47840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53208","25.958870","172.30.1.205","172.30.1.104","TCP","54","47840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53209","25.959218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53210","25.959536","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53211","25.959545","172.30.1.205","172.30.1.104","TCP","54","47840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53212","25.961761","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53213","25.962158","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53214","25.962165","172.30.1.205","172.30.1.104","TCP","54","47840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53215","25.963960","172.30.1.205","172.30.1.104","TCP","54","47840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53216","25.964070","172.30.1.205","172.30.1.104","TCP","74","40478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929190 TSecr=0 WS=128" +"53217","25.964205","172.30.1.104","172.30.1.205","TCP","54","135 > 47840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53218","25.964245","172.30.1.104","172.30.1.205","TCP","54","135 > 47840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53219","25.964251","172.30.1.205","172.30.1.104","TCP","54","47840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53220","25.964337","172.30.1.104","172.30.1.205","TCP","66","49671 > 40478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53221","25.964345","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53222","25.964689","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53223","25.964976","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53224","25.964983","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53225","25.966866","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53226","25.967211","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53227","25.967217","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53228","25.968557","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53229","25.972456","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53230","25.972469","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53231","25.973737","172.30.1.205","172.30.1.104","TCP","74","47844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929200 TSecr=0 WS=128" +"53232","25.974008","172.30.1.104","172.30.1.205","TCP","66","135 > 47844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53233","25.974019","172.30.1.205","172.30.1.104","TCP","54","47844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53234","25.974368","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53235","25.974671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53236","25.974680","172.30.1.205","172.30.1.104","TCP","54","47844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53237","25.976879","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53238","25.977248","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53239","25.977260","172.30.1.205","172.30.1.104","TCP","54","47844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53240","25.979066","172.30.1.205","172.30.1.104","TCP","54","47844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53241","25.979175","172.30.1.205","172.30.1.104","TCP","74","40482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929205 TSecr=0 WS=128" +"53242","25.979321","172.30.1.104","172.30.1.205","TCP","54","135 > 47844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53243","25.979337","172.30.1.104","172.30.1.205","TCP","54","135 > 47844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53244","25.979342","172.30.1.205","172.30.1.104","TCP","54","47844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53245","25.979443","172.30.1.104","172.30.1.205","TCP","66","49671 > 40482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53246","25.979451","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53247","25.979792","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53248","25.980055","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53249","25.980065","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53250","25.981968","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53251","25.982357","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53252","25.982363","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53253","25.983695","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53254","25.987711","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53255","25.987720","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53256","25.988654","172.30.1.205","172.30.1.104","TCP","74","47848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929215 TSecr=0 WS=128" +"53257","25.988978","172.30.1.104","172.30.1.205","TCP","66","135 > 47848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53258","25.988989","172.30.1.205","172.30.1.104","TCP","54","47848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53259","25.989356","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53260","25.989727","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53261","25.989738","172.30.1.205","172.30.1.104","TCP","54","47848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53262","25.991999","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53263","25.992368","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53264","25.992379","172.30.1.205","172.30.1.104","TCP","54","47848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53265","25.993335","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53266","25.993385","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53267","25.993425","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53268","25.993461","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53269","25.993494","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53270","25.993526","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53271","25.993549","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53272","25.993581","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53273","25.993604","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53274","25.993630","172.30.1.104","172.30.1.205","TCP","54","49671 > 40438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53275","25.993644","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53276","25.993661","172.30.1.104","172.30.1.205","TCP","54","49671 > 40442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53277","25.993692","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53278","25.993720","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53279","25.993768","172.30.1.104","172.30.1.205","TCP","54","49671 > 40446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53280","25.993788","172.30.1.104","172.30.1.205","TCP","54","49671 > 40438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53281","25.993795","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53282","25.993808","172.30.1.104","172.30.1.205","TCP","54","49671 > 40442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53283","25.993811","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53284","25.993829","172.30.1.104","172.30.1.205","TCP","54","49671 > 40446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53285","25.993833","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53286","25.993962","172.30.1.104","172.30.1.205","TCP","54","49671 > 40450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53287","25.993982","172.30.1.104","172.30.1.205","TCP","54","49671 > 40454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53288","25.994002","172.30.1.104","172.30.1.205","TCP","54","49671 > 40458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53289","25.994023","172.30.1.104","172.30.1.205","TCP","54","49671 > 40462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53290","25.994043","172.30.1.104","172.30.1.205","TCP","54","49671 > 40466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53291","25.994175","172.30.1.104","172.30.1.205","TCP","54","49671 > 40470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53292","25.994194","172.30.1.104","172.30.1.205","TCP","54","49671 > 40474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53293","25.994215","172.30.1.104","172.30.1.205","TCP","54","49671 > 40474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53294","25.994220","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53295","25.994235","172.30.1.104","172.30.1.205","TCP","54","49671 > 40470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53296","25.994238","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53297","25.994259","172.30.1.104","172.30.1.205","TCP","54","49671 > 40466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53298","25.994262","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53299","25.994278","172.30.1.104","172.30.1.205","TCP","54","49671 > 40462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53300","25.994281","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53301","25.994299","172.30.1.104","172.30.1.205","TCP","54","49671 > 40450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53302","25.994302","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53303","25.994359","172.30.1.104","172.30.1.205","TCP","54","49671 > 40454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53304","25.994363","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53305","25.994368","172.30.1.104","172.30.1.205","TCP","54","49671 > 40458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53306","25.994370","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53307","25.994481","172.30.1.104","172.30.1.205","TCP","54","49671 > 40478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53308","25.994499","172.30.1.104","172.30.1.205","TCP","54","49671 > 40482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53309","25.994521","172.30.1.104","172.30.1.205","TCP","54","49671 > 40478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53310","25.994526","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53311","25.994541","172.30.1.104","172.30.1.205","TCP","54","49671 > 40482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53312","25.994544","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53313","25.995317","172.30.1.205","172.30.1.104","TCP","54","47848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53314","25.995437","172.30.1.205","172.30.1.104","TCP","74","40486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929221 TSecr=0 WS=128" +"53315","25.995559","172.30.1.104","172.30.1.205","TCP","54","135 > 47848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53316","25.995589","172.30.1.104","172.30.1.205","TCP","54","135 > 47848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53317","25.995594","172.30.1.205","172.30.1.104","TCP","54","47848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53318","25.995725","172.30.1.104","172.30.1.205","TCP","66","49671 > 40486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53319","25.995734","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53320","25.996097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53321","25.996384","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53322","25.996393","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53323","25.998308","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53324","25.998669","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53325","25.998676","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53326","26.000033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53327","26.003894","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53328","26.003904","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53329","26.004878","172.30.1.205","172.30.1.104","TCP","74","47852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929231 TSecr=0 WS=128" +"53330","26.005281","172.30.1.104","172.30.1.205","TCP","66","135 > 47852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53331","26.005293","172.30.1.205","172.30.1.104","TCP","54","47852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53332","26.005669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53333","26.006019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53334","26.006028","172.30.1.205","172.30.1.104","TCP","54","47852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53335","26.008220","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53336","26.008626","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53337","26.008632","172.30.1.205","172.30.1.104","TCP","54","47852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53338","26.010463","172.30.1.205","172.30.1.104","TCP","54","47852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53339","26.010576","172.30.1.205","172.30.1.104","TCP","74","40490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929237 TSecr=0 WS=128" +"53340","26.010771","172.30.1.104","172.30.1.205","TCP","54","135 > 47852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53341","26.010782","172.30.1.104","172.30.1.205","TCP","54","135 > 47852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53342","26.010788","172.30.1.205","172.30.1.104","TCP","54","47852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53343","26.011587","172.30.1.104","172.30.1.205","TCP","66","49671 > 40490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53344","26.011598","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53345","26.011970","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53346","26.012338","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53347","26.012347","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53348","26.014281","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53349","26.014676","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53350","26.014683","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53351","26.016042","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53352","26.020009","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53353","26.020021","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53354","26.021057","172.30.1.205","172.30.1.104","TCP","74","47856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929247 TSecr=0 WS=128" +"53355","26.021367","172.30.1.104","172.30.1.205","TCP","66","135 > 47856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53356","26.021378","172.30.1.205","172.30.1.104","TCP","54","47856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53357","26.021730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53358","26.022015","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53359","26.022024","172.30.1.205","172.30.1.104","TCP","54","47856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53360","26.024240","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53361","26.024684","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53362","26.024690","172.30.1.205","172.30.1.104","TCP","54","47856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53363","26.026551","172.30.1.205","172.30.1.104","TCP","54","47856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53364","26.026665","172.30.1.205","172.30.1.104","TCP","74","40494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929253 TSecr=0 WS=128" +"53365","26.026831","172.30.1.104","172.30.1.205","TCP","54","135 > 47856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53366","26.026844","172.30.1.104","172.30.1.205","TCP","54","135 > 47856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53367","26.026851","172.30.1.205","172.30.1.104","TCP","54","47856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53368","26.027011","172.30.1.104","172.30.1.205","TCP","66","49671 > 40494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53369","26.027020","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53370","26.027380","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53371","26.027728","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53372","26.027737","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53373","26.029642","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53374","26.030013","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53375","26.030019","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53376","26.031374","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53377","26.035258","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53378","26.035267","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53379","26.036214","172.30.1.205","172.30.1.104","TCP","74","47860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929262 TSecr=0 WS=128" +"53380","26.036542","172.30.1.104","172.30.1.205","TCP","66","135 > 47860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53381","26.036554","172.30.1.205","172.30.1.104","TCP","54","47860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53382","26.036936","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53383","26.037227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53384","26.037236","172.30.1.205","172.30.1.104","TCP","54","47860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53385","26.039439","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53386","26.039885","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53387","26.039892","172.30.1.205","172.30.1.104","TCP","54","47860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53388","26.041753","172.30.1.205","172.30.1.104","TCP","54","47860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53389","26.041863","172.30.1.205","172.30.1.104","TCP","74","40498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929268 TSecr=0 WS=128" +"53390","26.042059","172.30.1.104","172.30.1.205","TCP","54","135 > 47860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53391","26.042108","172.30.1.104","172.30.1.205","TCP","54","135 > 47860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53392","26.042114","172.30.1.205","172.30.1.104","TCP","54","47860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53393","26.042135","172.30.1.104","172.30.1.205","TCP","66","49671 > 40498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53394","26.042143","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53395","26.042486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53396","26.042798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53397","26.042805","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53398","26.044756","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53399","26.045176","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53400","26.045183","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53401","26.046535","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53402","26.050443","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53403","26.050454","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53404","26.051430","172.30.1.205","172.30.1.104","TCP","74","47864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929277 TSecr=0 WS=128" +"53405","26.051728","172.30.1.104","172.30.1.205","TCP","66","135 > 47864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53406","26.051739","172.30.1.205","172.30.1.104","TCP","54","47864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53407","26.052089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53408","26.052387","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53409","26.052396","172.30.1.205","172.30.1.104","TCP","54","47864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53410","26.054606","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53411","26.054996","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53412","26.055008","172.30.1.205","172.30.1.104","TCP","54","47864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53413","26.057010","172.30.1.205","172.30.1.104","TCP","54","47864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53414","26.057120","172.30.1.205","172.30.1.104","TCP","74","40502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929283 TSecr=0 WS=128" +"53415","26.057271","172.30.1.104","172.30.1.205","TCP","54","135 > 47864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53416","26.057281","172.30.1.104","172.30.1.205","TCP","54","135 > 47864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53417","26.057286","172.30.1.205","172.30.1.104","TCP","54","47864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53418","26.057402","172.30.1.104","172.30.1.205","TCP","66","49671 > 40502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53419","26.057410","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53420","26.057767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53421","26.059208","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53422","26.059215","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53423","26.061120","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53424","26.061496","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53425","26.061502","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53426","26.062874","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53427","26.066738","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53428","26.066757","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53429","26.067720","172.30.1.205","172.30.1.104","TCP","74","47868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929294 TSecr=0 WS=128" +"53430","26.068055","172.30.1.104","172.30.1.205","TCP","66","135 > 47868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53431","26.068067","172.30.1.205","172.30.1.104","TCP","54","47868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53432","26.068428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53433","26.068713","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53434","26.068722","172.30.1.205","172.30.1.104","TCP","54","47868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53435","26.070938","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53436","26.071333","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53437","26.071340","172.30.1.205","172.30.1.104","TCP","54","47868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53438","26.073216","172.30.1.205","172.30.1.104","TCP","54","47868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53439","26.073331","172.30.1.205","172.30.1.104","TCP","74","40506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929299 TSecr=0 WS=128" +"53440","26.073466","172.30.1.104","172.30.1.205","TCP","54","135 > 47868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53441","26.073478","172.30.1.104","172.30.1.205","TCP","54","135 > 47868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53442","26.073484","172.30.1.205","172.30.1.104","TCP","54","47868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53443","26.073596","172.30.1.104","172.30.1.205","TCP","66","49671 > 40506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53444","26.073605","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53445","26.073968","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53446","26.074252","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53447","26.074261","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53448","26.076155","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53449","26.076527","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53450","26.076534","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53451","26.077939","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53452","26.081860","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53453","26.081870","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53454","26.082873","172.30.1.205","172.30.1.104","TCP","74","47872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929309 TSecr=0 WS=128" +"53455","26.083179","172.30.1.104","172.30.1.205","TCP","66","135 > 47872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53456","26.083190","172.30.1.205","172.30.1.104","TCP","54","47872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53457","26.083549","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53458","26.083871","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53459","26.083881","172.30.1.205","172.30.1.104","TCP","54","47872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53460","26.086133","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53461","26.086543","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53462","26.086550","172.30.1.205","172.30.1.104","TCP","54","47872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53463","26.088385","172.30.1.205","172.30.1.104","TCP","54","47872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53464","26.088497","172.30.1.205","172.30.1.104","TCP","74","40510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929314 TSecr=0 WS=128" +"53465","26.088634","172.30.1.104","172.30.1.205","TCP","54","135 > 47872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53466","26.088671","172.30.1.104","172.30.1.205","TCP","54","135 > 47872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53467","26.088678","172.30.1.205","172.30.1.104","TCP","54","47872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53468","26.088751","172.30.1.104","172.30.1.205","TCP","66","49671 > 40510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53469","26.088759","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53470","26.089139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53471","26.089414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53472","26.089422","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53473","26.091321","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53474","26.091665","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53475","26.091672","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53476","26.093069","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53477","26.096973","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53478","26.096982","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53479","26.097956","172.30.1.205","172.30.1.104","TCP","74","47876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929324 TSecr=0 WS=128" +"53480","26.098261","172.30.1.104","172.30.1.205","TCP","66","135 > 47876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53481","26.098272","172.30.1.205","172.30.1.104","TCP","54","47876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53482","26.098627","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53483","26.098920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53484","26.098929","172.30.1.205","172.30.1.104","TCP","54","47876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53485","26.101154","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53486","26.101701","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53487","26.101712","172.30.1.205","172.30.1.104","TCP","54","47876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53488","26.103643","172.30.1.205","172.30.1.104","TCP","54","47876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53489","26.103791","172.30.1.205","172.30.1.104","TCP","74","40514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929330 TSecr=0 WS=128" +"53490","26.103900","172.30.1.104","172.30.1.205","TCP","54","135 > 47876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53491","26.103943","172.30.1.104","172.30.1.205","TCP","54","135 > 47876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53492","26.103956","172.30.1.205","172.30.1.104","TCP","54","47876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53493","26.104107","172.30.1.104","172.30.1.205","TCP","66","49671 > 40514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53494","26.104115","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53495","26.104470","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53496","26.104978","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53497","26.104987","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53498","26.106921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53499","26.107317","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53500","26.107326","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53501","26.108800","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53502","26.112686","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53503","26.112710","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53504","26.113915","172.30.1.205","172.30.1.104","TCP","74","47880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929340 TSecr=0 WS=128" +"53505","26.114228","172.30.1.104","172.30.1.205","TCP","66","135 > 47880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53506","26.114241","172.30.1.205","172.30.1.104","TCP","54","47880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53507","26.114619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53508","26.114968","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53509","26.114977","172.30.1.205","172.30.1.104","TCP","54","47880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53510","26.117275","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53511","26.117696","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53512","26.117704","172.30.1.205","172.30.1.104","TCP","54","47880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53513","26.119584","172.30.1.205","172.30.1.104","TCP","54","47880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53514","26.119738","172.30.1.205","172.30.1.104","TCP","74","40518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929346 TSecr=0 WS=128" +"53515","26.119875","172.30.1.104","172.30.1.205","TCP","54","135 > 47880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53516","26.119900","172.30.1.104","172.30.1.205","TCP","54","135 > 47880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53517","26.119909","172.30.1.205","172.30.1.104","TCP","54","47880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53518","26.120101","172.30.1.104","172.30.1.205","TCP","66","49671 > 40518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53519","26.120109","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53520","26.120461","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53521","26.120770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53522","26.120788","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53523","26.122693","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53524","26.123091","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53525","26.123098","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53526","26.124461","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53527","26.128347","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53528","26.128358","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53529","26.129385","172.30.1.205","172.30.1.104","TCP","74","47884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929355 TSecr=0 WS=128" +"53530","26.129719","172.30.1.104","172.30.1.205","TCP","66","135 > 47884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53531","26.129740","172.30.1.205","172.30.1.104","TCP","54","47884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53532","26.130331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53533","26.130620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53534","26.130628","172.30.1.205","172.30.1.104","TCP","54","47884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53535","26.132856","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53536","26.133244","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53537","26.133256","172.30.1.205","172.30.1.104","TCP","54","47884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53538","26.135294","172.30.1.205","172.30.1.104","TCP","54","47884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53539","26.135408","172.30.1.205","172.30.1.104","TCP","74","40522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929361 TSecr=0 WS=128" +"53540","26.135569","172.30.1.104","172.30.1.205","TCP","54","135 > 47884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53541","26.135622","172.30.1.104","172.30.1.205","TCP","54","135 > 47884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53542","26.135628","172.30.1.205","172.30.1.104","TCP","54","47884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53543","26.135697","172.30.1.104","172.30.1.205","TCP","66","49671 > 40522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53544","26.135705","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53545","26.136055","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53546","26.136382","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53547","26.136391","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53548","26.138325","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53549","26.139654","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53550","26.139661","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53551","26.141049","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53552","26.144904","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53553","26.144913","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53554","26.145866","172.30.1.205","172.30.1.104","TCP","74","47888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929372 TSecr=0 WS=128" +"53555","26.146179","172.30.1.104","172.30.1.205","TCP","66","135 > 47888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53556","26.146202","172.30.1.205","172.30.1.104","TCP","54","47888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53557","26.146759","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53558","26.147055","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53559","26.147064","172.30.1.205","172.30.1.104","TCP","54","47888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53560","26.149284","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53561","26.149703","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53562","26.149710","172.30.1.205","172.30.1.104","TCP","54","47888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53563","26.151587","172.30.1.205","172.30.1.104","TCP","54","47888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53564","26.151702","172.30.1.205","172.30.1.104","TCP","74","40526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929378 TSecr=0 WS=128" +"53565","26.151888","172.30.1.104","172.30.1.205","TCP","54","135 > 47888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53566","26.151908","172.30.1.104","172.30.1.205","TCP","54","135 > 47888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53567","26.151913","172.30.1.205","172.30.1.104","TCP","54","47888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53568","26.151983","172.30.1.104","172.30.1.205","TCP","66","49671 > 40526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53569","26.152003","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53570","26.152379","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53571","26.152653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53572","26.152661","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53573","26.154603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53574","26.154958","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53575","26.154970","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53576","26.156509","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53577","26.160355","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53578","26.160364","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53579","26.161351","172.30.1.205","172.30.1.104","TCP","74","47892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929387 TSecr=0 WS=128" +"53580","26.161678","172.30.1.104","172.30.1.205","TCP","66","135 > 47892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53581","26.161691","172.30.1.205","172.30.1.104","TCP","54","47892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53582","26.162053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53583","26.162341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53584","26.162350","172.30.1.205","172.30.1.104","TCP","54","47892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53585","26.164577","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53586","26.164956","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53587","26.164963","172.30.1.205","172.30.1.104","TCP","54","47892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53588","26.166801","172.30.1.205","172.30.1.104","TCP","54","47892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53589","26.166940","172.30.1.205","172.30.1.104","TCP","74","40530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929393 TSecr=0 WS=128" +"53590","26.167057","172.30.1.104","172.30.1.205","TCP","54","135 > 47892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53591","26.167070","172.30.1.104","172.30.1.205","TCP","54","135 > 47892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53592","26.167077","172.30.1.205","172.30.1.104","TCP","54","47892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53593","26.167230","172.30.1.104","172.30.1.205","TCP","66","49671 > 40530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53594","26.167239","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53595","26.167593","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53596","26.167881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53597","26.167889","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53598","26.169820","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53599","26.170203","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53600","26.170209","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53601","26.171569","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53602","26.175512","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53603","26.175523","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53604","26.176516","172.30.1.205","172.30.1.104","TCP","74","47896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929402 TSecr=0 WS=128" +"53605","26.176923","172.30.1.104","172.30.1.205","TCP","66","135 > 47896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53606","26.176934","172.30.1.205","172.30.1.104","TCP","54","47896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53607","26.177304","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53608","26.177619","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53609","26.177628","172.30.1.205","172.30.1.104","TCP","54","47896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53610","26.179823","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53611","26.180218","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53612","26.180225","172.30.1.205","172.30.1.104","TCP","54","47896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53613","26.181104","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53614","26.181159","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53615","26.181198","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53616","26.181232","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53617","26.181264","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53618","26.181292","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53619","26.181320","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53620","26.181347","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53621","26.181376","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53622","26.181399","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53623","26.181409","172.30.1.104","172.30.1.205","TCP","54","49671 > 40490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53624","26.181440","172.30.1.104","172.30.1.205","TCP","54","49671 > 40490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53625","26.181447","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53626","26.181464","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53627","26.181544","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53628","26.181583","172.30.1.104","172.30.1.205","TCP","54","49671 > 40494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53629","26.181601","172.30.1.104","172.30.1.205","TCP","54","49671 > 40498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53630","26.181621","172.30.1.104","172.30.1.205","TCP","54","49671 > 40494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53631","26.181626","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53632","26.181641","172.30.1.104","172.30.1.205","TCP","54","49671 > 40498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53633","26.181644","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53634","26.181674","172.30.1.104","172.30.1.205","TCP","54","49671 > 40502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53635","26.181693","172.30.1.104","172.30.1.205","TCP","54","49671 > 40506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53636","26.181719","172.30.1.104","172.30.1.205","TCP","54","49671 > 40502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53637","26.181724","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53638","26.181740","172.30.1.104","172.30.1.205","TCP","54","49671 > 40510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53639","26.181910","172.30.1.104","172.30.1.205","TCP","54","49671 > 40514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53640","26.181916","172.30.1.104","172.30.1.205","TCP","54","49671 > 40506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53641","26.181920","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53642","26.181926","172.30.1.104","172.30.1.205","TCP","54","49671 > 40510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53643","26.181928","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53644","26.181933","172.30.1.104","172.30.1.205","TCP","54","49671 > 40514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53645","26.181935","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53646","26.181954","172.30.1.104","172.30.1.205","TCP","54","49671 > 40518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53647","26.181972","172.30.1.104","172.30.1.205","TCP","54","49671 > 40522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53648","26.181992","172.30.1.104","172.30.1.205","TCP","54","49671 > 40518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53649","26.181997","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53650","26.182011","172.30.1.104","172.30.1.205","TCP","54","49671 > 40526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53651","26.182145","172.30.1.104","172.30.1.205","TCP","54","49671 > 40530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53652","26.182164","172.30.1.104","172.30.1.205","TCP","54","49671 > 40530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53653","26.182168","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53654","26.182184","172.30.1.104","172.30.1.205","TCP","54","49671 > 40522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53655","26.182186","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53656","26.182220","172.30.1.104","172.30.1.205","TCP","54","49671 > 40526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53657","26.182222","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53658","26.182237","172.30.1.104","172.30.1.205","TCP","54","49671 > 40486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53659","26.182364","172.30.1.104","172.30.1.205","TCP","54","49671 > 40486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53660","26.182368","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53661","26.183091","172.30.1.205","172.30.1.104","TCP","54","47896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53662","26.183203","172.30.1.205","172.30.1.104","TCP","74","40534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929409 TSecr=0 WS=128" +"53663","26.183351","172.30.1.104","172.30.1.205","TCP","54","135 > 47896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53664","26.183457","172.30.1.104","172.30.1.205","TCP","54","135 > 47896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53665","26.183468","172.30.1.205","172.30.1.104","TCP","54","47896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53666","26.183473","172.30.1.104","172.30.1.205","TCP","66","49671 > 40534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53667","26.183481","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53668","26.183835","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53669","26.184155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53670","26.184162","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53671","26.186087","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53672","26.186503","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53673","26.186510","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53674","26.187875","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53675","26.191723","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53676","26.191734","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53677","26.192705","172.30.1.205","172.30.1.104","TCP","74","47900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929419 TSecr=0 WS=128" +"53678","26.193095","172.30.1.104","172.30.1.205","TCP","66","135 > 47900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53679","26.193107","172.30.1.205","172.30.1.104","TCP","54","47900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53680","26.193476","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53681","26.193754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53682","26.193763","172.30.1.205","172.30.1.104","TCP","54","47900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53683","26.195960","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53684","26.196348","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53685","26.196355","172.30.1.205","172.30.1.104","TCP","54","47900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53686","26.198180","172.30.1.205","172.30.1.104","TCP","54","47900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53687","26.198292","172.30.1.205","172.30.1.104","TCP","74","40538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929424 TSecr=0 WS=128" +"53688","26.198434","172.30.1.104","172.30.1.205","TCP","54","135 > 47900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53689","26.198444","172.30.1.104","172.30.1.205","TCP","54","135 > 47900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53690","26.198450","172.30.1.205","172.30.1.104","TCP","54","47900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53691","26.198553","172.30.1.104","172.30.1.205","TCP","66","49671 > 40538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53692","26.198568","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53693","26.198918","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53694","26.199190","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53695","26.199199","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53696","26.201112","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53697","26.201465","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53698","26.201472","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53699","26.202820","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53700","26.206804","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53701","26.206814","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53702","26.207793","172.30.1.205","172.30.1.104","TCP","74","47904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929434 TSecr=0 WS=128" +"53703","26.208125","172.30.1.104","172.30.1.205","TCP","66","135 > 47904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53704","26.208136","172.30.1.205","172.30.1.104","TCP","54","47904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53705","26.208513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53706","26.208848","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53707","26.208857","172.30.1.205","172.30.1.104","TCP","54","47904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53708","26.211100","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53709","26.211479","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53710","26.211485","172.30.1.205","172.30.1.104","TCP","54","47904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53711","26.213320","172.30.1.205","172.30.1.104","TCP","54","47904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53712","26.213434","172.30.1.205","172.30.1.104","TCP","74","40542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929439 TSecr=0 WS=128" +"53713","26.213575","172.30.1.104","172.30.1.205","TCP","54","135 > 47904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53714","26.213610","172.30.1.104","172.30.1.205","TCP","54","135 > 47904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53715","26.213616","172.30.1.205","172.30.1.104","TCP","54","47904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53716","26.213711","172.30.1.104","172.30.1.205","TCP","66","49671 > 40542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53717","26.213719","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53718","26.214064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53719","26.214345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53720","26.214353","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53721","26.216253","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53722","26.216637","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53723","26.216643","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53724","26.218024","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53725","26.221920","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53726","26.221929","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53727","26.222881","172.30.1.205","172.30.1.104","TCP","74","47908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929449 TSecr=0 WS=128" +"53728","26.223169","172.30.1.104","172.30.1.205","TCP","66","135 > 47908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53729","26.223180","172.30.1.205","172.30.1.104","TCP","54","47908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53730","26.223525","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53731","26.223810","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53732","26.223818","172.30.1.205","172.30.1.104","TCP","54","47908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53733","26.226047","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53734","26.226466","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53735","26.226473","172.30.1.205","172.30.1.104","TCP","54","47908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53736","26.228304","172.30.1.205","172.30.1.104","TCP","54","47908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53737","26.228414","172.30.1.205","172.30.1.104","TCP","74","40546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929454 TSecr=0 WS=128" +"53738","26.228604","172.30.1.104","172.30.1.205","TCP","54","135 > 47908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53739","26.228646","172.30.1.104","172.30.1.205","TCP","54","135 > 47908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53740","26.228651","172.30.1.205","172.30.1.104","TCP","54","47908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53741","26.228726","172.30.1.104","172.30.1.205","TCP","66","49671 > 40546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53742","26.228734","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53743","26.229104","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53744","26.229396","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53745","26.229405","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53746","26.231293","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53747","26.231690","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53748","26.231696","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53749","26.233124","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53750","26.237915","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53751","26.237925","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53752","26.238938","172.30.1.205","172.30.1.104","TCP","74","47912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929465 TSecr=0 WS=128" +"53753","26.239229","172.30.1.104","172.30.1.205","TCP","66","135 > 47912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53754","26.239240","172.30.1.205","172.30.1.104","TCP","54","47912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53755","26.239594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53756","26.239889","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53757","26.239898","172.30.1.205","172.30.1.104","TCP","54","47912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53758","26.242133","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53759","26.242616","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53760","26.242622","172.30.1.205","172.30.1.104","TCP","54","47912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53761","26.244458","172.30.1.205","172.30.1.104","TCP","54","47912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53762","26.244569","172.30.1.205","172.30.1.104","TCP","74","40550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929470 TSecr=0 WS=128" +"53763","26.244772","172.30.1.104","172.30.1.205","TCP","54","135 > 47912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53764","26.244813","172.30.1.104","172.30.1.205","TCP","54","135 > 47912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53765","26.244819","172.30.1.205","172.30.1.104","TCP","54","47912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53766","26.244954","172.30.1.104","172.30.1.205","TCP","66","49671 > 40550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53767","26.244970","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53768","26.245569","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53769","26.245875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53770","26.245883","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53771","26.247749","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53772","26.248805","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53773","26.248810","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53774","26.250172","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53775","26.254125","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53776","26.254135","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53777","26.255094","172.30.1.205","172.30.1.104","TCP","74","47916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929481 TSecr=0 WS=128" +"53778","26.255443","172.30.1.104","172.30.1.205","TCP","66","135 > 47916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53779","26.255455","172.30.1.205","172.30.1.104","TCP","54","47916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53780","26.255811","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53781","26.256110","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53782","26.256119","172.30.1.205","172.30.1.104","TCP","54","47916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53783","26.258333","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53784","26.258811","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53785","26.258817","172.30.1.205","172.30.1.104","TCP","54","47916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53786","26.260636","172.30.1.205","172.30.1.104","TCP","54","47916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53787","26.260749","172.30.1.205","172.30.1.104","TCP","74","40554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929487 TSecr=0 WS=128" +"53788","26.260923","172.30.1.104","172.30.1.205","TCP","54","135 > 47916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53789","26.260950","172.30.1.104","172.30.1.205","TCP","54","135 > 47916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53790","26.260956","172.30.1.205","172.30.1.104","TCP","54","47916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53791","26.261024","172.30.1.104","172.30.1.205","TCP","66","49671 > 40554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53792","26.261032","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53793","26.261391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53794","26.261705","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53795","26.261714","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53796","26.263578","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53797","26.264004","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53798","26.264016","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53799","26.265632","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53800","26.269584","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53801","26.269593","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53802","26.270547","172.30.1.205","172.30.1.104","TCP","74","47920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929496 TSecr=0 WS=128" +"53803","26.270841","172.30.1.104","172.30.1.205","TCP","66","135 > 47920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53804","26.270851","172.30.1.205","172.30.1.104","TCP","54","47920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53805","26.271204","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53806","26.271542","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53807","26.271553","172.30.1.205","172.30.1.104","TCP","54","47920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53808","26.273791","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53809","26.274182","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53810","26.274189","172.30.1.205","172.30.1.104","TCP","54","47920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53811","26.276009","172.30.1.205","172.30.1.104","TCP","54","47920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53812","26.276125","172.30.1.205","172.30.1.104","TCP","74","40558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929502 TSecr=0 WS=128" +"53813","26.276280","172.30.1.104","172.30.1.205","TCP","54","135 > 47920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53814","26.276328","172.30.1.104","172.30.1.205","TCP","54","135 > 47920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53815","26.276333","172.30.1.205","172.30.1.104","TCP","54","47920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53816","26.276406","172.30.1.104","172.30.1.205","TCP","66","49671 > 40558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53817","26.276414","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53818","26.276759","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53819","26.277064","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53820","26.277073","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53821","26.278962","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53822","26.279399","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53823","26.279405","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53824","26.280763","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53825","26.284639","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53826","26.284648","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53827","26.285633","172.30.1.205","172.30.1.104","TCP","74","47924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929512 TSecr=0 WS=128" +"53828","26.285970","172.30.1.104","172.30.1.205","TCP","66","135 > 47924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53829","26.285982","172.30.1.205","172.30.1.104","TCP","54","47924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53830","26.286344","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53831","26.286686","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53832","26.286695","172.30.1.205","172.30.1.104","TCP","54","47924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53833","26.288914","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53834","26.289297","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53835","26.289311","172.30.1.205","172.30.1.104","TCP","54","47924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53836","26.291145","172.30.1.205","172.30.1.104","TCP","54","47924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53837","26.291269","172.30.1.205","172.30.1.104","TCP","74","40562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929517 TSecr=0 WS=128" +"53838","26.291423","172.30.1.104","172.30.1.205","TCP","54","135 > 47924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53839","26.291435","172.30.1.104","172.30.1.205","TCP","54","135 > 47924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53840","26.291440","172.30.1.205","172.30.1.104","TCP","54","47924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53841","26.291558","172.30.1.104","172.30.1.205","TCP","66","49671 > 40562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53842","26.291566","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53843","26.291924","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53844","26.292235","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53845","26.292244","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53846","26.294178","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53847","26.294621","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53848","26.294629","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53849","26.296046","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53850","26.300060","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53851","26.300071","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53852","26.301070","172.30.1.205","172.30.1.104","TCP","74","47928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929527 TSecr=0 WS=128" +"53853","26.301387","172.30.1.104","172.30.1.205","TCP","66","135 > 47928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53854","26.301400","172.30.1.205","172.30.1.104","TCP","54","47928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53855","26.301758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53856","26.302094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53857","26.302104","172.30.1.205","172.30.1.104","TCP","54","47928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53858","26.304283","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53859","26.304676","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53860","26.304683","172.30.1.205","172.30.1.104","TCP","54","47928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53861","26.306507","172.30.1.205","172.30.1.104","TCP","54","47928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53862","26.306618","172.30.1.205","172.30.1.104","TCP","74","40566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929533 TSecr=0 WS=128" +"53863","26.306800","172.30.1.104","172.30.1.205","TCP","54","135 > 47928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53864","26.306831","172.30.1.104","172.30.1.205","TCP","54","135 > 47928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53865","26.306837","172.30.1.205","172.30.1.104","TCP","54","47928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53866","26.306913","172.30.1.104","172.30.1.205","TCP","66","49671 > 40566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53867","26.306921","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53868","26.307267","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53869","26.307582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53870","26.307591","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53871","26.309503","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53872","26.309907","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53873","26.309914","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53874","26.311258","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53875","26.316140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53876","26.316151","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53877","26.317170","172.30.1.205","172.30.1.104","TCP","74","47932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929543 TSecr=0 WS=128" +"53878","26.317492","172.30.1.104","172.30.1.205","TCP","66","135 > 47932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53879","26.317503","172.30.1.205","172.30.1.104","TCP","54","47932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53880","26.317857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53881","26.318248","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53882","26.318257","172.30.1.205","172.30.1.104","TCP","54","47932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53883","26.320446","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53884","26.320851","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53885","26.320858","172.30.1.205","172.30.1.104","TCP","54","47932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53886","26.322677","172.30.1.205","172.30.1.104","TCP","54","47932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53887","26.322792","172.30.1.205","172.30.1.104","TCP","74","40570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929549 TSecr=0 WS=128" +"53888","26.322957","172.30.1.104","172.30.1.205","TCP","54","135 > 47932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53889","26.322979","172.30.1.104","172.30.1.205","TCP","54","135 > 47932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53890","26.322984","172.30.1.205","172.30.1.104","TCP","54","47932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53891","26.323072","172.30.1.104","172.30.1.205","TCP","66","49671 > 40570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53892","26.323080","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53893","26.323424","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53894","26.323758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53895","26.323767","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53896","26.325656","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53897","26.327222","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53898","26.327226","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53899","26.328569","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53900","26.332484","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53901","26.332493","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53902","26.333490","172.30.1.205","172.30.1.104","TCP","74","47936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929559 TSecr=0 WS=128" +"53903","26.333854","172.30.1.104","172.30.1.205","TCP","66","135 > 47936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53904","26.333866","172.30.1.205","172.30.1.104","TCP","54","47936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53905","26.334230","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53906","26.334538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53907","26.334556","172.30.1.205","172.30.1.104","TCP","54","47936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53908","26.337007","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53909","26.337394","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53910","26.337401","172.30.1.205","172.30.1.104","TCP","54","47936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53911","26.339214","172.30.1.205","172.30.1.104","TCP","54","47936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53912","26.339338","172.30.1.205","172.30.1.104","TCP","74","40574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929565 TSecr=0 WS=128" +"53913","26.339481","172.30.1.104","172.30.1.205","TCP","54","135 > 47936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53914","26.339513","172.30.1.104","172.30.1.205","TCP","54","135 > 47936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53915","26.339518","172.30.1.205","172.30.1.104","TCP","54","47936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53916","26.339597","172.30.1.104","172.30.1.205","TCP","66","49671 > 40574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53917","26.339606","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53918","26.339953","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53919","26.340254","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53920","26.340263","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53921","26.342163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53922","26.342522","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53923","26.342529","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53924","26.343934","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53925","26.347853","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53926","26.347863","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53927","26.348833","172.30.1.205","172.30.1.104","TCP","74","47940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929575 TSecr=0 WS=128" +"53928","26.349170","172.30.1.104","172.30.1.205","TCP","66","135 > 47940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53929","26.349182","172.30.1.205","172.30.1.104","TCP","54","47940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53930","26.349558","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53931","26.349833","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53932","26.349842","172.30.1.205","172.30.1.104","TCP","54","47940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53933","26.352026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53934","26.352400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53935","26.352407","172.30.1.205","172.30.1.104","TCP","54","47940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53936","26.354301","172.30.1.205","172.30.1.104","TCP","54","47940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53937","26.354412","172.30.1.205","172.30.1.104","TCP","74","40578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929580 TSecr=0 WS=128" +"53938","26.354581","172.30.1.104","172.30.1.205","TCP","54","135 > 47940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53939","26.354639","172.30.1.104","172.30.1.205","TCP","54","135 > 47940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"53940","26.354644","172.30.1.205","172.30.1.104","TCP","54","47940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"53941","26.354733","172.30.1.104","172.30.1.205","TCP","66","49671 > 40578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53942","26.354741","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53943","26.355084","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"53944","26.355409","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53945","26.355417","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53946","26.357358","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"53947","26.357796","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"53948","26.357806","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"53949","26.359177","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"53950","26.363403","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"53951","26.363416","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53952","26.364429","172.30.1.205","172.30.1.104","TCP","74","47944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929590 TSecr=0 WS=128" +"53953","26.364807","172.30.1.104","172.30.1.205","TCP","66","135 > 47944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"53954","26.364819","172.30.1.205","172.30.1.104","TCP","54","47944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"53955","26.365192","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"53956","26.365540","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"53957","26.365549","172.30.1.205","172.30.1.104","TCP","54","47944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"53958","26.367740","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"53959","26.368155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"53960","26.368162","172.30.1.205","172.30.1.104","TCP","54","47944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"53961","26.369043","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53962","26.369092","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53963","26.369124","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53964","26.369158","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53965","26.369191","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53966","26.369224","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53967","26.369251","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53968","26.369283","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53969","26.369310","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53970","26.369339","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53971","26.369371","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53972","26.369445","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"53973","26.369588","172.30.1.104","172.30.1.205","TCP","54","49671 > 40538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53974","26.369604","172.30.1.104","172.30.1.205","TCP","54","49671 > 40542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53975","26.369636","172.30.1.104","172.30.1.205","TCP","54","49671 > 40546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53976","26.369681","172.30.1.104","172.30.1.205","TCP","54","49671 > 40550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53977","26.369701","172.30.1.104","172.30.1.205","TCP","54","49671 > 40554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53978","26.369722","172.30.1.104","172.30.1.205","TCP","54","49671 > 40558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53979","26.369741","172.30.1.104","172.30.1.205","TCP","54","49671 > 40562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53980","26.369784","172.30.1.104","172.30.1.205","TCP","54","49671 > 40566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53981","26.369805","172.30.1.104","172.30.1.205","TCP","54","49671 > 40570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53982","26.369825","172.30.1.104","172.30.1.205","TCP","54","49671 > 40574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53983","26.369907","172.30.1.104","172.30.1.205","TCP","54","49671 > 40578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53984","26.369926","172.30.1.104","172.30.1.205","TCP","54","49671 > 40578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53985","26.369933","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53986","26.369969","172.30.1.104","172.30.1.205","TCP","54","49671 > 40574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53987","26.369973","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53988","26.369990","172.30.1.104","172.30.1.205","TCP","54","49671 > 40570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53989","26.369993","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53990","26.370009","172.30.1.104","172.30.1.205","TCP","54","49671 > 40566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53991","26.370011","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53992","26.370028","172.30.1.104","172.30.1.205","TCP","54","49671 > 40562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53993","26.370030","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53994","26.370129","172.30.1.104","172.30.1.205","TCP","54","49671 > 40558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53995","26.370133","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53996","26.370147","172.30.1.104","172.30.1.205","TCP","54","49671 > 40554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53997","26.370150","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"53998","26.370166","172.30.1.104","172.30.1.205","TCP","54","49671 > 40550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"53999","26.370169","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54000","26.370185","172.30.1.104","172.30.1.205","TCP","54","49671 > 40538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54001","26.370189","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54002","26.370204","172.30.1.104","172.30.1.205","TCP","54","49671 > 40542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54003","26.370207","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54004","26.370224","172.30.1.104","172.30.1.205","TCP","54","49671 > 40546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54005","26.370228","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54006","26.370608","172.30.1.104","172.30.1.205","TCP","54","49671 > 40534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54007","26.370627","172.30.1.104","172.30.1.205","TCP","54","49671 > 40534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54008","26.370632","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54009","26.371046","172.30.1.205","172.30.1.104","TCP","54","47944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54010","26.371157","172.30.1.205","172.30.1.104","TCP","74","40582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929597 TSecr=0 WS=128" +"54011","26.371341","172.30.1.104","172.30.1.205","TCP","54","135 > 47944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54012","26.371349","172.30.1.104","172.30.1.205","TCP","54","135 > 47944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54013","26.371354","172.30.1.205","172.30.1.104","TCP","54","47944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54014","26.371464","172.30.1.104","172.30.1.205","TCP","66","49671 > 40582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54015","26.371472","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54016","26.371828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54017","26.372126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54018","26.372135","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54019","26.374064","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54020","26.374459","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54021","26.374466","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54022","26.375839","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54023","26.379748","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54024","26.379761","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54025","26.380707","172.30.1.205","172.30.1.104","TCP","74","47948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929607 TSecr=0 WS=128" +"54026","26.381071","172.30.1.104","172.30.1.205","TCP","66","135 > 47948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54027","26.381082","172.30.1.205","172.30.1.104","TCP","54","47948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54028","26.381449","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54029","26.381772","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54030","26.381781","172.30.1.205","172.30.1.104","TCP","54","47948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54031","26.383957","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54032","26.384385","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54033","26.384393","172.30.1.205","172.30.1.104","TCP","54","47948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54034","26.386237","172.30.1.205","172.30.1.104","TCP","54","47948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54035","26.386349","172.30.1.205","172.30.1.104","TCP","74","40586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929612 TSecr=0 WS=128" +"54036","26.386553","172.30.1.104","172.30.1.205","TCP","54","135 > 47948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54037","26.386603","172.30.1.104","172.30.1.205","TCP","54","135 > 47948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54038","26.386609","172.30.1.205","172.30.1.104","TCP","54","47948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54039","26.386635","172.30.1.104","172.30.1.205","TCP","66","49671 > 40586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54040","26.386643","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54041","26.386982","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54042","26.387408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54043","26.387417","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54044","26.389323","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54045","26.389696","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54046","26.389703","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54047","26.391045","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54048","26.395129","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54049","26.395139","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54050","26.396078","172.30.1.205","172.30.1.104","TCP","74","47952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929622 TSecr=0 WS=128" +"54051","26.396458","172.30.1.104","172.30.1.205","TCP","66","135 > 47952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54052","26.396470","172.30.1.205","172.30.1.104","TCP","54","47952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54053","26.396850","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54054","26.397144","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54055","26.397154","172.30.1.205","172.30.1.104","TCP","54","47952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54056","26.399353","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54057","26.399784","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54058","26.399791","172.30.1.205","172.30.1.104","TCP","54","47952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54059","26.401623","172.30.1.205","172.30.1.104","TCP","54","47952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54060","26.401736","172.30.1.205","172.30.1.104","TCP","74","40590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929628 TSecr=0 WS=128" +"54061","26.401906","172.30.1.104","172.30.1.205","TCP","54","135 > 47952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54062","26.401936","172.30.1.104","172.30.1.205","TCP","54","135 > 47952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54063","26.401942","172.30.1.205","172.30.1.104","TCP","54","47952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54064","26.402016","172.30.1.104","172.30.1.205","TCP","66","49671 > 40590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54065","26.402025","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54066","26.402388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54067","26.402693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54068","26.402703","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54069","26.404603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54070","26.405032","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54071","26.405039","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54072","26.406457","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54073","26.410357","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54074","26.410367","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54075","26.411355","172.30.1.205","172.30.1.104","TCP","74","47956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929637 TSecr=0 WS=128" +"54076","26.411663","172.30.1.104","172.30.1.205","TCP","66","135 > 47956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54077","26.411674","172.30.1.205","172.30.1.104","TCP","54","47956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54078","26.412029","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54079","26.412341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54080","26.412349","172.30.1.205","172.30.1.104","TCP","54","47956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54081","26.414575","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54082","26.414969","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54083","26.414977","172.30.1.205","172.30.1.104","TCP","54","47956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54084","26.416819","172.30.1.205","172.30.1.104","TCP","54","47956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54085","26.416929","172.30.1.205","172.30.1.104","TCP","74","40594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929643 TSecr=0 WS=128" +"54086","26.417171","172.30.1.104","172.30.1.205","TCP","54","135 > 47956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54087","26.417203","172.30.1.104","172.30.1.205","TCP","54","135 > 47956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54088","26.417209","172.30.1.205","172.30.1.104","TCP","54","47956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54089","26.417306","172.30.1.104","172.30.1.205","TCP","66","49671 > 40594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54090","26.417315","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54091","26.417661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54092","26.417991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54093","26.418000","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54094","26.419902","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54095","26.420284","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54096","26.420290","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54097","26.421677","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54098","26.425713","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54099","26.425724","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54100","26.426711","172.30.1.205","172.30.1.104","TCP","74","47960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929653 TSecr=0 WS=128" +"54101","26.426996","172.30.1.104","172.30.1.205","TCP","66","135 > 47960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54102","26.427006","172.30.1.205","172.30.1.104","TCP","54","47960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54103","26.427363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54104","26.427658","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54105","26.427667","172.30.1.205","172.30.1.104","TCP","54","47960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54106","26.429879","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54107","26.430454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54108","26.430467","172.30.1.205","172.30.1.104","TCP","54","47960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54109","26.432404","172.30.1.205","172.30.1.104","TCP","54","47960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54110","26.432515","172.30.1.205","172.30.1.104","TCP","74","40598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929658 TSecr=0 WS=128" +"54111","26.432793","172.30.1.104","172.30.1.205","TCP","54","135 > 47960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54112","26.432802","172.30.1.104","172.30.1.205","TCP","54","135 > 47960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54113","26.432808","172.30.1.205","172.30.1.104","TCP","54","47960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54114","26.432879","172.30.1.104","172.30.1.205","TCP","66","49671 > 40598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54115","26.432887","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54116","26.433239","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54117","26.433532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54118","26.433541","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54119","26.435430","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54120","26.435836","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54121","26.435842","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54122","26.437223","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54123","26.441111","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54124","26.441122","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54125","26.442110","172.30.1.205","172.30.1.104","TCP","74","47964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929668 TSecr=0 WS=128" +"54126","26.442402","172.30.1.104","172.30.1.205","TCP","66","135 > 47964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54127","26.442414","172.30.1.205","172.30.1.104","TCP","54","47964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54128","26.442772","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54129","26.443134","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54130","26.443142","172.30.1.205","172.30.1.104","TCP","54","47964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54131","26.445359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54132","26.445770","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54133","26.445776","172.30.1.205","172.30.1.104","TCP","54","47964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54134","26.447589","172.30.1.205","172.30.1.104","TCP","54","47964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54135","26.447701","172.30.1.205","172.30.1.104","TCP","74","40602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929674 TSecr=0 WS=128" +"54136","26.447866","172.30.1.104","172.30.1.205","TCP","54","135 > 47964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54137","26.447899","172.30.1.104","172.30.1.205","TCP","54","135 > 47964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54138","26.447905","172.30.1.205","172.30.1.104","TCP","54","47964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54139","26.447992","172.30.1.104","172.30.1.205","TCP","66","49671 > 40602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54140","26.448000","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54141","26.448347","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54142","26.448650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54143","26.448662","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54144","26.450577","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54145","26.450957","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54146","26.450964","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54147","26.452341","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54148","26.456400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54149","26.456422","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54150","26.457445","172.30.1.205","172.30.1.104","TCP","74","47968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929683 TSecr=0 WS=128" +"54151","26.457774","172.30.1.104","172.30.1.205","TCP","66","135 > 47968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54152","26.457797","172.30.1.205","172.30.1.104","TCP","54","47968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54153","26.458283","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54154","26.458638","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54155","26.458647","172.30.1.205","172.30.1.104","TCP","54","47968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54156","26.460871","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54157","26.461302","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54158","26.461309","172.30.1.205","172.30.1.104","TCP","54","47968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54159","26.463130","172.30.1.205","172.30.1.104","TCP","54","47968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54160","26.463242","172.30.1.205","172.30.1.104","TCP","74","40606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929689 TSecr=0 WS=128" +"54161","26.463403","172.30.1.104","172.30.1.205","TCP","54","135 > 47968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54162","26.463436","172.30.1.104","172.30.1.205","TCP","54","135 > 47968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54163","26.463442","172.30.1.205","172.30.1.104","TCP","54","47968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54164","26.463524","172.30.1.104","172.30.1.205","TCP","66","49671 > 40606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54165","26.463533","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54166","26.463878","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54167","26.464164","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54168","26.464171","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54169","26.466071","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54170","26.466504","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54171","26.466510","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54172","26.467870","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54173","26.471871","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54174","26.471882","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54175","26.472911","172.30.1.205","172.30.1.104","TCP","74","47972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929699 TSecr=0 WS=128" +"54176","26.473260","172.30.1.104","172.30.1.205","TCP","66","135 > 47972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54177","26.473272","172.30.1.205","172.30.1.104","TCP","54","47972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54178","26.473634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54179","26.473929","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54180","26.473938","172.30.1.205","172.30.1.104","TCP","54","47972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54181","26.476146","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54182","26.476556","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54183","26.476562","172.30.1.205","172.30.1.104","TCP","54","47972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54184","26.478390","172.30.1.205","172.30.1.104","TCP","54","47972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54185","26.478502","172.30.1.205","172.30.1.104","TCP","74","40610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929704 TSecr=0 WS=128" +"54186","26.478671","172.30.1.104","172.30.1.205","TCP","54","135 > 47972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54187","26.478695","172.30.1.104","172.30.1.205","TCP","54","135 > 47972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54188","26.478701","172.30.1.205","172.30.1.104","TCP","54","47972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54189","26.478779","172.30.1.104","172.30.1.205","TCP","66","49671 > 40610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54190","26.478787","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54191","26.479141","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54192","26.479429","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54193","26.479436","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54194","26.481345","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54195","26.481702","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54196","26.481708","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54197","26.483071","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54198","26.486931","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54199","26.486940","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54200","26.487888","172.30.1.205","172.30.1.104","TCP","74","47976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929714 TSecr=0 WS=128" +"54201","26.488180","172.30.1.104","172.30.1.205","TCP","66","135 > 47976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54202","26.488190","172.30.1.205","172.30.1.104","TCP","54","47976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54203","26.488540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54204","26.488819","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54205","26.488828","172.30.1.205","172.30.1.104","TCP","54","47976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54206","26.491022","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54207","26.491459","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54208","26.491465","172.30.1.205","172.30.1.104","TCP","54","47976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54209","26.493294","172.30.1.205","172.30.1.104","TCP","54","47976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54210","26.493410","172.30.1.205","172.30.1.104","TCP","74","40614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929719 TSecr=0 WS=128" +"54211","26.493560","172.30.1.104","172.30.1.205","TCP","54","135 > 47976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54212","26.493571","172.30.1.104","172.30.1.205","TCP","54","135 > 47976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54213","26.493576","172.30.1.205","172.30.1.104","TCP","54","47976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54214","26.493714","172.30.1.104","172.30.1.205","TCP","66","49671 > 40614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54215","26.493722","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54216","26.494070","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54217","26.494414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54218","26.494431","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54219","26.496553","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54220","26.496948","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54221","26.496954","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54222","26.498335","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54223","26.502277","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54224","26.502287","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54225","26.503260","172.30.1.205","172.30.1.104","TCP","74","47980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929729 TSecr=0 WS=128" +"54226","26.503613","172.30.1.104","172.30.1.205","TCP","66","135 > 47980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54227","26.503635","172.30.1.205","172.30.1.104","TCP","54","47980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54228","26.504161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54229","26.504505","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54230","26.504515","172.30.1.205","172.30.1.104","TCP","54","47980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54231","26.506806","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54232","26.507209","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54233","26.507216","172.30.1.205","172.30.1.104","TCP","54","47980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54234","26.509052","172.30.1.205","172.30.1.104","TCP","54","47980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54235","26.509163","172.30.1.205","172.30.1.104","TCP","74","40618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929735 TSecr=0 WS=128" +"54236","26.509314","172.30.1.104","172.30.1.205","TCP","54","135 > 47980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54237","26.509325","172.30.1.104","172.30.1.205","TCP","54","135 > 47980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54238","26.509330","172.30.1.205","172.30.1.104","TCP","54","47980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54239","26.509446","172.30.1.104","172.30.1.205","TCP","66","49671 > 40618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54240","26.509455","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54241","26.509805","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54242","26.510069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54243","26.510076","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54244","26.511933","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54245","26.512371","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54246","26.512377","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54247","26.513756","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54248","26.517727","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54249","26.517739","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54250","26.518739","172.30.1.205","172.30.1.104","TCP","74","47984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929745 TSecr=0 WS=128" +"54251","26.519093","172.30.1.104","172.30.1.205","TCP","66","135 > 47984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54252","26.519105","172.30.1.205","172.30.1.104","TCP","54","47984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54253","26.519459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54254","26.519758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54255","26.519767","172.30.1.205","172.30.1.104","TCP","54","47984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54256","26.522049","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54257","26.522434","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54258","26.522441","172.30.1.205","172.30.1.104","TCP","54","47984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54259","26.524268","172.30.1.205","172.30.1.104","TCP","54","47984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54260","26.524394","172.30.1.205","172.30.1.104","TCP","74","40622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929750 TSecr=0 WS=128" +"54261","26.524523","172.30.1.104","172.30.1.205","TCP","54","135 > 47984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54262","26.524537","172.30.1.104","172.30.1.205","TCP","54","135 > 47984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54263","26.524543","172.30.1.205","172.30.1.104","TCP","54","47984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54264","26.524660","172.30.1.104","172.30.1.205","TCP","66","49671 > 40622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54265","26.524669","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54266","26.525050","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54267","26.526212","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54268","26.526219","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54269","26.528108","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54270","26.528465","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54271","26.528472","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54272","26.529864","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54273","26.533778","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54274","26.533789","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54275","26.534800","172.30.1.205","172.30.1.104","TCP","74","47988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929761 TSecr=0 WS=128" +"54276","26.535169","172.30.1.104","172.30.1.205","TCP","66","135 > 47988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54277","26.535182","172.30.1.205","172.30.1.104","TCP","54","47988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54278","26.535554","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54279","26.535839","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54280","26.535857","172.30.1.205","172.30.1.104","TCP","54","47988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54281","26.538350","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54282","26.538736","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54283","26.538743","172.30.1.205","172.30.1.104","TCP","54","47988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54284","26.540568","172.30.1.205","172.30.1.104","TCP","54","47988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54285","26.540681","172.30.1.205","172.30.1.104","TCP","74","40626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929767 TSecr=0 WS=128" +"54286","26.540825","172.30.1.104","172.30.1.205","TCP","54","135 > 47988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54287","26.540854","172.30.1.104","172.30.1.205","TCP","54","135 > 47988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54288","26.540861","172.30.1.205","172.30.1.104","TCP","54","47988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54289","26.540950","172.30.1.104","172.30.1.205","TCP","66","49671 > 40626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54290","26.540958","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54291","26.541334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54292","26.541615","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54293","26.541623","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54294","26.543489","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54295","26.543879","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54296","26.543892","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54297","26.545471","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54298","26.549467","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54299","26.549477","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54300","26.550432","172.30.1.205","172.30.1.104","TCP","74","47992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929776 TSecr=0 WS=128" +"54301","26.550787","172.30.1.104","172.30.1.205","TCP","66","135 > 47992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54302","26.550808","172.30.1.205","172.30.1.104","TCP","54","47992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54303","26.551412","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54304","26.551719","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54305","26.551728","172.30.1.205","172.30.1.104","TCP","54","47992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54306","26.553931","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54307","26.554337","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54308","26.554343","172.30.1.205","172.30.1.104","TCP","54","47992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54309","26.555198","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54310","26.555248","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54311","26.555285","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54312","26.555315","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54313","26.555343","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54314","26.555371","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54315","26.555398","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54316","26.555430","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54317","26.555453","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54318","26.555473","172.30.1.104","172.30.1.205","TCP","54","49671 > 40586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54319","26.555504","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54320","26.555538","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54321","26.555588","172.30.1.104","172.30.1.205","TCP","54","49671 > 40590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54322","26.555611","172.30.1.104","172.30.1.205","TCP","54","49671 > 40594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54323","26.555632","172.30.1.104","172.30.1.205","TCP","54","49671 > 40598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54324","26.555639","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54325","26.555652","172.30.1.104","172.30.1.205","TCP","54","49671 > 40598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54326","26.555658","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54327","26.555744","172.30.1.104","172.30.1.205","TCP","54","49671 > 40602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54328","26.555762","172.30.1.104","172.30.1.205","TCP","54","49671 > 40606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54329","26.555783","172.30.1.104","172.30.1.205","TCP","54","49671 > 40594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54330","26.555788","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54331","26.555802","172.30.1.104","172.30.1.205","TCP","54","49671 > 40606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54332","26.555806","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54333","26.555824","172.30.1.104","172.30.1.205","TCP","54","49671 > 40602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54334","26.555828","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54335","26.555843","172.30.1.104","172.30.1.205","TCP","54","49671 > 40586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54336","26.555846","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54337","26.555864","172.30.1.104","172.30.1.205","TCP","54","49671 > 40590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54338","26.555867","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54339","26.555882","172.30.1.104","172.30.1.205","TCP","54","49671 > 40610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54340","26.555902","172.30.1.104","172.30.1.205","TCP","54","49671 > 40614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54341","26.555924","172.30.1.104","172.30.1.205","TCP","54","49671 > 40610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54342","26.555927","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54343","26.556049","172.30.1.104","172.30.1.205","TCP","54","49671 > 40618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54344","26.556068","172.30.1.104","172.30.1.205","TCP","54","49671 > 40622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54345","26.556088","172.30.1.104","172.30.1.205","TCP","54","49671 > 40622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54346","26.556093","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54347","26.556107","172.30.1.104","172.30.1.205","TCP","54","49671 > 40614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54348","26.556110","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54349","26.556126","172.30.1.104","172.30.1.205","TCP","54","49671 > 40618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54350","26.556138","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54351","26.556254","172.30.1.104","172.30.1.205","TCP","54","49671 > 40626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54352","26.556287","172.30.1.104","172.30.1.205","TCP","54","49671 > 40582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54353","26.556314","172.30.1.104","172.30.1.205","TCP","54","49671 > 40626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54354","26.556319","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54355","26.556334","172.30.1.104","172.30.1.205","TCP","54","49671 > 40582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54356","26.556336","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54357","26.557331","172.30.1.205","172.30.1.104","TCP","54","47992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54358","26.557448","172.30.1.205","172.30.1.104","TCP","74","40630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929783 TSecr=0 WS=128" +"54359","26.557591","172.30.1.104","172.30.1.205","TCP","54","135 > 47992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54360","26.557612","172.30.1.104","172.30.1.205","TCP","54","135 > 47992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54361","26.557617","172.30.1.205","172.30.1.104","TCP","54","47992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54362","26.557755","172.30.1.104","172.30.1.205","TCP","66","49671 > 40630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54363","26.557764","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54364","26.558118","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54365","26.558920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54366","26.558929","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54367","26.560827","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54368","26.561185","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54369","26.561192","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54370","26.562553","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54371","26.566466","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54372","26.566485","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54373","26.567655","172.30.1.205","172.30.1.104","TCP","74","47996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929794 TSecr=0 WS=128" +"54374","26.567952","172.30.1.104","172.30.1.205","TCP","66","135 > 47996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54375","26.567962","172.30.1.205","172.30.1.104","TCP","54","47996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54376","26.568315","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54377","26.568626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54378","26.568635","172.30.1.205","172.30.1.104","TCP","54","47996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54379","26.570858","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54380","26.571232","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54381","26.571239","172.30.1.205","172.30.1.104","TCP","54","47996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54382","26.573079","172.30.1.205","172.30.1.104","TCP","54","47996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54383","26.573189","172.30.1.205","172.30.1.104","TCP","74","40634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929799 TSecr=0 WS=128" +"54384","26.573377","172.30.1.104","172.30.1.205","TCP","54","135 > 47996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54385","26.573396","172.30.1.104","172.30.1.205","TCP","54","135 > 47996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54386","26.573406","172.30.1.205","172.30.1.104","TCP","54","47996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54387","26.573450","172.30.1.104","172.30.1.205","TCP","66","49671 > 40634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54388","26.573467","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54389","26.574014","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54390","26.574276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54391","26.574283","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54392","26.576149","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54393","26.590426","172.30.1.104","172.30.1.205","TCP","54","49671 > 40634 [ACK] Seq=61 Ack=201 Win=2150400 Len=0" +"54394","26.590536","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54395","26.590540","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54396","26.591952","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54397","26.596021","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54398","26.596045","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54399","26.597153","172.30.1.205","172.30.1.104","TCP","74","48000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929823 TSecr=0 WS=128" +"54400","26.597459","172.30.1.104","172.30.1.205","TCP","66","135 > 48000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54401","26.597470","172.30.1.205","172.30.1.104","TCP","54","48000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54402","26.597836","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54403","26.598179","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54404","26.598188","172.30.1.205","172.30.1.104","TCP","54","48000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54405","26.600397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54406","26.600788","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54407","26.600796","172.30.1.205","172.30.1.104","TCP","54","48000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54408","26.602657","172.30.1.205","172.30.1.104","TCP","54","48000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54409","26.602769","172.30.1.205","172.30.1.104","TCP","74","40638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929829 TSecr=0 WS=128" +"54410","26.602901","172.30.1.104","172.30.1.205","TCP","54","135 > 48000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54411","26.602954","172.30.1.104","172.30.1.205","TCP","54","135 > 48000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54412","26.602960","172.30.1.205","172.30.1.104","TCP","54","48000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54413","26.603034","172.30.1.104","172.30.1.205","TCP","66","49671 > 40638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54414","26.603042","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54415","26.603388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54416","26.603701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54417","26.603709","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54418","26.605655","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54419","26.606094","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54420","26.606101","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54421","26.607454","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54422","26.611449","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54423","26.611463","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54424","26.612455","172.30.1.205","172.30.1.104","TCP","74","48004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929838 TSecr=0 WS=128" +"54425","26.612788","172.30.1.104","172.30.1.205","TCP","66","135 > 48004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54426","26.612807","172.30.1.205","172.30.1.104","TCP","54","48004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54427","26.613169","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54428","26.613440","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54429","26.613450","172.30.1.205","172.30.1.104","TCP","54","48004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54430","26.615643","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54431","26.616019","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54432","26.616026","172.30.1.205","172.30.1.104","TCP","54","48004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54433","26.617860","172.30.1.205","172.30.1.104","TCP","54","48004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54434","26.617970","172.30.1.205","172.30.1.104","TCP","74","40642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929844 TSecr=0 WS=128" +"54435","26.618156","172.30.1.104","172.30.1.205","TCP","54","135 > 48004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54436","26.618190","172.30.1.104","172.30.1.205","TCP","54","135 > 48004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54437","26.618195","172.30.1.205","172.30.1.104","TCP","54","48004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54438","26.618260","172.30.1.104","172.30.1.205","TCP","66","49671 > 40642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54439","26.618268","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54440","26.618617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54441","26.618914","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54442","26.618922","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54443","26.620854","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54444","26.621293","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54445","26.621299","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54446","26.622664","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54447","26.627370","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54448","26.627379","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54449","26.628367","172.30.1.205","172.30.1.104","TCP","74","48008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929854 TSecr=0 WS=128" +"54450","26.629009","172.30.1.104","172.30.1.205","TCP","66","135 > 48008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54451","26.629020","172.30.1.205","172.30.1.104","TCP","54","48008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54452","26.629393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54453","26.629688","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54454","26.629696","172.30.1.205","172.30.1.104","TCP","54","48008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54455","26.631923","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54456","26.632311","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54457","26.632317","172.30.1.205","172.30.1.104","TCP","54","48008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54458","26.634149","172.30.1.205","172.30.1.104","TCP","54","48008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54459","26.634259","172.30.1.205","172.30.1.104","TCP","74","40646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929860 TSecr=0 WS=128" +"54460","26.634434","172.30.1.104","172.30.1.205","TCP","54","135 > 48008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54461","26.634462","172.30.1.104","172.30.1.205","TCP","54","135 > 48008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54462","26.634467","172.30.1.205","172.30.1.104","TCP","54","48008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54463","26.634546","172.30.1.104","172.30.1.205","TCP","66","49671 > 40646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54464","26.634554","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54465","26.634907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54466","26.635173","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54467","26.635182","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54468","26.637076","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54469","26.637438","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54470","26.637451","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54471","26.639041","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54472","26.642809","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54473","26.642841","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54474","26.643788","172.30.1.205","172.30.1.104","TCP","74","48012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929870 TSecr=0 WS=128" +"54475","26.644142","172.30.1.104","172.30.1.205","TCP","66","135 > 48012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54476","26.644152","172.30.1.205","172.30.1.104","TCP","54","48012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54477","26.644528","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54478","26.644888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54479","26.644897","172.30.1.205","172.30.1.104","TCP","54","48012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54480","26.647095","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54481","26.647712","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54482","26.647719","172.30.1.205","172.30.1.104","TCP","54","48012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54483","26.649614","172.30.1.205","172.30.1.104","TCP","54","48012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54484","26.649723","172.30.1.205","172.30.1.104","TCP","74","40650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929876 TSecr=0 WS=128" +"54485","26.649862","172.30.1.104","172.30.1.205","TCP","54","135 > 48012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54486","26.649901","172.30.1.104","172.30.1.205","TCP","54","135 > 48012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54487","26.649906","172.30.1.205","172.30.1.104","TCP","54","48012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54488","26.650036","172.30.1.104","172.30.1.205","TCP","66","49671 > 40650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54489","26.650044","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54490","26.650419","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54491","26.650692","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54492","26.650702","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54493","26.652658","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54494","26.653103","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54495","26.653115","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54496","26.654664","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54497","26.658656","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54498","26.658666","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54499","26.659621","172.30.1.205","172.30.1.104","TCP","74","48016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929886 TSecr=0 WS=128" +"54500","26.659971","172.30.1.104","172.30.1.205","TCP","66","135 > 48016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54501","26.659982","172.30.1.205","172.30.1.104","TCP","54","48016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54502","26.660330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54503","26.660628","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54504","26.660637","172.30.1.205","172.30.1.104","TCP","54","48016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54505","26.662849","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54506","26.663287","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54507","26.663293","172.30.1.205","172.30.1.104","TCP","54","48016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54508","26.665165","172.30.1.205","172.30.1.104","TCP","54","48016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54509","26.665275","172.30.1.205","172.30.1.104","TCP","74","40654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929891 TSecr=0 WS=128" +"54510","26.665426","172.30.1.104","172.30.1.205","TCP","54","135 > 48016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54511","26.665441","172.30.1.104","172.30.1.205","TCP","54","135 > 48016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54512","26.665446","172.30.1.205","172.30.1.104","TCP","54","48016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54513","26.665553","172.30.1.104","172.30.1.205","TCP","66","49671 > 40654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54514","26.665561","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54515","26.665903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54516","26.666205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54517","26.666214","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54518","26.668105","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54519","26.668586","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54520","26.668592","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54521","26.669962","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54522","26.673893","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54523","26.673921","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54524","26.675168","172.30.1.205","172.30.1.104","TCP","74","48020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929901 TSecr=0 WS=128" +"54525","26.675474","172.30.1.104","172.30.1.205","TCP","66","135 > 48020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54526","26.675487","172.30.1.205","172.30.1.104","TCP","54","48020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54527","26.675847","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54528","26.676205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54529","26.676214","172.30.1.205","172.30.1.104","TCP","54","48020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54530","26.678458","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54531","26.678863","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54532","26.678870","172.30.1.205","172.30.1.104","TCP","54","48020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54533","26.680735","172.30.1.205","172.30.1.104","TCP","54","48020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54534","26.680871","172.30.1.205","172.30.1.104","TCP","74","40658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929907 TSecr=0 WS=128" +"54535","26.681043","172.30.1.104","172.30.1.205","TCP","54","135 > 48020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54536","26.681081","172.30.1.104","172.30.1.205","TCP","54","135 > 48020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54537","26.681086","172.30.1.205","172.30.1.104","TCP","54","48020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54538","26.681206","172.30.1.104","172.30.1.205","TCP","66","49671 > 40658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54539","26.681214","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54540","26.681562","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54541","26.681861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54542","26.681870","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54543","26.683767","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54544","26.684183","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54545","26.684190","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54546","26.685613","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54547","26.689512","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54548","26.689525","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54549","26.690565","172.30.1.205","172.30.1.104","TCP","74","48024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929916 TSecr=0 WS=128" +"54550","26.690853","172.30.1.104","172.30.1.205","TCP","66","135 > 48024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54551","26.690864","172.30.1.205","172.30.1.104","TCP","54","48024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54552","26.691222","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54553","26.691555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54554","26.691564","172.30.1.205","172.30.1.104","TCP","54","48024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54555","26.693780","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54556","26.694237","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54557","26.694243","172.30.1.205","172.30.1.104","TCP","54","48024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54558","26.696060","172.30.1.205","172.30.1.104","TCP","54","48024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54559","26.696172","172.30.1.205","172.30.1.104","TCP","74","40662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929922 TSecr=0 WS=128" +"54560","26.696393","172.30.1.104","172.30.1.205","TCP","54","135 > 48024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54561","26.696405","172.30.1.104","172.30.1.205","TCP","54","135 > 48024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54562","26.696410","172.30.1.205","172.30.1.104","TCP","54","48024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54563","26.696481","172.30.1.104","172.30.1.205","TCP","66","49671 > 40662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54564","26.696489","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54565","26.696858","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54566","26.697143","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54567","26.697151","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54568","26.699032","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54569","26.699378","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54570","26.699385","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54571","26.700768","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54572","26.704741","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54573","26.704752","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54574","26.705724","172.30.1.205","172.30.1.104","TCP","74","48028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929932 TSecr=0 WS=128" +"54575","26.706861","172.30.1.104","172.30.1.205","TCP","66","135 > 48028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54576","26.706872","172.30.1.205","172.30.1.104","TCP","54","48028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54577","26.707222","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54578","26.707520","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54579","26.707529","172.30.1.205","172.30.1.104","TCP","54","48028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54580","26.709730","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54581","26.710131","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54582","26.710137","172.30.1.205","172.30.1.104","TCP","54","48028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54583","26.711940","172.30.1.205","172.30.1.104","TCP","54","48028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54584","26.712067","172.30.1.205","172.30.1.104","TCP","74","40666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929938 TSecr=0 WS=128" +"54585","26.712195","172.30.1.104","172.30.1.205","TCP","54","135 > 48028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54586","26.712222","172.30.1.104","172.30.1.205","TCP","54","135 > 48028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54587","26.712227","172.30.1.205","172.30.1.104","TCP","54","48028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54588","26.712321","172.30.1.104","172.30.1.205","TCP","66","49671 > 40666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54589","26.712329","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54590","26.712671","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54591","26.712951","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54592","26.712960","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54593","26.714823","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54594","26.715492","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54595","26.715499","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54596","26.716866","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54597","26.720762","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54598","26.720773","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54599","26.721763","172.30.1.205","172.30.1.104","TCP","74","48032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929948 TSecr=0 WS=128" +"54600","26.722046","172.30.1.104","172.30.1.205","TCP","66","135 > 48032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54601","26.722057","172.30.1.205","172.30.1.104","TCP","54","48032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54602","26.722411","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54603","26.722681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54604","26.722693","172.30.1.205","172.30.1.104","TCP","54","48032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54605","26.724902","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54606","26.725263","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54607","26.725270","172.30.1.205","172.30.1.104","TCP","54","48032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54608","26.727080","172.30.1.205","172.30.1.104","TCP","54","48032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54609","26.727193","172.30.1.205","172.30.1.104","TCP","74","40670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929953 TSecr=0 WS=128" +"54610","26.727431","172.30.1.104","172.30.1.205","TCP","54","135 > 48032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54611","26.727440","172.30.1.104","172.30.1.205","TCP","54","135 > 48032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54612","26.727446","172.30.1.205","172.30.1.104","TCP","54","48032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54613","26.727551","172.30.1.104","172.30.1.205","TCP","66","49671 > 40670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54614","26.727559","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54615","26.727918","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54616","26.728233","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54617","26.728241","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54618","26.730161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54619","26.730548","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54620","26.730554","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54621","26.731899","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54622","26.735803","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54623","26.735813","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54624","26.736800","172.30.1.205","172.30.1.104","TCP","74","48036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929963 TSecr=0 WS=128" +"54625","26.737137","172.30.1.104","172.30.1.205","TCP","66","135 > 48036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54626","26.737149","172.30.1.205","172.30.1.104","TCP","54","48036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54627","26.737509","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54628","26.737796","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54629","26.737804","172.30.1.205","172.30.1.104","TCP","54","48036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54630","26.739985","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54631","26.740353","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54632","26.740359","172.30.1.205","172.30.1.104","TCP","54","48036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54633","26.742181","172.30.1.205","172.30.1.104","TCP","54","48036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54634","26.742291","172.30.1.205","172.30.1.104","TCP","74","40674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929968 TSecr=0 WS=128" +"54635","26.742479","172.30.1.104","172.30.1.205","TCP","54","135 > 48036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54636","26.742492","172.30.1.104","172.30.1.205","TCP","54","135 > 48036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54637","26.742499","172.30.1.205","172.30.1.104","TCP","54","48036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54638","26.742601","172.30.1.104","172.30.1.205","TCP","66","49671 > 40674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54639","26.742612","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54640","26.742993","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54641","26.743284","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54642","26.743292","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54643","26.745212","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54644","26.745565","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54645","26.745571","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54646","26.746930","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54647","26.750894","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54648","26.750906","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54649","26.751874","172.30.1.205","172.30.1.104","TCP","74","48040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929978 TSecr=0 WS=128" +"54650","26.752191","172.30.1.104","172.30.1.205","TCP","66","135 > 48040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54651","26.752201","172.30.1.205","172.30.1.104","TCP","54","48040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54652","26.752552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54653","26.752936","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54654","26.752948","172.30.1.205","172.30.1.104","TCP","54","48040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54655","26.755208","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54656","26.755620","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54657","26.755627","172.30.1.205","172.30.1.104","TCP","54","48040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54658","26.756522","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54659","26.756577","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54660","26.756616","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54661","26.756647","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54662","26.756681","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54663","26.756723","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54664","26.756755","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54665","26.756812","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54666","26.756847","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54667","26.756874","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54668","26.756883","172.30.1.104","172.30.1.205","TCP","54","49671 > 40634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54669","26.756898","172.30.1.104","172.30.1.205","TCP","54","49671 > 40634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54670","26.756904","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54671","26.756940","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54672","26.757012","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54673","26.757035","172.30.1.104","172.30.1.205","TCP","54","49671 > 40638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54674","26.757063","172.30.1.104","172.30.1.205","TCP","54","49671 > 40642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54675","26.757252","172.30.1.104","172.30.1.205","TCP","54","49671 > 40646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54676","26.757267","172.30.1.104","172.30.1.205","TCP","54","49671 > 40650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54677","26.757280","172.30.1.104","172.30.1.205","TCP","54","49671 > 40654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54678","26.757299","172.30.1.104","172.30.1.205","TCP","54","49671 > 40658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54679","26.757320","172.30.1.104","172.30.1.205","TCP","54","49671 > 40662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54680","26.757339","172.30.1.104","172.30.1.205","TCP","54","49671 > 40662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54681","26.757345","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54682","26.757712","172.30.1.104","172.30.1.205","TCP","54","49671 > 40658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54683","26.757718","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54684","26.757725","172.30.1.104","172.30.1.205","TCP","54","49671 > 40654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54685","26.757727","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54686","26.757728","172.30.1.104","172.30.1.205","TCP","54","49671 > 40650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54687","26.757730","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54688","26.757734","172.30.1.104","172.30.1.205","TCP","54","49671 > 40638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54689","26.757736","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54690","26.757737","172.30.1.104","172.30.1.205","TCP","54","49671 > 40666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54691","26.757743","172.30.1.104","172.30.1.205","TCP","54","49671 > 40642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54692","26.757745","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54693","26.757747","172.30.1.104","172.30.1.205","TCP","54","49671 > 40670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54694","26.757749","172.30.1.104","172.30.1.205","TCP","54","49671 > 40670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54695","26.757751","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54696","26.757756","172.30.1.104","172.30.1.205","TCP","54","49671 > 40674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54697","26.757760","172.30.1.104","172.30.1.205","TCP","54","49671 > 40630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54698","26.757762","172.30.1.104","172.30.1.205","TCP","54","49671 > 40630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54699","26.757764","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54700","26.757765","172.30.1.104","172.30.1.205","TCP","54","49671 > 40674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54701","26.757767","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54702","26.757769","172.30.1.104","172.30.1.205","TCP","54","49671 > 40646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54703","26.757771","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54704","26.757772","172.30.1.104","172.30.1.205","TCP","54","49671 > 40666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"54705","26.757773","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"54706","26.758521","172.30.1.205","172.30.1.104","TCP","54","48040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54707","26.758639","172.30.1.205","172.30.1.104","TCP","74","40678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929985 TSecr=0 WS=128" +"54708","26.758784","172.30.1.104","172.30.1.205","TCP","54","135 > 48040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54709","26.758813","172.30.1.104","172.30.1.205","TCP","54","135 > 48040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54710","26.758818","172.30.1.205","172.30.1.104","TCP","54","48040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54711","26.758918","172.30.1.104","172.30.1.205","TCP","66","49671 > 40678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54712","26.758929","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54713","26.759505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54714","26.759793","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54715","26.759802","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54716","26.761733","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54717","26.762083","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54718","26.762089","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54719","26.763459","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54720","26.767435","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54721","26.767449","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54722","26.768408","172.30.1.205","172.30.1.104","TCP","74","48044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929994 TSecr=0 WS=128" +"54723","26.768744","172.30.1.104","172.30.1.205","TCP","66","135 > 48044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54724","26.768755","172.30.1.205","172.30.1.104","TCP","54","48044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54725","26.769109","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54726","26.769437","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54727","26.769446","172.30.1.205","172.30.1.104","TCP","54","48044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54728","26.771619","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54729","26.772014","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54730","26.772026","172.30.1.205","172.30.1.104","TCP","54","48044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54731","26.774041","172.30.1.205","172.30.1.104","TCP","54","48044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54732","26.774152","172.30.1.205","172.30.1.104","TCP","74","40682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930000 TSecr=0 WS=128" +"54733","26.774300","172.30.1.104","172.30.1.205","TCP","54","135 > 48044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54734","26.774315","172.30.1.104","172.30.1.205","TCP","54","135 > 48044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54735","26.774321","172.30.1.205","172.30.1.104","TCP","54","48044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54736","26.774436","172.30.1.104","172.30.1.205","TCP","66","49671 > 40682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54737","26.774444","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54738","26.774794","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54739","26.775085","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54740","26.775096","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54741","26.777025","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54742","26.777447","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54743","26.777453","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54744","26.778813","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54745","26.782786","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54746","26.782804","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54747","26.783749","172.30.1.205","172.30.1.104","TCP","74","48048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930010 TSecr=0 WS=128" +"54748","26.784087","172.30.1.104","172.30.1.205","TCP","66","135 > 48048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54749","26.784098","172.30.1.205","172.30.1.104","TCP","54","48048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54750","26.784447","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54751","26.784791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54752","26.784801","172.30.1.205","172.30.1.104","TCP","54","48048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54753","26.787003","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54754","26.787400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54755","26.787410","172.30.1.205","172.30.1.104","TCP","54","48048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54756","26.789324","172.30.1.205","172.30.1.104","TCP","54","48048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54757","26.789446","172.30.1.205","172.30.1.104","TCP","74","40686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930015 TSecr=0 WS=128" +"54758","26.789593","172.30.1.104","172.30.1.205","TCP","54","135 > 48048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54759","26.789627","172.30.1.104","172.30.1.205","TCP","54","135 > 48048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54760","26.789632","172.30.1.205","172.30.1.104","TCP","54","48048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54761","26.789704","172.30.1.104","172.30.1.205","TCP","66","49671 > 40686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54762","26.789713","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54763","26.790067","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54764","26.790355","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54765","26.790364","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54766","26.792244","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54767","26.792597","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54768","26.792603","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54769","26.793985","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54770","26.798011","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54771","26.798030","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54772","26.799116","172.30.1.205","172.30.1.104","TCP","74","48052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930025 TSecr=0 WS=128" +"54773","26.799390","172.30.1.104","172.30.1.205","TCP","66","135 > 48052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54774","26.799401","172.30.1.205","172.30.1.104","TCP","54","48052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54775","26.799752","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54776","26.800091","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54777","26.800101","172.30.1.205","172.30.1.104","TCP","54","48052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54778","26.802329","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54779","26.802691","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54780","26.802698","172.30.1.205","172.30.1.104","TCP","54","48052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54781","26.804519","172.30.1.205","172.30.1.104","TCP","54","48052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54782","26.804630","172.30.1.205","172.30.1.104","TCP","74","40690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930031 TSecr=0 WS=128" +"54783","26.804784","172.30.1.104","172.30.1.205","TCP","54","135 > 48052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54784","26.804799","172.30.1.104","172.30.1.205","TCP","54","135 > 48052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54785","26.804804","172.30.1.205","172.30.1.104","TCP","54","48052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54786","26.804918","172.30.1.104","172.30.1.205","TCP","66","49671 > 40690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54787","26.804927","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54788","26.805295","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54789","26.805592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54790","26.805601","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54791","26.807463","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54792","26.807902","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54793","26.807909","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54794","26.809294","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54795","26.813268","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54796","26.813279","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54797","26.814246","172.30.1.205","172.30.1.104","TCP","74","48056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930040 TSecr=0 WS=128" +"54798","26.814577","172.30.1.104","172.30.1.205","TCP","66","135 > 48056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54799","26.814589","172.30.1.205","172.30.1.104","TCP","54","48056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54800","26.814947","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54801","26.815317","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54802","26.815326","172.30.1.205","172.30.1.104","TCP","54","48056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54803","26.817533","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54804","26.817954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54805","26.817961","172.30.1.205","172.30.1.104","TCP","54","48056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54806","26.819786","172.30.1.205","172.30.1.104","TCP","54","48056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54807","26.819898","172.30.1.205","172.30.1.104","TCP","74","40694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930046 TSecr=0 WS=128" +"54808","26.820040","172.30.1.104","172.30.1.205","TCP","54","135 > 48056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54809","26.820051","172.30.1.104","172.30.1.205","TCP","54","135 > 48056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54810","26.820057","172.30.1.205","172.30.1.104","TCP","54","48056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54811","26.820148","172.30.1.104","172.30.1.205","TCP","66","49671 > 40694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54812","26.820156","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54813","26.820501","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54814","26.820792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54815","26.820800","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54816","26.822683","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54817","26.823443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54818","26.823449","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54819","26.824825","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54820","26.828798","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54821","26.828808","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54822","26.829766","172.30.1.205","172.30.1.104","TCP","74","48060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930056 TSecr=0 WS=128" +"54823","26.830086","172.30.1.104","172.30.1.205","TCP","66","135 > 48060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54824","26.830098","172.30.1.205","172.30.1.104","TCP","54","48060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54825","26.830459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54826","26.830796","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54827","26.830805","172.30.1.205","172.30.1.104","TCP","54","48060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54828","26.833018","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54829","26.833422","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54830","26.833429","172.30.1.205","172.30.1.104","TCP","54","48060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54831","26.835253","172.30.1.205","172.30.1.104","TCP","54","48060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54832","26.835366","172.30.1.205","172.30.1.104","TCP","74","40698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930061 TSecr=0 WS=128" +"54833","26.835548","172.30.1.104","172.30.1.205","TCP","54","135 > 48060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54834","26.835605","172.30.1.104","172.30.1.205","TCP","54","135 > 48060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54835","26.835611","172.30.1.205","172.30.1.104","TCP","54","48060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54836","26.835636","172.30.1.104","172.30.1.205","TCP","66","49671 > 40698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54837","26.835644","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54838","26.836016","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54839","26.836324","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54840","26.836332","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54841","26.838274","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54842","26.838621","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54843","26.838625","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54844","26.839990","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54845","26.844013","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54846","26.844023","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54847","26.845019","172.30.1.205","172.30.1.104","TCP","74","48064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930071 TSecr=0 WS=128" +"54848","26.845350","172.30.1.104","172.30.1.205","TCP","66","135 > 48064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54849","26.845362","172.30.1.205","172.30.1.104","TCP","54","48064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54850","26.845724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54851","26.846011","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54852","26.846020","172.30.1.205","172.30.1.104","TCP","54","48064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54853","26.848266","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54854","26.848671","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54855","26.848680","172.30.1.205","172.30.1.104","TCP","54","48064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54856","26.850574","172.30.1.205","172.30.1.104","TCP","54","48064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54857","26.850696","172.30.1.205","172.30.1.104","TCP","74","40702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930077 TSecr=0 WS=128" +"54858","26.850863","172.30.1.104","172.30.1.205","TCP","54","135 > 48064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54859","26.850873","172.30.1.104","172.30.1.205","TCP","54","135 > 48064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54860","26.850879","172.30.1.205","172.30.1.104","TCP","54","48064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54861","26.850958","172.30.1.104","172.30.1.205","TCP","66","49671 > 40702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54862","26.850966","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54863","26.851313","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54864","26.851660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54865","26.851667","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54866","26.853590","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54867","26.853953","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54868","26.853965","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54869","26.855591","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54870","26.859647","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54871","26.859657","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54872","26.860614","172.30.1.205","172.30.1.104","TCP","74","48068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930087 TSecr=0 WS=128" +"54873","26.860912","172.30.1.104","172.30.1.205","TCP","66","135 > 48068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54874","26.860924","172.30.1.205","172.30.1.104","TCP","54","48068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54875","26.861292","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54876","26.861591","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54877","26.861600","172.30.1.205","172.30.1.104","TCP","54","48068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54878","26.863820","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54879","26.864216","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54880","26.864231","172.30.1.205","172.30.1.104","TCP","54","48068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54881","26.866063","172.30.1.205","172.30.1.104","TCP","54","48068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54882","26.866175","172.30.1.205","172.30.1.104","TCP","74","40706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930092 TSecr=0 WS=128" +"54883","26.866343","172.30.1.104","172.30.1.205","TCP","54","135 > 48068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54884","26.866391","172.30.1.104","172.30.1.205","TCP","54","135 > 48068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54885","26.866397","172.30.1.205","172.30.1.104","TCP","54","48068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54886","26.866453","172.30.1.104","172.30.1.205","TCP","66","49671 > 40706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54887","26.866469","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54888","26.866877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54889","26.867186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54890","26.867198","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54891","26.869159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54892","26.869523","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54893","26.869536","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54894","26.871154","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54895","26.875219","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54896","26.875243","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54897","26.876210","172.30.1.205","172.30.1.104","TCP","74","48072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930102 TSecr=0 WS=128" +"54898","26.876547","172.30.1.104","172.30.1.205","TCP","66","135 > 48072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54899","26.876559","172.30.1.205","172.30.1.104","TCP","54","48072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54900","26.876951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54901","26.877252","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54902","26.877262","172.30.1.205","172.30.1.104","TCP","54","48072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54903","26.879455","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54904","26.879856","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54905","26.879863","172.30.1.205","172.30.1.104","TCP","54","48072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54906","26.881721","172.30.1.205","172.30.1.104","TCP","54","48072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54907","26.881834","172.30.1.205","172.30.1.104","TCP","74","40710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930108 TSecr=0 WS=128" +"54908","26.881982","172.30.1.104","172.30.1.205","TCP","54","135 > 48072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54909","26.882031","172.30.1.104","172.30.1.205","TCP","54","135 > 48072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54910","26.882036","172.30.1.205","172.30.1.104","TCP","54","48072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54911","26.882105","172.30.1.104","172.30.1.205","TCP","66","49671 > 40710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54912","26.882113","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54913","26.882463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54914","26.882730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54915","26.882739","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54916","26.884613","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54917","26.885096","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54918","26.885103","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54919","26.886470","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54920","26.890594","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54921","26.890605","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54922","26.891568","172.30.1.205","172.30.1.104","TCP","74","48076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930117 TSecr=0 WS=128" +"54923","26.891888","172.30.1.104","172.30.1.205","TCP","66","135 > 48076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54924","26.891898","172.30.1.205","172.30.1.104","TCP","54","48076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54925","26.892248","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54926","26.892519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54927","26.892528","172.30.1.205","172.30.1.104","TCP","54","48076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54928","26.894752","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54929","26.895110","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54930","26.895117","172.30.1.205","172.30.1.104","TCP","54","48076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54931","26.896991","172.30.1.205","172.30.1.104","TCP","54","48076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54932","26.897100","172.30.1.205","172.30.1.104","TCP","74","40714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930123 TSecr=0 WS=128" +"54933","26.897250","172.30.1.104","172.30.1.205","TCP","54","135 > 48076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54934","26.897288","172.30.1.104","172.30.1.205","TCP","54","135 > 48076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54935","26.897293","172.30.1.205","172.30.1.104","TCP","54","48076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54936","26.897405","172.30.1.104","172.30.1.205","TCP","66","49671 > 40714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54937","26.897413","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54938","26.897769","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54939","26.898518","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54940","26.898527","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54941","26.900418","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54942","26.900742","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54943","26.900749","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54944","26.902119","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54945","26.906023","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54946","26.906032","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54947","26.906985","172.30.1.205","172.30.1.104","TCP","74","48080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930133 TSecr=0 WS=128" +"54948","26.907279","172.30.1.104","172.30.1.205","TCP","66","135 > 48080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54949","26.907289","172.30.1.205","172.30.1.104","TCP","54","48080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54950","26.907644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54951","26.907962","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54952","26.907980","172.30.1.205","172.30.1.104","TCP","54","48080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54953","26.910259","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54954","26.910638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54955","26.910645","172.30.1.205","172.30.1.104","TCP","54","48080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54956","26.912484","172.30.1.205","172.30.1.104","TCP","54","48080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54957","26.912599","172.30.1.205","172.30.1.104","TCP","74","40718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930139 TSecr=0 WS=128" +"54958","26.912721","172.30.1.104","172.30.1.205","TCP","54","135 > 48080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54959","26.912732","172.30.1.104","172.30.1.205","TCP","54","135 > 48080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54960","26.912737","172.30.1.205","172.30.1.104","TCP","54","48080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54961","26.912863","172.30.1.104","172.30.1.205","TCP","66","49671 > 40718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54962","26.912872","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54963","26.913236","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54964","26.913526","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54965","26.913534","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54966","26.915411","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54967","26.915757","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54968","26.915763","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54969","26.917173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54970","26.921091","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54971","26.921101","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54972","26.922053","172.30.1.205","172.30.1.104","TCP","74","48084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930148 TSecr=0 WS=128" +"54973","26.922329","172.30.1.104","172.30.1.205","TCP","66","135 > 48084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54974","26.922339","172.30.1.205","172.30.1.104","TCP","54","48084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54975","26.922701","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"54976","26.922965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54977","26.922974","172.30.1.205","172.30.1.104","TCP","54","48084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54978","26.925188","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"54979","26.925568","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"54980","26.925574","172.30.1.205","172.30.1.104","TCP","54","48084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54981","26.927396","172.30.1.205","172.30.1.104","TCP","54","48084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"54982","26.927507","172.30.1.205","172.30.1.104","TCP","74","40722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930153 TSecr=0 WS=128" +"54983","26.928011","172.30.1.104","172.30.1.205","TCP","54","135 > 48084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54984","26.928123","172.30.1.104","172.30.1.205","TCP","54","135 > 48084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"54985","26.928128","172.30.1.205","172.30.1.104","TCP","54","48084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"54986","26.928133","172.30.1.104","172.30.1.205","TCP","66","49671 > 40722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54987","26.928145","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"54988","26.928493","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"54989","26.928792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"54990","26.928805","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"54991","26.930773","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"54992","26.931158","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"54993","26.931165","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"54994","26.932540","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"54995","26.936863","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"54996","26.936873","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"54997","26.937828","172.30.1.205","172.30.1.104","TCP","74","48088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930164 TSecr=0 WS=128" +"54998","26.938183","172.30.1.104","172.30.1.205","TCP","66","135 > 48088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"54999","26.938204","172.30.1.205","172.30.1.104","TCP","54","48088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55000","26.938692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55001","26.939059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55002","26.939067","172.30.1.205","172.30.1.104","TCP","54","48088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55003","26.941276","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55004","26.941740","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55005","26.941750","172.30.1.205","172.30.1.104","TCP","54","48088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55006","26.942672","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55007","26.942723","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55008","26.942761","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55009","26.942794","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55010","26.942825","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55011","26.942856","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55012","26.942887","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55013","26.942915","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55014","26.942941","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55015","26.942952","172.30.1.104","172.30.1.205","TCP","54","49671 > 40682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55016","26.942967","172.30.1.104","172.30.1.205","TCP","54","49671 > 40686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55017","26.942998","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55018","26.943032","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55019","26.943110","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55020","26.943116","172.30.1.104","172.30.1.205","TCP","54","49671 > 40690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55021","26.943131","172.30.1.104","172.30.1.205","TCP","54","49671 > 40682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55022","26.943137","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55023","26.943165","172.30.1.104","172.30.1.205","TCP","54","49671 > 40686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55024","26.943168","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55025","26.943185","172.30.1.104","172.30.1.205","TCP","54","49671 > 40690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55026","26.943188","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55027","26.943205","172.30.1.104","172.30.1.205","TCP","54","49671 > 40694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55028","26.943226","172.30.1.104","172.30.1.205","TCP","54","49671 > 40698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55029","26.943247","172.30.1.104","172.30.1.205","TCP","54","49671 > 40694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55030","26.943251","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55031","26.943267","172.30.1.104","172.30.1.205","TCP","54","49671 > 40702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55032","26.943405","172.30.1.104","172.30.1.205","TCP","54","49671 > 40706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55033","26.943425","172.30.1.104","172.30.1.205","TCP","54","49671 > 40706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55034","26.943429","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55035","26.943454","172.30.1.104","172.30.1.205","TCP","54","49671 > 40698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55036","26.943457","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55037","26.943480","172.30.1.104","172.30.1.205","TCP","54","49671 > 40702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55038","26.943484","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55039","26.943512","172.30.1.104","172.30.1.205","TCP","54","49671 > 40710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55040","26.943532","172.30.1.104","172.30.1.205","TCP","54","49671 > 40714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55041","26.943551","172.30.1.104","172.30.1.205","TCP","54","49671 > 40718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55042","26.943636","172.30.1.104","172.30.1.205","TCP","54","49671 > 40710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55043","26.943640","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55044","26.943655","172.30.1.104","172.30.1.205","TCP","54","49671 > 40722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55045","26.943676","172.30.1.104","172.30.1.205","TCP","54","49671 > 40722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55046","26.943680","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55047","26.943696","172.30.1.104","172.30.1.205","TCP","54","49671 > 40714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55048","26.943699","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55049","26.943716","172.30.1.104","172.30.1.205","TCP","54","49671 > 40718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55050","26.943718","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55051","26.943735","172.30.1.104","172.30.1.205","TCP","54","49671 > 40678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55052","26.943755","172.30.1.104","172.30.1.205","TCP","54","49671 > 40678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55053","26.943758","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55054","26.944679","172.30.1.205","172.30.1.104","TCP","54","48088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55055","26.944822","172.30.1.205","172.30.1.104","TCP","74","40726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930171 TSecr=0 WS=128" +"55056","26.944945","172.30.1.104","172.30.1.205","TCP","54","135 > 48088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55057","26.944966","172.30.1.104","172.30.1.205","TCP","54","135 > 48088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55058","26.944971","172.30.1.205","172.30.1.104","TCP","54","48088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55059","26.945102","172.30.1.104","172.30.1.205","TCP","66","49671 > 40726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55060","26.945111","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55061","26.945485","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55062","26.945762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55063","26.945771","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55064","26.947729","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55065","26.948414","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55066","26.948426","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55067","26.950038","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55068","26.954098","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55069","26.954109","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55070","26.955061","172.30.1.205","172.30.1.104","TCP","74","48092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930181 TSecr=0 WS=128" +"55071","26.955391","172.30.1.104","172.30.1.205","TCP","66","135 > 48092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55072","26.955403","172.30.1.205","172.30.1.104","TCP","54","48092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55073","26.955761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55074","26.956081","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55075","26.956089","172.30.1.205","172.30.1.104","TCP","54","48092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55076","26.958285","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55077","26.958695","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55078","26.958701","172.30.1.205","172.30.1.104","TCP","54","48092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55079","26.960514","172.30.1.205","172.30.1.104","TCP","54","48092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55080","26.960625","172.30.1.205","172.30.1.104","TCP","74","40730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930187 TSecr=0 WS=128" +"55081","26.960793","172.30.1.104","172.30.1.205","TCP","54","135 > 48092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55082","26.960811","172.30.1.104","172.30.1.205","TCP","54","135 > 48092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55083","26.960816","172.30.1.205","172.30.1.104","TCP","54","48092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55084","26.960895","172.30.1.104","172.30.1.205","TCP","66","49671 > 40730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55085","26.960904","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55086","26.961258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55087","26.961533","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55088","26.961542","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55089","26.963416","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55090","26.963797","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55091","26.963803","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55092","26.965182","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55093","26.969153","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55094","26.969163","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55095","26.970114","172.30.1.205","172.30.1.104","TCP","74","48096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930196 TSecr=0 WS=128" +"55096","26.970402","172.30.1.104","172.30.1.205","TCP","66","135 > 48096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55097","26.970413","172.30.1.205","172.30.1.104","TCP","54","48096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55098","26.970773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55099","26.971042","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55100","26.971052","172.30.1.205","172.30.1.104","TCP","54","48096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55101","26.973279","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55102","26.973708","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55103","26.973715","172.30.1.205","172.30.1.104","TCP","54","48096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55104","26.975520","172.30.1.205","172.30.1.104","TCP","54","48096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55105","26.975632","172.30.1.205","172.30.1.104","TCP","74","40734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930202 TSecr=0 WS=128" +"55106","26.975847","172.30.1.104","172.30.1.205","TCP","54","135 > 48096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55107","26.975856","172.30.1.104","172.30.1.205","TCP","54","135 > 48096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55108","26.975861","172.30.1.205","172.30.1.104","TCP","54","48096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55109","26.975906","172.30.1.104","172.30.1.205","TCP","66","49671 > 40734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55110","26.975915","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55111","26.976258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55112","26.976553","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55113","26.976560","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55114","26.978466","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55115","26.978830","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55116","26.978836","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55117","26.980191","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55118","26.984355","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55119","26.984366","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55120","26.985365","172.30.1.205","172.30.1.104","TCP","74","48100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930211 TSecr=0 WS=128" +"55121","26.985656","172.30.1.104","172.30.1.205","TCP","66","135 > 48100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55122","26.985667","172.30.1.205","172.30.1.104","TCP","54","48100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55123","26.986021","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55124","26.986308","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55125","26.986317","172.30.1.205","172.30.1.104","TCP","54","48100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55126","26.988512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55127","26.988892","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55128","26.988898","172.30.1.205","172.30.1.104","TCP","54","48100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55129","26.990720","172.30.1.205","172.30.1.104","TCP","54","48100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55130","26.990831","172.30.1.205","172.30.1.104","TCP","74","40738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930217 TSecr=0 WS=128" +"55131","26.990994","172.30.1.104","172.30.1.205","TCP","54","135 > 48100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55132","26.991003","172.30.1.104","172.30.1.205","TCP","54","135 > 48100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55133","26.991009","172.30.1.205","172.30.1.104","TCP","54","48100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55134","26.991112","172.30.1.104","172.30.1.205","TCP","66","49671 > 40738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55135","26.991121","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55136","26.991466","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55137","26.991741","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55138","26.991749","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55139","26.993666","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55140","26.994780","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55141","26.994787","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55142","26.996153","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55143","27.000228","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55144","27.000241","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55145","27.001298","172.30.1.205","172.30.1.104","TCP","74","48104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930227 TSecr=0 WS=128" +"55146","27.001625","172.30.1.104","172.30.1.205","TCP","66","135 > 48104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55147","27.001637","172.30.1.205","172.30.1.104","TCP","54","48104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55148","27.002002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55149","27.002299","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55150","27.002312","172.30.1.205","172.30.1.104","TCP","54","48104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55151","27.004604","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55152","27.004999","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55153","27.005006","172.30.1.205","172.30.1.104","TCP","54","48104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55154","27.006849","172.30.1.205","172.30.1.104","TCP","54","48104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55155","27.006984","172.30.1.205","172.30.1.104","TCP","74","40742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930233 TSecr=0 WS=128" +"55156","27.007135","172.30.1.104","172.30.1.205","TCP","54","135 > 48104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55157","27.007147","172.30.1.104","172.30.1.205","TCP","54","135 > 48104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55158","27.007153","172.30.1.205","172.30.1.104","TCP","54","48104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55159","27.007250","172.30.1.104","172.30.1.205","TCP","66","49671 > 40742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55160","27.007258","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55161","27.007606","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55162","27.007971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55163","27.007989","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55164","27.010014","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55165","27.010399","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55166","27.010405","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55167","27.011799","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55168","27.015900","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55169","27.015917","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55170","27.017056","172.30.1.205","172.30.1.104","TCP","74","48108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930243 TSecr=0 WS=128" +"55171","27.017380","172.30.1.104","172.30.1.205","TCP","66","135 > 48108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55172","27.017393","172.30.1.205","172.30.1.104","TCP","54","48108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55173","27.017763","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55174","27.018047","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55175","27.018057","172.30.1.205","172.30.1.104","TCP","54","48108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55176","27.020330","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55177","27.020718","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55178","27.020725","172.30.1.205","172.30.1.104","TCP","54","48108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55179","27.022570","172.30.1.205","172.30.1.104","TCP","54","48108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55180","27.022693","172.30.1.205","172.30.1.104","TCP","74","40746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930249 TSecr=0 WS=128" +"55181","27.022883","172.30.1.104","172.30.1.205","TCP","54","135 > 48108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55182","27.022909","172.30.1.104","172.30.1.205","TCP","54","135 > 48108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55183","27.022916","172.30.1.205","172.30.1.104","TCP","54","48108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55184","27.023000","172.30.1.104","172.30.1.205","TCP","66","49671 > 40746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55185","27.023008","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55186","27.023357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55187","27.023683","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55188","27.023692","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55189","27.025639","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55190","27.026039","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55191","27.026045","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55192","27.027419","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55193","27.031514","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55194","27.031526","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55195","27.032539","172.30.1.205","172.30.1.104","TCP","74","48112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930258 TSecr=0 WS=128" +"55196","27.032866","172.30.1.104","172.30.1.205","TCP","66","135 > 48112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55197","27.032878","172.30.1.205","172.30.1.104","TCP","54","48112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55198","27.033243","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55199","27.033541","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55200","27.033550","172.30.1.205","172.30.1.104","TCP","54","48112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55201","27.035765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55202","27.036149","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55203","27.036155","172.30.1.205","172.30.1.104","TCP","54","48112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55204","27.038000","172.30.1.205","172.30.1.104","TCP","54","48112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55205","27.038114","172.30.1.205","172.30.1.104","TCP","74","40750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930264 TSecr=0 WS=128" +"55206","27.038297","172.30.1.104","172.30.1.205","TCP","54","135 > 48112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55207","27.038365","172.30.1.104","172.30.1.205","TCP","54","135 > 48112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55208","27.038371","172.30.1.205","172.30.1.104","TCP","54","48112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55209","27.038457","172.30.1.104","172.30.1.205","TCP","66","49671 > 40750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55210","27.038466","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55211","27.038831","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55212","27.039130","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55213","27.039140","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55214","27.041051","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55215","27.041409","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55216","27.041415","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55217","27.042785","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55218","27.046899","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55219","27.046909","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55220","27.047912","172.30.1.205","172.30.1.104","TCP","74","48116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930274 TSecr=0 WS=128" +"55221","27.048230","172.30.1.104","172.30.1.205","TCP","66","135 > 48116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55222","27.048241","172.30.1.205","172.30.1.104","TCP","54","48116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55223","27.048595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55224","27.048881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55225","27.048890","172.30.1.205","172.30.1.104","TCP","54","48116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55226","27.051115","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55227","27.051567","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55228","27.051579","172.30.1.205","172.30.1.104","TCP","54","48116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55229","27.053450","172.30.1.205","172.30.1.104","TCP","54","48116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55230","27.053569","172.30.1.205","172.30.1.104","TCP","74","40754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930279 TSecr=0 WS=128" +"55231","27.053735","172.30.1.104","172.30.1.205","TCP","54","135 > 48116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55232","27.053759","172.30.1.104","172.30.1.205","TCP","54","135 > 48116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55233","27.053766","172.30.1.205","172.30.1.104","TCP","54","48116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55234","27.053892","172.30.1.104","172.30.1.205","TCP","66","49671 > 40754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55235","27.053909","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55236","27.054302","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55237","27.054593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55238","27.054602","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55239","27.056511","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55240","27.057787","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55241","27.057794","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55242","27.059178","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55243","27.063127","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55244","27.063137","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55245","27.064119","172.30.1.205","172.30.1.104","TCP","74","48120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930290 TSecr=0 WS=128" +"55246","27.064429","172.30.1.104","172.30.1.205","TCP","66","135 > 48120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55247","27.064440","172.30.1.205","172.30.1.104","TCP","54","48120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55248","27.064820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55249","27.065148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55250","27.065157","172.30.1.205","172.30.1.104","TCP","54","48120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55251","27.067361","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55252","27.067777","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55253","27.067784","172.30.1.205","172.30.1.104","TCP","54","48120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55254","27.069624","172.30.1.205","172.30.1.104","TCP","54","48120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55255","27.069745","172.30.1.205","172.30.1.104","TCP","74","40758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930296 TSecr=0 WS=128" +"55256","27.069909","172.30.1.104","172.30.1.205","TCP","54","135 > 48120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55257","27.069934","172.30.1.104","172.30.1.205","TCP","54","135 > 48120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55258","27.069940","172.30.1.205","172.30.1.104","TCP","54","48120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55259","27.070025","172.30.1.104","172.30.1.205","TCP","66","49671 > 40758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55260","27.070033","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55261","27.070383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55262","27.070660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55263","27.070669","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55264","27.072547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55265","27.072974","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55266","27.072984","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55267","27.074425","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55268","27.078515","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55269","27.078527","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55270","27.079548","172.30.1.205","172.30.1.104","TCP","74","48124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930305 TSecr=0 WS=128" +"55271","27.079829","172.30.1.104","172.30.1.205","TCP","66","135 > 48124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55272","27.079840","172.30.1.205","172.30.1.104","TCP","54","48124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55273","27.080193","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55274","27.080538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55275","27.080547","172.30.1.205","172.30.1.104","TCP","54","48124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55276","27.082763","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55277","27.083166","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55278","27.083172","172.30.1.205","172.30.1.104","TCP","54","48124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55279","27.085025","172.30.1.205","172.30.1.104","TCP","54","48124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55280","27.085139","172.30.1.205","172.30.1.104","TCP","74","40762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930311 TSecr=0 WS=128" +"55281","27.085326","172.30.1.104","172.30.1.205","TCP","54","135 > 48124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55282","27.085351","172.30.1.104","172.30.1.205","TCP","54","135 > 48124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55283","27.085359","172.30.1.205","172.30.1.104","TCP","54","48124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55284","27.085456","172.30.1.104","172.30.1.205","TCP","66","49671 > 40762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55285","27.085466","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55286","27.085871","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55287","27.086156","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55288","27.086165","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55289","27.088057","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55290","27.088461","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55291","27.088472","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55292","27.089949","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55293","27.094005","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55294","27.094020","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55295","27.095036","172.30.1.205","172.30.1.104","TCP","74","48128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930321 TSecr=0 WS=128" +"55296","27.095397","172.30.1.104","172.30.1.205","TCP","66","135 > 48128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55297","27.095409","172.30.1.205","172.30.1.104","TCP","54","48128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55298","27.095774","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55299","27.096069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55300","27.096077","172.30.1.205","172.30.1.104","TCP","54","48128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55301","27.098317","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55302","27.098759","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55303","27.098766","172.30.1.205","172.30.1.104","TCP","54","48128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55304","27.100612","172.30.1.205","172.30.1.104","TCP","54","48128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55305","27.100725","172.30.1.205","172.30.1.104","TCP","74","40766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930327 TSecr=0 WS=128" +"55306","27.100868","172.30.1.104","172.30.1.205","TCP","54","135 > 48128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55307","27.100880","172.30.1.104","172.30.1.205","TCP","54","135 > 48128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55308","27.100887","172.30.1.205","172.30.1.104","TCP","54","48128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55309","27.100990","172.30.1.104","172.30.1.205","TCP","66","49671 > 40766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55310","27.100998","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55311","27.101363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55312","27.101652","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55313","27.101661","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55314","27.103537","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55315","27.103900","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55316","27.103907","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55317","27.105355","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55318","27.109472","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55319","27.109483","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55320","27.110451","172.30.1.205","172.30.1.104","TCP","74","48132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930336 TSecr=0 WS=128" +"55321","27.110750","172.30.1.104","172.30.1.205","TCP","66","135 > 48132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55322","27.110761","172.30.1.205","172.30.1.104","TCP","54","48132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55323","27.111116","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55324","27.111418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55325","27.111436","172.30.1.205","172.30.1.104","TCP","54","48132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55326","27.113921","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55327","27.114296","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55328","27.114303","172.30.1.205","172.30.1.104","TCP","54","48132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55329","27.116248","172.30.1.205","172.30.1.104","TCP","54","48132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55330","27.116358","172.30.1.205","172.30.1.104","TCP","74","40770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930342 TSecr=0 WS=128" +"55331","27.116525","172.30.1.104","172.30.1.205","TCP","54","135 > 48132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55332","27.116652","172.30.1.104","172.30.1.205","TCP","54","135 > 48132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55333","27.116662","172.30.1.205","172.30.1.104","TCP","54","48132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55334","27.116671","172.30.1.104","172.30.1.205","TCP","66","49671 > 40770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55335","27.116687","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55336","27.117106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55337","27.117383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55338","27.117392","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55339","27.119277","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55340","27.119636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55341","27.119643","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55342","27.121021","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55343","27.125054","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55344","27.125065","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55345","27.126024","172.30.1.205","172.30.1.104","TCP","74","48136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930352 TSecr=0 WS=128" +"55346","27.126341","172.30.1.104","172.30.1.205","TCP","66","135 > 48136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55347","27.126353","172.30.1.205","172.30.1.104","TCP","54","48136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55348","27.126712","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55349","27.126988","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55350","27.126997","172.30.1.205","172.30.1.104","TCP","54","48136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55351","27.129199","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55352","27.129577","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55353","27.129583","172.30.1.205","172.30.1.104","TCP","54","48136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55354","27.130430","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55355","27.130480","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55356","27.130527","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55357","27.130562","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55358","27.130595","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55359","27.130627","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55360","27.130659","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55361","27.130685","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55362","27.130717","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55363","27.130743","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55364","27.130769","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55365","27.130810","172.30.1.104","172.30.1.205","TCP","54","49671 > 40730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55366","27.130830","172.30.1.104","172.30.1.205","TCP","54","49671 > 40734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55367","27.130850","172.30.1.104","172.30.1.205","TCP","54","49671 > 40738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55368","27.130870","172.30.1.104","172.30.1.205","TCP","54","49671 > 40742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55369","27.130890","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55370","27.130967","172.30.1.104","172.30.1.205","TCP","54","49671 > 40730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55371","27.130974","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55372","27.130986","172.30.1.104","172.30.1.205","TCP","54","49671 > 40746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55373","27.131010","172.30.1.104","172.30.1.205","TCP","54","49671 > 40746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55374","27.131015","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55375","27.131030","172.30.1.104","172.30.1.205","TCP","54","49671 > 40742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55376","27.131033","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55377","27.131050","172.30.1.104","172.30.1.205","TCP","54","49671 > 40734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55378","27.131052","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55379","27.131070","172.30.1.104","172.30.1.205","TCP","54","49671 > 40738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55380","27.131073","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55381","27.131092","172.30.1.104","172.30.1.205","TCP","54","49671 > 40750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55382","27.131118","172.30.1.104","172.30.1.205","TCP","54","49671 > 40754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55383","27.131243","172.30.1.104","172.30.1.205","TCP","54","49671 > 40758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55384","27.131249","172.30.1.104","172.30.1.205","TCP","54","49671 > 40750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55385","27.131253","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55386","27.131296","172.30.1.104","172.30.1.205","TCP","54","49671 > 40762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55387","27.131314","172.30.1.104","172.30.1.205","TCP","54","49671 > 40766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55388","27.131335","172.30.1.104","172.30.1.205","TCP","54","49671 > 40766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55389","27.131339","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55390","27.131355","172.30.1.104","172.30.1.205","TCP","54","49671 > 40762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55391","27.131358","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55392","27.131383","172.30.1.104","172.30.1.205","TCP","54","49671 > 40754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55393","27.131392","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55394","27.131414","172.30.1.104","172.30.1.205","TCP","54","49671 > 40758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55395","27.131417","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55396","27.131533","172.30.1.104","172.30.1.205","TCP","54","49671 > 40770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55397","27.131553","172.30.1.104","172.30.1.205","TCP","54","49671 > 40726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55398","27.131573","172.30.1.104","172.30.1.205","TCP","54","49671 > 40770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55399","27.131577","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55400","27.131594","172.30.1.104","172.30.1.205","TCP","54","49671 > 40726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55401","27.131597","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55402","27.132425","172.30.1.205","172.30.1.104","TCP","54","48136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55403","27.132534","172.30.1.205","172.30.1.104","TCP","74","40774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930358 TSecr=0 WS=128" +"55404","27.132664","172.30.1.104","172.30.1.205","TCP","54","135 > 48136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55405","27.132685","172.30.1.104","172.30.1.205","TCP","54","135 > 48136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55406","27.132690","172.30.1.205","172.30.1.104","TCP","54","48136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55407","27.132835","172.30.1.104","172.30.1.205","TCP","66","49671 > 40774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55408","27.132844","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55409","27.133207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55410","27.133473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55411","27.133482","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55412","27.135351","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55413","27.135705","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55414","27.135711","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55415","27.137102","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55416","27.141041","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55417","27.141054","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55418","27.142065","172.30.1.205","172.30.1.104","TCP","74","48140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930368 TSecr=0 WS=128" +"55419","27.142345","172.30.1.104","172.30.1.205","TCP","66","135 > 48140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55420","27.142355","172.30.1.205","172.30.1.104","TCP","54","48140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55421","27.142714","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55422","27.143009","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55423","27.143023","172.30.1.205","172.30.1.104","TCP","54","48140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55424","27.145315","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55425","27.145721","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55426","27.145727","172.30.1.205","172.30.1.104","TCP","54","48140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55427","27.147538","172.30.1.205","172.30.1.104","TCP","54","48140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55428","27.147656","172.30.1.205","172.30.1.104","TCP","74","40778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930374 TSecr=0 WS=128" +"55429","27.147823","172.30.1.104","172.30.1.205","TCP","54","135 > 48140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55430","27.147871","172.30.1.104","172.30.1.205","TCP","54","135 > 48140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55431","27.147876","172.30.1.205","172.30.1.104","TCP","54","48140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55432","27.147916","172.30.1.104","172.30.1.205","TCP","66","49671 > 40778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55433","27.147924","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55434","27.148271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55435","27.149311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55436","27.149323","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55437","27.151223","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55438","27.151587","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55439","27.151594","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55440","27.152966","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55441","27.156908","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55442","27.156917","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55443","27.157854","172.30.1.205","172.30.1.104","TCP","74","48144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930384 TSecr=0 WS=128" +"55444","27.158159","172.30.1.104","172.30.1.205","TCP","66","135 > 48144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55445","27.158170","172.30.1.205","172.30.1.104","TCP","54","48144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55446","27.158526","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55447","27.158811","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55448","27.158820","172.30.1.205","172.30.1.104","TCP","54","48144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55449","27.161019","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55450","27.161438","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55451","27.161445","172.30.1.205","172.30.1.104","TCP","54","48144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55452","27.163242","172.30.1.205","172.30.1.104","TCP","54","48144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55453","27.163351","172.30.1.205","172.30.1.104","TCP","74","40782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930389 TSecr=0 WS=128" +"55454","27.163526","172.30.1.104","172.30.1.205","TCP","54","135 > 48144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55455","27.163585","172.30.1.104","172.30.1.205","TCP","54","135 > 48144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55456","27.163590","172.30.1.205","172.30.1.104","TCP","54","48144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55457","27.163626","172.30.1.104","172.30.1.205","TCP","66","49671 > 40782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55458","27.163634","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55459","27.163988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55460","27.164301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55461","27.164309","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55462","27.166218","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55463","27.166629","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55464","27.166635","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55465","27.167970","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55466","27.172030","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55467","27.172041","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55468","27.173004","172.30.1.205","172.30.1.104","TCP","74","48148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930399 TSecr=0 WS=128" +"55469","27.173298","172.30.1.104","172.30.1.205","TCP","66","135 > 48148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55470","27.173310","172.30.1.205","172.30.1.104","TCP","54","48148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55471","27.173664","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55472","27.173947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55473","27.173956","172.30.1.205","172.30.1.104","TCP","54","48148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55474","27.176143","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55475","27.176528","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55476","27.176534","172.30.1.205","172.30.1.104","TCP","54","48148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55477","27.178356","172.30.1.205","172.30.1.104","TCP","54","48148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55478","27.178475","172.30.1.205","172.30.1.104","TCP","74","40786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930404 TSecr=0 WS=128" +"55479","27.178637","172.30.1.104","172.30.1.205","TCP","54","135 > 48148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55480","27.178673","172.30.1.104","172.30.1.205","TCP","54","135 > 48148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55481","27.178679","172.30.1.205","172.30.1.104","TCP","54","48148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55482","27.178767","172.30.1.104","172.30.1.205","TCP","66","49671 > 40786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55483","27.178775","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55484","27.179121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55485","27.179414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55486","27.179423","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55487","27.181340","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55488","27.181718","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55489","27.181724","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55490","27.183071","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55491","27.187166","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55492","27.187177","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55493","27.188155","172.30.1.205","172.30.1.104","TCP","74","48152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930414 TSecr=0 WS=128" +"55494","27.188468","172.30.1.104","172.30.1.205","TCP","66","135 > 48152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55495","27.188478","172.30.1.205","172.30.1.104","TCP","54","48152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55496","27.188849","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55497","27.189137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55498","27.189146","172.30.1.205","172.30.1.104","TCP","54","48152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55499","27.191332","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55500","27.191743","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55501","27.191749","172.30.1.205","172.30.1.104","TCP","54","48152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55502","27.193583","172.30.1.205","172.30.1.104","TCP","54","48152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55503","27.193698","172.30.1.205","172.30.1.104","TCP","74","40790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930420 TSecr=0 WS=128" +"55504","27.193867","172.30.1.104","172.30.1.205","TCP","54","135 > 48152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55505","27.193923","172.30.1.104","172.30.1.205","TCP","54","135 > 48152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55506","27.193930","172.30.1.205","172.30.1.104","TCP","54","48152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55507","27.194000","172.30.1.104","172.30.1.205","TCP","66","49671 > 40790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55508","27.194008","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55509","27.194351","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55510","27.194638","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55511","27.194648","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55512","27.196533","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55513","27.196890","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55514","27.196896","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55515","27.198258","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55516","27.202323","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55517","27.202332","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55518","27.203292","172.30.1.205","172.30.1.104","TCP","74","48156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930429 TSecr=0 WS=128" +"55519","27.203582","172.30.1.104","172.30.1.205","TCP","66","135 > 48156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55520","27.203593","172.30.1.205","172.30.1.104","TCP","54","48156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55521","27.203944","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55522","27.204244","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55523","27.204252","172.30.1.205","172.30.1.104","TCP","54","48156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55524","27.206469","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55525","27.206890","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55526","27.206903","172.30.1.205","172.30.1.104","TCP","54","48156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55527","27.208857","172.30.1.205","172.30.1.104","TCP","54","48156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55528","27.208967","172.30.1.205","172.30.1.104","TCP","74","40794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930435 TSecr=0 WS=128" +"55529","27.209140","172.30.1.104","172.30.1.205","TCP","54","135 > 48156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55530","27.209176","172.30.1.104","172.30.1.205","TCP","54","135 > 48156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55531","27.209183","172.30.1.205","172.30.1.104","TCP","54","48156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55532","27.209279","172.30.1.104","172.30.1.205","TCP","66","49671 > 40794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55533","27.209295","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55534","27.209715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55535","27.210043","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55536","27.210053","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55537","27.211962","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55538","27.213535","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55539","27.213550","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55540","27.215109","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55541","27.219283","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55542","27.219295","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55543","27.220267","172.30.1.205","172.30.1.104","TCP","74","48160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930446 TSecr=0 WS=128" +"55544","27.220576","172.30.1.104","172.30.1.205","TCP","66","135 > 48160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55545","27.220587","172.30.1.205","172.30.1.104","TCP","54","48160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55546","27.220969","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55547","27.222966","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55548","27.222977","172.30.1.205","172.30.1.104","TCP","54","48160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55549","27.225224","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55550","27.225638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55551","27.225645","172.30.1.205","172.30.1.104","TCP","54","48160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55552","27.227492","172.30.1.205","172.30.1.104","TCP","54","48160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55553","27.227605","172.30.1.205","172.30.1.104","TCP","74","40798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930454 TSecr=0 WS=128" +"55554","27.227758","172.30.1.104","172.30.1.205","TCP","54","135 > 48160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55555","27.227784","172.30.1.104","172.30.1.205","TCP","54","135 > 48160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55556","27.227790","172.30.1.205","172.30.1.104","TCP","54","48160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55557","27.227901","172.30.1.104","172.30.1.205","TCP","66","49671 > 40798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55558","27.227909","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55559","27.228256","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55560","27.228536","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55561","27.228545","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55562","27.230438","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55563","27.230791","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55564","27.230798","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55565","27.232175","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55566","27.236193","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55567","27.236204","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55568","27.237186","172.30.1.205","172.30.1.104","TCP","74","48164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930463 TSecr=0 WS=128" +"55569","27.237480","172.30.1.104","172.30.1.205","TCP","66","135 > 48164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55570","27.237491","172.30.1.205","172.30.1.104","TCP","54","48164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55571","27.237844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55572","27.238129","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55573","27.238139","172.30.1.205","172.30.1.104","TCP","54","48164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55574","27.240360","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55575","27.240783","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55576","27.240790","172.30.1.205","172.30.1.104","TCP","54","48164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55577","27.242617","172.30.1.205","172.30.1.104","TCP","54","48164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55578","27.242730","172.30.1.205","172.30.1.104","TCP","74","40802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930469 TSecr=0 WS=128" +"55579","27.242931","172.30.1.104","172.30.1.205","TCP","54","135 > 48164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55580","27.242940","172.30.1.104","172.30.1.205","TCP","54","135 > 48164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55581","27.242945","172.30.1.205","172.30.1.104","TCP","54","48164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55582","27.243039","172.30.1.104","172.30.1.205","TCP","66","49671 > 40802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55583","27.243048","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55584","27.243395","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55585","27.243702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55586","27.243711","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55587","27.245646","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55588","27.246018","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55589","27.246024","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55590","27.247406","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55591","27.251473","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55592","27.251484","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55593","27.252455","172.30.1.205","172.30.1.104","TCP","74","48168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930478 TSecr=0 WS=128" +"55594","27.252754","172.30.1.104","172.30.1.205","TCP","66","135 > 48168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55595","27.252765","172.30.1.205","172.30.1.104","TCP","54","48168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55596","27.253131","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55597","27.253431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55598","27.253440","172.30.1.205","172.30.1.104","TCP","54","48168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55599","27.255651","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55600","27.256094","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55601","27.256107","172.30.1.205","172.30.1.104","TCP","54","48168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55602","27.258136","172.30.1.205","172.30.1.104","TCP","54","48168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55603","27.258247","172.30.1.205","172.30.1.104","TCP","74","40806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930484 TSecr=0 WS=128" +"55604","27.258408","172.30.1.104","172.30.1.205","TCP","54","135 > 48168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55605","27.258486","172.30.1.104","172.30.1.205","TCP","54","135 > 48168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55606","27.258491","172.30.1.205","172.30.1.104","TCP","54","48168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55607","27.258526","172.30.1.104","172.30.1.205","TCP","66","49671 > 40806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55608","27.258534","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55609","27.258882","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55610","27.261197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55611","27.261206","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55612","27.263104","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55613","27.263480","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55614","27.263486","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55615","27.264871","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55616","27.268898","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55617","27.268908","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55618","27.269872","172.30.1.205","172.30.1.104","TCP","74","48172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930496 TSecr=0 WS=128" +"55619","27.270191","172.30.1.104","172.30.1.205","TCP","66","135 > 48172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55620","27.270202","172.30.1.205","172.30.1.104","TCP","54","48172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55621","27.270559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55622","27.270868","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55623","27.270877","172.30.1.205","172.30.1.104","TCP","54","48172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55624","27.273110","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55625","27.273520","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55626","27.273527","172.30.1.205","172.30.1.104","TCP","54","48172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55627","27.275382","172.30.1.205","172.30.1.104","TCP","54","48172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55628","27.275494","172.30.1.205","172.30.1.104","TCP","74","40810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930501 TSecr=0 WS=128" +"55629","27.275665","172.30.1.104","172.30.1.205","TCP","54","135 > 48172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55630","27.275697","172.30.1.104","172.30.1.205","TCP","54","135 > 48172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55631","27.275703","172.30.1.205","172.30.1.104","TCP","54","48172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55632","27.275780","172.30.1.104","172.30.1.205","TCP","66","49671 > 40810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55633","27.275788","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55634","27.276136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55635","27.276450","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55636","27.276459","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55637","27.278385","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55638","27.278777","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55639","27.278784","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55640","27.280154","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55641","27.284147","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55642","27.284159","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55643","27.285216","172.30.1.205","172.30.1.104","TCP","74","48176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930511 TSecr=0 WS=128" +"55644","27.285521","172.30.1.104","172.30.1.205","TCP","66","135 > 48176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55645","27.285534","172.30.1.205","172.30.1.104","TCP","54","48176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55646","27.285896","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55647","27.286180","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55648","27.286190","172.30.1.205","172.30.1.104","TCP","54","48176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55649","27.288433","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55650","27.288844","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55651","27.288851","172.30.1.205","172.30.1.104","TCP","54","48176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55652","27.290689","172.30.1.205","172.30.1.104","TCP","54","48176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55653","27.290805","172.30.1.205","172.30.1.104","TCP","74","40814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930517 TSecr=0 WS=128" +"55654","27.291011","172.30.1.104","172.30.1.205","TCP","54","135 > 48176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55655","27.291071","172.30.1.104","172.30.1.205","TCP","66","49671 > 40814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55656","27.291081","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55657","27.291099","172.30.1.104","172.30.1.205","TCP","54","135 > 48176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55658","27.291111","172.30.1.205","172.30.1.104","TCP","54","48176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55659","27.291472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55660","27.291781","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55661","27.291791","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55662","27.293706","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55663","27.294134","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55664","27.294141","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55665","27.295497","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55666","27.300168","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55667","27.300181","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55668","27.301197","172.30.1.205","172.30.1.104","TCP","74","48180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930527 TSecr=0 WS=128" +"55669","27.301489","172.30.1.104","172.30.1.205","TCP","66","135 > 48180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55670","27.301500","172.30.1.205","172.30.1.104","TCP","54","48180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55671","27.301864","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55672","27.302172","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55673","27.302181","172.30.1.205","172.30.1.104","TCP","54","48180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55674","27.304376","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55675","27.304807","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55676","27.304813","172.30.1.205","172.30.1.104","TCP","54","48180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55677","27.306669","172.30.1.205","172.30.1.104","TCP","54","48180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55678","27.306796","172.30.1.205","172.30.1.104","TCP","74","40818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930533 TSecr=0 WS=128" +"55679","27.307003","172.30.1.104","172.30.1.205","TCP","54","135 > 48180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55680","27.307011","172.30.1.104","172.30.1.205","TCP","54","135 > 48180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55681","27.307016","172.30.1.205","172.30.1.104","TCP","54","48180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55682","27.307094","172.30.1.104","172.30.1.205","TCP","66","49671 > 40818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55683","27.307102","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55684","27.307449","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55685","27.307775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55686","27.307784","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55687","27.309707","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55688","27.310171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55689","27.310177","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55690","27.311522","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55691","27.315539","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55692","27.315550","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55693","27.316532","172.30.1.205","172.30.1.104","TCP","74","48184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930542 TSecr=0 WS=128" +"55694","27.316836","172.30.1.104","172.30.1.205","TCP","66","135 > 48184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55695","27.316848","172.30.1.205","172.30.1.104","TCP","54","48184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55696","27.317224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55697","27.317559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55698","27.317568","172.30.1.205","172.30.1.104","TCP","54","48184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55699","27.319751","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55700","27.320155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55701","27.320162","172.30.1.205","172.30.1.104","TCP","54","48184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55702","27.321028","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55703","27.321083","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55704","27.321120","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55705","27.321155","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55706","27.321187","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55707","27.321216","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55708","27.321243","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55709","27.321270","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55710","27.321298","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55711","27.321326","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55712","27.321353","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55713","27.321424","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55714","27.321610","172.30.1.104","172.30.1.205","TCP","54","49671 > 40778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55715","27.321619","172.30.1.104","172.30.1.205","TCP","54","49671 > 40782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55716","27.321622","172.30.1.104","172.30.1.205","TCP","54","49671 > 40786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55717","27.321785","172.30.1.104","172.30.1.205","TCP","54","49671 > 40778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55718","27.321793","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55719","27.321799","172.30.1.104","172.30.1.205","TCP","54","49671 > 40790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55720","27.321805","172.30.1.104","172.30.1.205","TCP","54","49671 > 40794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55721","27.321808","172.30.1.104","172.30.1.205","TCP","54","49671 > 40794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55722","27.321810","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55723","27.321811","172.30.1.104","172.30.1.205","TCP","54","49671 > 40798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55724","27.321814","172.30.1.104","172.30.1.205","TCP","54","49671 > 40802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55725","27.321817","172.30.1.104","172.30.1.205","TCP","54","49671 > 40790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55726","27.321819","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55727","27.322118","172.30.1.104","172.30.1.205","TCP","54","49671 > 40806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55728","27.322124","172.30.1.104","172.30.1.205","TCP","54","49671 > 40802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55729","27.322128","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55730","27.322135","172.30.1.104","172.30.1.205","TCP","54","49671 > 40810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55731","27.322138","172.30.1.104","172.30.1.205","TCP","54","49671 > 40798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55732","27.322140","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55733","27.322142","172.30.1.104","172.30.1.205","TCP","54","49671 > 40814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55734","27.322148","172.30.1.104","172.30.1.205","TCP","54","49671 > 40814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55735","27.322150","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55736","27.322159","172.30.1.104","172.30.1.205","TCP","54","49671 > 40810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55737","27.322160","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55738","27.322162","172.30.1.104","172.30.1.205","TCP","54","49671 > 40806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55739","27.322163","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55740","27.322165","172.30.1.104","172.30.1.205","TCP","54","49671 > 40782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55741","27.322166","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55742","27.322168","172.30.1.104","172.30.1.205","TCP","54","49671 > 40786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55743","27.322169","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55744","27.322440","172.30.1.104","172.30.1.205","TCP","54","49671 > 40818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55745","27.322452","172.30.1.104","172.30.1.205","TCP","54","49671 > 40774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55746","27.322458","172.30.1.104","172.30.1.205","TCP","54","49671 > 40818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55747","27.322462","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55748","27.322469","172.30.1.104","172.30.1.205","TCP","54","49671 > 40774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"55749","27.322471","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"55750","27.322904","172.30.1.205","172.30.1.104","TCP","54","48184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55751","27.323016","172.30.1.205","172.30.1.104","TCP","74","40822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930549 TSecr=0 WS=128" +"55752","27.323336","172.30.1.104","172.30.1.205","TCP","54","135 > 48184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55753","27.323344","172.30.1.104","172.30.1.205","TCP","54","135 > 48184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55754","27.323348","172.30.1.205","172.30.1.104","TCP","54","48184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55755","27.323354","172.30.1.104","172.30.1.205","TCP","66","49671 > 40822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55756","27.323361","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55757","27.323731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55758","27.324029","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55759","27.324037","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55760","27.325952","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55761","27.326322","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55762","27.326328","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55763","27.327681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55764","27.331569","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55765","27.331579","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55766","27.332539","172.30.1.205","172.30.1.104","TCP","74","48188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930558 TSecr=0 WS=128" +"55767","27.332851","172.30.1.104","172.30.1.205","TCP","66","135 > 48188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55768","27.332862","172.30.1.205","172.30.1.104","TCP","54","48188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55769","27.333222","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55770","27.333537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55771","27.333546","172.30.1.205","172.30.1.104","TCP","54","48188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55772","27.335721","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55773","27.336136","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55774","27.336143","172.30.1.205","172.30.1.104","TCP","54","48188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55775","27.337987","172.30.1.205","172.30.1.104","TCP","54","48188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55776","27.338100","172.30.1.205","172.30.1.104","TCP","74","40826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930564 TSecr=0 WS=128" +"55777","27.338283","172.30.1.104","172.30.1.205","TCP","54","135 > 48188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55778","27.338307","172.30.1.104","172.30.1.205","TCP","54","135 > 48188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55779","27.338313","172.30.1.205","172.30.1.104","TCP","54","48188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55780","27.338394","172.30.1.104","172.30.1.205","TCP","66","49671 > 40826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55781","27.338402","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55782","27.338749","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55783","27.339039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55784","27.339048","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55785","27.340960","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55786","27.341324","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55787","27.341330","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55788","27.342683","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55789","27.346629","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55790","27.346640","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55791","27.347612","172.30.1.205","172.30.1.104","TCP","74","48192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930574 TSecr=0 WS=128" +"55792","27.347922","172.30.1.104","172.30.1.205","TCP","66","135 > 48192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55793","27.347932","172.30.1.205","172.30.1.104","TCP","54","48192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55794","27.348287","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55795","27.348569","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55796","27.348578","172.30.1.205","172.30.1.104","TCP","54","48192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55797","27.350820","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55798","27.351215","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55799","27.351223","172.30.1.205","172.30.1.104","TCP","54","48192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55800","27.353094","172.30.1.205","172.30.1.104","TCP","54","48192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55801","27.353210","172.30.1.205","172.30.1.104","TCP","74","40830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930579 TSecr=0 WS=128" +"55802","27.353361","172.30.1.104","172.30.1.205","TCP","54","135 > 48192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55803","27.353408","172.30.1.104","172.30.1.205","TCP","54","135 > 48192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55804","27.353414","172.30.1.205","172.30.1.104","TCP","54","48192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55805","27.353488","172.30.1.104","172.30.1.205","TCP","66","49671 > 40830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55806","27.353496","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55807","27.353844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55808","27.354114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55809","27.354123","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55810","27.356013","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55811","27.356412","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55812","27.356418","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55813","27.357800","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55814","27.361772","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55815","27.361783","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55816","27.362756","172.30.1.205","172.30.1.104","TCP","74","48196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930589 TSecr=0 WS=128" +"55817","27.363071","172.30.1.104","172.30.1.205","TCP","66","135 > 48196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55818","27.363082","172.30.1.205","172.30.1.104","TCP","54","48196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55819","27.363433","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55820","27.363699","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55821","27.363708","172.30.1.205","172.30.1.104","TCP","54","48196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55822","27.365936","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55823","27.366307","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55824","27.366313","172.30.1.205","172.30.1.104","TCP","54","48196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55825","27.368132","172.30.1.205","172.30.1.104","TCP","54","48196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55826","27.368248","172.30.1.205","172.30.1.104","TCP","74","40834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930594 TSecr=0 WS=128" +"55827","27.368400","172.30.1.104","172.30.1.205","TCP","54","135 > 48196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55828","27.368448","172.30.1.104","172.30.1.205","TCP","54","135 > 48196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55829","27.368454","172.30.1.205","172.30.1.104","TCP","54","48196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55830","27.368528","172.30.1.104","172.30.1.205","TCP","66","49671 > 40834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55831","27.368536","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55832","27.368908","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55833","27.369198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55834","27.369207","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55835","27.371098","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55836","27.371506","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55837","27.371512","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55838","27.372921","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55839","27.376900","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55840","27.376911","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55841","27.377879","172.30.1.205","172.30.1.104","TCP","74","48200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930604 TSecr=0 WS=128" +"55842","27.378190","172.30.1.104","172.30.1.205","TCP","66","135 > 48200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55843","27.378201","172.30.1.205","172.30.1.104","TCP","54","48200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55844","27.378561","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55845","27.378854","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55846","27.378863","172.30.1.205","172.30.1.104","TCP","54","48200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55847","27.381072","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55848","27.381472","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55849","27.381479","172.30.1.205","172.30.1.104","TCP","54","48200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55850","27.383295","172.30.1.205","172.30.1.104","TCP","54","48200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55851","27.383407","172.30.1.205","172.30.1.104","TCP","74","40838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930609 TSecr=0 WS=128" +"55852","27.383587","172.30.1.104","172.30.1.205","TCP","54","135 > 48200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55853","27.383610","172.30.1.104","172.30.1.205","TCP","54","135 > 48200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55854","27.383616","172.30.1.205","172.30.1.104","TCP","54","48200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55855","27.383689","172.30.1.104","172.30.1.205","TCP","66","49671 > 40838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55856","27.383697","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55857","27.384044","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55858","27.384323","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55859","27.384332","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55860","27.386242","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55861","27.386635","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55862","27.386642","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55863","27.387992","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55864","27.392408","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55865","27.392419","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55866","27.393403","172.30.1.205","172.30.1.104","TCP","74","48204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930619 TSecr=0 WS=128" +"55867","27.393746","172.30.1.104","172.30.1.205","TCP","66","135 > 48204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55868","27.393758","172.30.1.205","172.30.1.104","TCP","54","48204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55869","27.394111","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55870","27.394403","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55871","27.394413","172.30.1.205","172.30.1.104","TCP","54","48204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55872","27.396596","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55873","27.396967","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55874","27.396974","172.30.1.205","172.30.1.104","TCP","54","48204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55875","27.398795","172.30.1.205","172.30.1.104","TCP","54","48204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55876","27.398908","172.30.1.205","172.30.1.104","TCP","74","40842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930625 TSecr=0 WS=128" +"55877","27.399055","172.30.1.104","172.30.1.205","TCP","54","135 > 48204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55878","27.399100","172.30.1.104","172.30.1.205","TCP","54","135 > 48204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55879","27.399105","172.30.1.205","172.30.1.104","TCP","54","48204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55880","27.399172","172.30.1.104","172.30.1.205","TCP","66","49671 > 40842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55881","27.399189","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55882","27.399539","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55883","27.399825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55884","27.399834","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55885","27.401756","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55886","27.402079","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55887","27.402085","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55888","27.403526","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55889","27.407478","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55890","27.407488","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55891","27.408491","172.30.1.205","172.30.1.104","TCP","74","48208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930634 TSecr=0 WS=128" +"55892","27.408793","172.30.1.104","172.30.1.205","TCP","66","135 > 48208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55893","27.408806","172.30.1.205","172.30.1.104","TCP","54","48208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55894","27.409176","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55895","27.409452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55896","27.409461","172.30.1.205","172.30.1.104","TCP","54","48208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55897","27.411650","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55898","27.412015","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55899","27.412022","172.30.1.205","172.30.1.104","TCP","54","48208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55900","27.413850","172.30.1.205","172.30.1.104","TCP","54","48208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55901","27.413964","172.30.1.205","172.30.1.104","TCP","74","40846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930640 TSecr=0 WS=128" +"55902","27.414117","172.30.1.104","172.30.1.205","TCP","54","135 > 48208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55903","27.414132","172.30.1.104","172.30.1.205","TCP","54","135 > 48208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55904","27.414138","172.30.1.205","172.30.1.104","TCP","54","48208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55905","27.414214","172.30.1.104","172.30.1.205","TCP","66","49671 > 40846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55906","27.414223","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55907","27.414575","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55908","27.414846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55909","27.414855","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55910","27.416745","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55911","27.417142","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55912","27.417149","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55913","27.418514","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55914","27.422448","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55915","27.422458","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55916","27.423412","172.30.1.205","172.30.1.104","TCP","74","48212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930649 TSecr=0 WS=128" +"55917","27.423718","172.30.1.104","172.30.1.205","TCP","66","135 > 48212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55918","27.423729","172.30.1.205","172.30.1.104","TCP","54","48212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55919","27.424078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55920","27.424367","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55921","27.424375","172.30.1.205","172.30.1.104","TCP","54","48212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55922","27.426593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55923","27.426990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55924","27.426997","172.30.1.205","172.30.1.104","TCP","54","48212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55925","27.428814","172.30.1.205","172.30.1.104","TCP","54","48212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55926","27.428922","172.30.1.205","172.30.1.104","TCP","74","40850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930655 TSecr=0 WS=128" +"55927","27.429148","172.30.1.104","172.30.1.205","TCP","54","135 > 48212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55928","27.429178","172.30.1.104","172.30.1.205","TCP","54","135 > 48212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55929","27.429182","172.30.1.205","172.30.1.104","TCP","54","48212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55930","27.429208","172.30.1.104","172.30.1.205","TCP","66","49671 > 40850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55931","27.429217","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55932","27.429559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55933","27.429851","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55934","27.429860","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55935","27.431714","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55936","27.432096","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55937","27.432103","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55938","27.433492","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55939","27.437467","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55940","27.437476","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55941","27.438430","172.30.1.205","172.30.1.104","TCP","74","48216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930664 TSecr=0 WS=128" +"55942","27.438737","172.30.1.104","172.30.1.205","TCP","66","135 > 48216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55943","27.438748","172.30.1.205","172.30.1.104","TCP","54","48216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55944","27.439093","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55945","27.439389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55946","27.439398","172.30.1.205","172.30.1.104","TCP","54","48216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55947","27.441610","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55948","27.441995","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55949","27.442002","172.30.1.205","172.30.1.104","TCP","54","48216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55950","27.443801","172.30.1.205","172.30.1.104","TCP","54","48216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55951","27.443911","172.30.1.205","172.30.1.104","TCP","74","40854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930670 TSecr=0 WS=128" +"55952","27.444065","172.30.1.104","172.30.1.205","TCP","54","135 > 48216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55953","27.444137","172.30.1.104","172.30.1.205","TCP","54","135 > 48216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55954","27.444143","172.30.1.205","172.30.1.104","TCP","54","48216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55955","27.444181","172.30.1.104","172.30.1.205","TCP","66","49671 > 40854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55956","27.444189","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55957","27.444549","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55958","27.444857","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55959","27.444867","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55960","27.446741","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55961","27.447080","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55962","27.447087","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55963","27.448452","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55964","27.452563","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55965","27.452581","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55966","27.453562","172.30.1.205","172.30.1.104","TCP","74","48220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930679 TSecr=0 WS=128" +"55967","27.453877","172.30.1.104","172.30.1.205","TCP","66","135 > 48220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55968","27.453888","172.30.1.205","172.30.1.104","TCP","54","48220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55969","27.454244","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55970","27.454548","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55971","27.454557","172.30.1.205","172.30.1.104","TCP","54","48220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55972","27.456731","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55973","27.457097","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55974","27.457103","172.30.1.205","172.30.1.104","TCP","54","48220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55975","27.458916","172.30.1.205","172.30.1.104","TCP","54","48220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"55976","27.459027","172.30.1.205","172.30.1.104","TCP","74","40858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930685 TSecr=0 WS=128" +"55977","27.459174","172.30.1.104","172.30.1.205","TCP","54","135 > 48220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55978","27.459185","172.30.1.104","172.30.1.205","TCP","54","135 > 48220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"55979","27.459190","172.30.1.205","172.30.1.104","TCP","54","48220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"55980","27.459292","172.30.1.104","172.30.1.205","TCP","66","49671 > 40858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55981","27.459300","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55982","27.459646","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"55983","27.459913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55984","27.459921","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55985","27.461831","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"55986","27.462181","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"55987","27.462187","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"55988","27.463530","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"55989","27.467475","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"55990","27.467484","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"55991","27.468428","172.30.1.205","172.30.1.104","TCP","74","48224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930694 TSecr=0 WS=128" +"55992","27.468772","172.30.1.104","172.30.1.205","TCP","66","135 > 48224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"55993","27.468792","172.30.1.205","172.30.1.104","TCP","54","48224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"55994","27.469172","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"55995","27.469471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"55996","27.469480","172.30.1.205","172.30.1.104","TCP","54","48224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"55997","27.471700","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"55998","27.472070","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"55999","27.472077","172.30.1.205","172.30.1.104","TCP","54","48224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56000","27.473905","172.30.1.205","172.30.1.104","TCP","54","48224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56001","27.474018","172.30.1.205","172.30.1.104","TCP","74","40862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930700 TSecr=0 WS=128" +"56002","27.474193","172.30.1.104","172.30.1.205","TCP","54","135 > 48224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56003","27.474221","172.30.1.104","172.30.1.205","TCP","54","135 > 48224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56004","27.474227","172.30.1.205","172.30.1.104","TCP","54","48224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56005","27.474307","172.30.1.104","172.30.1.205","TCP","66","49671 > 40862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56006","27.474315","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56007","27.474669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56008","27.474964","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56009","27.474973","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56010","27.476865","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56011","27.477227","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56012","27.477233","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56013","27.478605","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56014","27.483903","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56015","27.483912","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56016","27.484875","172.30.1.205","172.30.1.104","TCP","74","48228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930711 TSecr=0 WS=128" +"56017","27.485259","172.30.1.104","172.30.1.205","TCP","66","135 > 48228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56018","27.485271","172.30.1.205","172.30.1.104","TCP","54","48228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56019","27.485632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56020","27.485927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56021","27.485936","172.30.1.205","172.30.1.104","TCP","54","48228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56022","27.488125","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56023","27.488504","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56024","27.488511","172.30.1.205","172.30.1.104","TCP","54","48228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56025","27.490334","172.30.1.205","172.30.1.104","TCP","54","48228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56026","27.490450","172.30.1.205","172.30.1.104","TCP","74","40866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930716 TSecr=0 WS=128" +"56027","27.490611","172.30.1.104","172.30.1.205","TCP","54","135 > 48228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56028","27.490655","172.30.1.104","172.30.1.205","TCP","54","135 > 48228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56029","27.490661","172.30.1.205","172.30.1.104","TCP","54","48228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56030","27.490781","172.30.1.104","172.30.1.205","TCP","66","49671 > 40866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56031","27.490789","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56032","27.491136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56033","27.491430","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56034","27.491442","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56035","27.493375","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56036","27.494945","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56037","27.494953","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56038","27.496344","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56039","27.500402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56040","27.500412","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56041","27.501377","172.30.1.205","172.30.1.104","TCP","74","48232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930727 TSecr=0 WS=128" +"56042","27.501672","172.30.1.104","172.30.1.205","TCP","66","135 > 48232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56043","27.501684","172.30.1.205","172.30.1.104","TCP","54","48232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56044","27.502052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56045","27.502346","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56046","27.502355","172.30.1.205","172.30.1.104","TCP","54","48232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56047","27.504524","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56048","27.504915","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56049","27.504922","172.30.1.205","172.30.1.104","TCP","54","48232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56050","27.505774","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56051","27.505822","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56052","27.505859","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56053","27.505889","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56054","27.505916","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56055","27.505945","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56056","27.505973","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56057","27.506006","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56058","27.506033","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56059","27.506060","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56060","27.506083","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56061","27.506108","172.30.1.104","172.30.1.205","TCP","54","49671 > 40826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56062","27.506130","172.30.1.104","172.30.1.205","TCP","54","49671 > 40830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56063","27.506157","172.30.1.104","172.30.1.205","TCP","54","49671 > 40834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56064","27.506184","172.30.1.104","172.30.1.205","TCP","54","49671 > 40838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56065","27.506203","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56066","27.506285","172.30.1.104","172.30.1.205","TCP","54","49671 > 40826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56067","27.506293","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56068","27.506309","172.30.1.104","172.30.1.205","TCP","54","49671 > 40842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56069","27.506339","172.30.1.104","172.30.1.205","TCP","54","49671 > 40842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56070","27.506344","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56071","27.506364","172.30.1.104","172.30.1.205","TCP","54","49671 > 40838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56072","27.506367","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56073","27.506393","172.30.1.104","172.30.1.205","TCP","54","49671 > 40830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56074","27.506395","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56075","27.506418","172.30.1.104","172.30.1.205","TCP","54","49671 > 40834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56076","27.506421","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56077","27.506446","172.30.1.104","172.30.1.205","TCP","54","49671 > 40846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56078","27.506472","172.30.1.104","172.30.1.205","TCP","54","49671 > 40850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56079","27.506498","172.30.1.104","172.30.1.205","TCP","54","49671 > 40854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56080","27.506524","172.30.1.104","172.30.1.205","TCP","54","49671 > 40846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56081","27.506529","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56082","27.506551","172.30.1.104","172.30.1.205","TCP","54","49671 > 40858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56083","27.506577","172.30.1.104","172.30.1.205","TCP","54","49671 > 40858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56084","27.506581","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56085","27.506603","172.30.1.104","172.30.1.205","TCP","54","49671 > 40850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56086","27.506606","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56087","27.506629","172.30.1.104","172.30.1.205","TCP","54","49671 > 40854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56088","27.506633","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56089","27.506667","172.30.1.104","172.30.1.205","TCP","54","49671 > 40862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56090","27.506684","172.30.1.104","172.30.1.205","TCP","54","49671 > 40866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56091","27.506705","172.30.1.104","172.30.1.205","TCP","54","49671 > 40822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56092","27.506726","172.30.1.104","172.30.1.205","TCP","54","49671 > 40862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56093","27.506730","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56094","27.506747","172.30.1.104","172.30.1.205","TCP","54","49671 > 40866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56095","27.506750","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56096","27.506767","172.30.1.104","172.30.1.205","TCP","54","49671 > 40822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56097","27.506769","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56098","27.507741","172.30.1.205","172.30.1.104","TCP","54","48232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56099","27.507857","172.30.1.205","172.30.1.104","TCP","74","40870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930734 TSecr=0 WS=128" +"56100","27.508009","172.30.1.104","172.30.1.205","TCP","54","135 > 48232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56101","27.508043","172.30.1.104","172.30.1.205","TCP","54","135 > 48232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56102","27.508048","172.30.1.205","172.30.1.104","TCP","54","48232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56103","27.508142","172.30.1.104","172.30.1.205","TCP","66","49671 > 40870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56104","27.508150","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56105","27.508504","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56106","27.508792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56107","27.508802","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56108","27.510714","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56109","27.511074","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56110","27.511080","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56111","27.512428","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56112","27.516450","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56113","27.516468","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56114","27.517542","172.30.1.205","172.30.1.104","TCP","74","48236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930743 TSecr=0 WS=128" +"56115","27.518392","172.30.1.104","172.30.1.205","TCP","66","135 > 48236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56116","27.518404","172.30.1.205","172.30.1.104","TCP","54","48236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56117","27.518760","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56118","27.519055","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56119","27.519063","172.30.1.205","172.30.1.104","TCP","54","48236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56120","27.521258","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56121","27.521645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56122","27.521653","172.30.1.205","172.30.1.104","TCP","54","48236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56123","27.523475","172.30.1.205","172.30.1.104","TCP","54","48236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56124","27.523586","172.30.1.205","172.30.1.104","TCP","74","40874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930750 TSecr=0 WS=128" +"56125","27.523732","172.30.1.104","172.30.1.205","TCP","54","135 > 48236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56126","27.523753","172.30.1.104","172.30.1.205","TCP","54","135 > 48236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56127","27.523759","172.30.1.205","172.30.1.104","TCP","54","48236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56128","27.523889","172.30.1.104","172.30.1.205","TCP","66","49671 > 40874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56129","27.523898","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56130","27.524241","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56131","27.524537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56132","27.524554","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56133","27.526668","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56134","27.527037","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56135","27.527044","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56136","27.528420","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56137","27.532367","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56138","27.532376","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56139","27.533358","172.30.1.205","172.30.1.104","TCP","74","48240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930759 TSecr=0 WS=128" +"56140","27.533673","172.30.1.104","172.30.1.205","TCP","66","135 > 48240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56141","27.533685","172.30.1.205","172.30.1.104","TCP","54","48240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56142","27.534045","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56143","27.534344","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56144","27.534358","172.30.1.205","172.30.1.104","TCP","54","48240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56145","27.536632","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56146","27.537010","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56147","27.537016","172.30.1.205","172.30.1.104","TCP","54","48240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56148","27.538840","172.30.1.205","172.30.1.104","TCP","54","48240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56149","27.538960","172.30.1.205","172.30.1.104","TCP","74","40878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930765 TSecr=0 WS=128" +"56150","27.539129","172.30.1.104","172.30.1.205","TCP","54","135 > 48240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56151","27.539145","172.30.1.104","172.30.1.205","TCP","54","135 > 48240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56152","27.539150","172.30.1.205","172.30.1.104","TCP","54","48240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56153","27.539252","172.30.1.104","172.30.1.205","TCP","66","49671 > 40878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56154","27.539260","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56155","27.539605","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56156","27.539906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56157","27.539923","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56158","27.542081","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56159","27.542443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56160","27.542449","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56161","27.543871","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56162","27.547941","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56163","27.547961","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56164","27.549178","172.30.1.205","172.30.1.104","TCP","74","48244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930775 TSecr=0 WS=128" +"56165","27.549472","172.30.1.104","172.30.1.205","TCP","66","135 > 48244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56166","27.549483","172.30.1.205","172.30.1.104","TCP","54","48244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56167","27.549834","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56168","27.550106","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56169","27.550115","172.30.1.205","172.30.1.104","TCP","54","48244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56170","27.552308","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56171","27.552696","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56172","27.552703","172.30.1.205","172.30.1.104","TCP","54","48244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56173","27.554538","172.30.1.205","172.30.1.104","TCP","54","48244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56174","27.554647","172.30.1.205","172.30.1.104","TCP","74","40882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930781 TSecr=0 WS=128" +"56175","27.554792","172.30.1.104","172.30.1.205","TCP","54","135 > 48244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56176","27.554806","172.30.1.104","172.30.1.205","TCP","54","135 > 48244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56177","27.554811","172.30.1.205","172.30.1.104","TCP","54","48244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56178","27.554964","172.30.1.104","172.30.1.205","TCP","66","49671 > 40882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56179","27.554972","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56180","27.555315","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56181","27.555602","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56182","27.555614","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56183","27.557815","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56184","27.558172","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56185","27.558178","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56186","27.559518","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56187","27.563511","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56188","27.563522","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56189","27.564474","172.30.1.205","172.30.1.104","TCP","74","48248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930790 TSecr=0 WS=128" +"56190","27.564769","172.30.1.104","172.30.1.205","TCP","66","135 > 48248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56191","27.564789","172.30.1.205","172.30.1.104","TCP","54","48248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56192","27.565150","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56193","27.565987","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56194","27.565998","172.30.1.205","172.30.1.104","TCP","54","48248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56195","27.568188","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56196","27.568571","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56197","27.568578","172.30.1.205","172.30.1.104","TCP","54","48248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56198","27.570422","172.30.1.205","172.30.1.104","TCP","54","48248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56199","27.570530","172.30.1.205","172.30.1.104","TCP","74","40886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930796 TSecr=0 WS=128" +"56200","27.570695","172.30.1.104","172.30.1.205","TCP","54","135 > 48248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56201","27.570733","172.30.1.104","172.30.1.205","TCP","54","135 > 48248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56202","27.570738","172.30.1.205","172.30.1.104","TCP","54","48248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56203","27.570814","172.30.1.104","172.30.1.205","TCP","66","49671 > 40886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56204","27.570822","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56205","27.571164","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56206","27.571445","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56207","27.571454","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56208","27.573406","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56209","27.574868","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56210","27.574872","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56211","27.576208","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56212","27.580191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56213","27.580208","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56214","27.581236","172.30.1.205","172.30.1.104","TCP","74","48252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930807 TSecr=0 WS=128" +"56215","27.581560","172.30.1.104","172.30.1.205","TCP","66","135 > 48252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56216","27.581571","172.30.1.205","172.30.1.104","TCP","54","48252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56217","27.581926","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56218","27.582228","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56219","27.582237","172.30.1.205","172.30.1.104","TCP","54","48252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56220","27.584427","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56221","27.584827","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56222","27.584833","172.30.1.205","172.30.1.104","TCP","54","48252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56223","27.586654","172.30.1.205","172.30.1.104","TCP","54","48252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56224","27.586764","172.30.1.205","172.30.1.104","TCP","74","40890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930813 TSecr=0 WS=128" +"56225","27.586960","172.30.1.104","172.30.1.205","TCP","54","135 > 48252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56226","27.586971","172.30.1.104","172.30.1.205","TCP","54","135 > 48252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56227","27.586976","172.30.1.205","172.30.1.104","TCP","54","48252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56228","27.587055","172.30.1.104","172.30.1.205","TCP","66","49671 > 40890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56229","27.587063","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56230","27.587406","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56231","27.588691","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56232","27.588700","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56233","27.590606","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56234","27.590989","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56235","27.591001","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56236","27.592351","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56237","27.596374","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56238","27.596384","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56239","27.597352","172.30.1.205","172.30.1.104","TCP","74","48256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930823 TSecr=0 WS=128" +"56240","27.597705","172.30.1.104","172.30.1.205","TCP","66","135 > 48256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56241","27.597716","172.30.1.205","172.30.1.104","TCP","54","48256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56242","27.598065","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56243","27.598340","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56244","27.598349","172.30.1.205","172.30.1.104","TCP","54","48256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56245","27.600532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56246","27.600920","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56247","27.600927","172.30.1.205","172.30.1.104","TCP","54","48256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56248","27.602739","172.30.1.205","172.30.1.104","TCP","54","48256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56249","27.602850","172.30.1.205","172.30.1.104","TCP","74","40894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930829 TSecr=0 WS=128" +"56250","27.603036","172.30.1.104","172.30.1.205","TCP","54","135 > 48256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56251","27.603045","172.30.1.104","172.30.1.205","TCP","54","135 > 48256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56252","27.603050","172.30.1.205","172.30.1.104","TCP","54","48256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56253","27.603134","172.30.1.104","172.30.1.205","TCP","66","49671 > 40894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56254","27.603142","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56255","27.603499","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56256","27.603802","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56257","27.603812","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56258","27.605727","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56259","27.606618","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56260","27.606622","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56261","27.607972","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56262","27.611975","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56263","27.611985","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56264","27.612950","172.30.1.205","172.30.1.104","TCP","74","48260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930839 TSecr=0 WS=128" +"56265","27.613235","172.30.1.104","172.30.1.205","TCP","66","135 > 48260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56266","27.613246","172.30.1.205","172.30.1.104","TCP","54","48260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56267","27.613602","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56268","27.613921","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56269","27.613936","172.30.1.205","172.30.1.104","TCP","54","48260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56270","27.616230","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56271","27.616634","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56272","27.616642","172.30.1.205","172.30.1.104","TCP","54","48260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56273","27.618488","172.30.1.205","172.30.1.104","TCP","54","48260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56274","27.618609","172.30.1.205","172.30.1.104","TCP","74","40898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930845 TSecr=0 WS=128" +"56275","27.618767","172.30.1.104","172.30.1.205","TCP","54","135 > 48260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56276","27.618812","172.30.1.104","172.30.1.205","TCP","54","135 > 48260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56277","27.618818","172.30.1.205","172.30.1.104","TCP","54","48260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56278","27.618920","172.30.1.104","172.30.1.205","TCP","66","49671 > 40898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56279","27.618929","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56280","27.619275","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56281","27.619629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56282","27.619644","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56283","27.621668","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56284","27.622035","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56285","27.622042","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56286","27.623452","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56287","27.627452","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56288","27.627462","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56289","27.628422","172.30.1.205","172.30.1.104","TCP","74","48264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930854 TSecr=0 WS=128" +"56290","27.628745","172.30.1.104","172.30.1.205","TCP","66","135 > 48264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56291","27.628757","172.30.1.205","172.30.1.104","TCP","54","48264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56292","27.629135","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56293","27.629431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56294","27.629441","172.30.1.205","172.30.1.104","TCP","54","48264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56295","27.631654","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56296","27.632046","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56297","27.632053","172.30.1.205","172.30.1.104","TCP","54","48264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56298","27.633895","172.30.1.205","172.30.1.104","TCP","54","48264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56299","27.634007","172.30.1.205","172.30.1.104","TCP","74","40902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930860 TSecr=0 WS=128" +"56300","27.634172","172.30.1.104","172.30.1.205","TCP","54","135 > 48264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56301","27.634202","172.30.1.104","172.30.1.205","TCP","54","135 > 48264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56302","27.634209","172.30.1.205","172.30.1.104","TCP","54","48264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56303","27.634290","172.30.1.104","172.30.1.205","TCP","66","49671 > 40902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56304","27.634298","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56305","27.634646","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56306","27.636209","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56307","27.636216","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56308","27.638116","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56309","27.638493","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56310","27.638500","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56311","27.639860","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56312","27.643982","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56313","27.643994","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56314","27.644974","172.30.1.205","172.30.1.104","TCP","74","48268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930871 TSecr=0 WS=128" +"56315","27.645306","172.30.1.104","172.30.1.205","TCP","66","135 > 48268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56316","27.645317","172.30.1.205","172.30.1.104","TCP","54","48268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56317","27.645675","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56318","27.645991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56319","27.645999","172.30.1.205","172.30.1.104","TCP","54","48268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56320","27.648205","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56321","27.648606","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56322","27.648612","172.30.1.205","172.30.1.104","TCP","54","48268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56323","27.650495","172.30.1.205","172.30.1.104","TCP","54","48268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56324","27.650609","172.30.1.205","172.30.1.104","TCP","74","40906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930877 TSecr=0 WS=128" +"56325","27.650771","172.30.1.104","172.30.1.205","TCP","54","135 > 48268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56326","27.650793","172.30.1.104","172.30.1.205","TCP","54","135 > 48268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56327","27.650799","172.30.1.205","172.30.1.104","TCP","54","48268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56328","27.650881","172.30.1.104","172.30.1.205","TCP","66","49671 > 40906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56329","27.650889","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56330","27.651237","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56331","27.651558","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56332","27.651567","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56333","27.653501","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56334","27.653871","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56335","27.653877","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56336","27.655261","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56337","27.659514","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56338","27.659525","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56339","27.660496","172.30.1.205","172.30.1.104","TCP","74","48272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930886 TSecr=0 WS=128" +"56340","27.660820","172.30.1.104","172.30.1.205","TCP","66","135 > 48272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56341","27.660831","172.30.1.205","172.30.1.104","TCP","54","48272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56342","27.661221","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56343","27.661507","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56344","27.661516","172.30.1.205","172.30.1.104","TCP","54","48272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56345","27.663746","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56346","27.664142","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56347","27.664149","172.30.1.205","172.30.1.104","TCP","54","48272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56348","27.665971","172.30.1.205","172.30.1.104","TCP","54","48272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56349","27.666086","172.30.1.205","172.30.1.104","TCP","74","40910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930892 TSecr=0 WS=128" +"56350","27.666242","172.30.1.104","172.30.1.205","TCP","54","135 > 48272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56351","27.666274","172.30.1.104","172.30.1.205","TCP","54","135 > 48272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56352","27.666280","172.30.1.205","172.30.1.104","TCP","54","48272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56353","27.666372","172.30.1.104","172.30.1.205","TCP","66","49671 > 40910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56354","27.666381","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56355","27.666739","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56356","27.667027","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56357","27.667035","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56358","27.668982","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56359","27.669354","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56360","27.669360","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56361","27.670711","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56362","27.674776","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56363","27.674787","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56364","27.675755","172.30.1.205","172.30.1.104","TCP","74","48276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930902 TSecr=0 WS=128" +"56365","27.676072","172.30.1.104","172.30.1.205","TCP","66","135 > 48276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56366","27.676083","172.30.1.205","172.30.1.104","TCP","54","48276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56367","27.676432","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56368","27.676734","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56369","27.676744","172.30.1.205","172.30.1.104","TCP","54","48276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56370","27.678949","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56371","27.679341","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56372","27.679347","172.30.1.205","172.30.1.104","TCP","54","48276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56373","27.681205","172.30.1.205","172.30.1.104","TCP","54","48276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56374","27.681315","172.30.1.205","172.30.1.104","TCP","74","40914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930907 TSecr=0 WS=128" +"56375","27.681494","172.30.1.104","172.30.1.205","TCP","54","135 > 48276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56376","27.681546","172.30.1.104","172.30.1.205","TCP","54","135 > 48276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56377","27.681551","172.30.1.205","172.30.1.104","TCP","54","48276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56378","27.681697","172.30.1.104","172.30.1.205","TCP","66","49671 > 40914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56379","27.681705","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56380","27.682055","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56381","27.682405","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56382","27.682413","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56383","27.684271","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56384","27.684652","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56385","27.684658","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56386","27.686022","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56387","27.690202","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56388","27.690212","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56389","27.691151","172.30.1.205","172.30.1.104","TCP","74","48280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930917 TSecr=0 WS=128" +"56390","27.691464","172.30.1.104","172.30.1.205","TCP","66","135 > 48280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56391","27.691475","172.30.1.205","172.30.1.104","TCP","54","48280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56392","27.691828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56393","27.692136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56394","27.692145","172.30.1.205","172.30.1.104","TCP","54","48280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56395","27.694350","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56396","27.694814","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56397","27.694821","172.30.1.205","172.30.1.104","TCP","54","48280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56398","27.695673","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56399","27.695721","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56400","27.695759","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56401","27.695792","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56402","27.695824","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56403","27.695852","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56404","27.695879","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56405","27.695909","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56406","27.695937","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56407","27.695963","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56408","27.695993","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56409","27.696062","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56410","27.696299","172.30.1.104","172.30.1.205","TCP","54","49671 > 40874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56411","27.696316","172.30.1.104","172.30.1.205","TCP","54","49671 > 40874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56412","27.696322","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56413","27.696346","172.30.1.104","172.30.1.205","TCP","54","49671 > 40878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56414","27.696371","172.30.1.104","172.30.1.205","TCP","54","49671 > 40882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56415","27.696391","172.30.1.104","172.30.1.205","TCP","54","49671 > 40886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56416","27.696441","172.30.1.104","172.30.1.205","TCP","54","49671 > 40878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56417","27.696447","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56418","27.696459","172.30.1.104","172.30.1.205","TCP","54","49671 > 40890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56419","27.696483","172.30.1.104","172.30.1.205","TCP","54","49671 > 40890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56420","27.696488","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56421","27.696502","172.30.1.104","172.30.1.205","TCP","54","49671 > 40894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56422","27.696522","172.30.1.104","172.30.1.205","TCP","54","49671 > 40894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56423","27.696527","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56424","27.696543","172.30.1.104","172.30.1.205","TCP","54","49671 > 40898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56425","27.696563","172.30.1.104","172.30.1.205","TCP","54","49671 > 40902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56426","27.696583","172.30.1.104","172.30.1.205","TCP","54","49671 > 40882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56427","27.696587","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56428","27.696611","172.30.1.104","172.30.1.205","TCP","54","49671 > 40906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56429","27.696632","172.30.1.104","172.30.1.205","TCP","54","49671 > 40902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56430","27.696635","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56431","27.696743","172.30.1.104","172.30.1.205","TCP","54","49671 > 40910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56432","27.696762","172.30.1.104","172.30.1.205","TCP","54","49671 > 40898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56433","27.696766","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56434","27.696788","172.30.1.104","172.30.1.205","TCP","54","49671 > 40910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56435","27.696791","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56436","27.696811","172.30.1.104","172.30.1.205","TCP","54","49671 > 40914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56437","27.697079","172.30.1.104","172.30.1.205","TCP","54","49671 > 40870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56438","27.697098","172.30.1.104","172.30.1.205","TCP","54","49671 > 40906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56439","27.697102","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56440","27.697126","172.30.1.104","172.30.1.205","TCP","54","49671 > 40870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56441","27.697129","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56442","27.697152","172.30.1.104","172.30.1.205","TCP","54","49671 > 40914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56443","27.697155","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56444","27.697172","172.30.1.104","172.30.1.205","TCP","54","49671 > 40886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56445","27.697174","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56446","27.697702","172.30.1.205","172.30.1.104","TCP","54","48280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56447","27.697813","172.30.1.205","172.30.1.104","TCP","74","40918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930924 TSecr=0 WS=128" +"56448","27.697964","172.30.1.104","172.30.1.205","TCP","54","135 > 48280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56449","27.697999","172.30.1.104","172.30.1.205","TCP","54","135 > 48280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56450","27.698005","172.30.1.205","172.30.1.104","TCP","54","48280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56451","27.698117","172.30.1.104","172.30.1.205","TCP","66","49671 > 40918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56452","27.698131","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56453","27.698489","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56454","27.698828","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56455","27.698837","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56456","27.700724","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56457","27.701125","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56458","27.701131","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56459","27.702491","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56460","27.706553","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56461","27.706562","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56462","27.707526","172.30.1.205","172.30.1.104","TCP","74","48284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930933 TSecr=0 WS=128" +"56463","27.707810","172.30.1.104","172.30.1.205","TCP","66","135 > 48284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56464","27.707820","172.30.1.205","172.30.1.104","TCP","54","48284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56465","27.708173","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56466","27.708462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56467","27.708471","172.30.1.205","172.30.1.104","TCP","54","48284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56468","27.710684","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56469","27.711098","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56470","27.711105","172.30.1.205","172.30.1.104","TCP","54","48284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56471","27.712941","172.30.1.205","172.30.1.104","TCP","54","48284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56472","27.713058","172.30.1.205","172.30.1.104","TCP","74","40922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930939 TSecr=0 WS=128" +"56473","27.713219","172.30.1.104","172.30.1.205","TCP","54","135 > 48284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56474","27.713291","172.30.1.104","172.30.1.205","TCP","54","135 > 48284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56475","27.713298","172.30.1.205","172.30.1.104","TCP","54","48284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56476","27.713371","172.30.1.104","172.30.1.205","TCP","66","49671 > 40922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56477","27.713380","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56478","27.713725","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56479","27.715071","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56480","27.715080","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56481","27.717000","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56482","27.717374","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56483","27.717381","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56484","27.718736","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56485","27.722764","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56486","27.722774","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56487","27.723759","172.30.1.205","172.30.1.104","TCP","74","48288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930950 TSecr=0 WS=128" +"56488","27.724098","172.30.1.104","172.30.1.205","TCP","66","135 > 48288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56489","27.724116","172.30.1.205","172.30.1.104","TCP","54","48288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56490","27.724525","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56491","27.724837","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56492","27.724848","172.30.1.205","172.30.1.104","TCP","54","48288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56493","27.727115","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56494","27.727487","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56495","27.727494","172.30.1.205","172.30.1.104","TCP","54","48288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56496","27.729353","172.30.1.205","172.30.1.104","TCP","54","48288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56497","27.729469","172.30.1.205","172.30.1.104","TCP","74","40926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930955 TSecr=0 WS=128" +"56498","27.729608","172.30.1.104","172.30.1.205","TCP","54","135 > 48288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56499","27.729634","172.30.1.104","172.30.1.205","TCP","54","135 > 48288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56500","27.729641","172.30.1.205","172.30.1.104","TCP","54","48288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56501","27.729752","172.30.1.104","172.30.1.205","TCP","66","49671 > 40926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56502","27.729761","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56503","27.730109","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56504","27.730399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56505","27.730408","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56506","27.732309","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56507","27.732737","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56508","27.732743","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56509","27.734139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56510","27.738140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56511","27.738151","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56512","27.739154","172.30.1.205","172.30.1.104","TCP","74","48292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930965 TSecr=0 WS=128" +"56513","27.739447","172.30.1.104","172.30.1.205","TCP","66","135 > 48292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56514","27.739459","172.30.1.205","172.30.1.104","TCP","54","48292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56515","27.739819","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56516","27.740110","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56517","27.740119","172.30.1.205","172.30.1.104","TCP","54","48292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56518","27.742378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56519","27.742784","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56520","27.742791","172.30.1.205","172.30.1.104","TCP","54","48292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56521","27.751434","172.30.1.205","172.30.1.104","TCP","54","48292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56522","27.751619","172.30.1.205","172.30.1.104","TCP","74","40930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930978 TSecr=0 WS=128" +"56523","27.751781","172.30.1.104","172.30.1.205","TCP","54","135 > 48292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56524","27.751795","172.30.1.104","172.30.1.205","TCP","54","135 > 48292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56525","27.751803","172.30.1.205","172.30.1.104","TCP","54","48292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56526","27.751914","172.30.1.104","172.30.1.205","TCP","66","49671 > 40930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56527","27.751926","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56528","27.752339","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56529","27.752625","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56530","27.752637","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56531","27.754638","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56532","27.755066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56533","27.755073","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56534","27.757679","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56535","27.761778","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56536","27.761790","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56537","27.762764","172.30.1.205","172.30.1.104","TCP","74","48296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930989 TSecr=0 WS=128" +"56538","27.763152","172.30.1.104","172.30.1.205","TCP","66","135 > 48296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56539","27.763166","172.30.1.205","172.30.1.104","TCP","54","48296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56540","27.763543","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56541","27.763834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56542","27.763845","172.30.1.205","172.30.1.104","TCP","54","48296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56543","27.766156","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56544","27.766564","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56545","27.766572","172.30.1.205","172.30.1.104","TCP","54","48296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56546","27.770865","172.30.1.205","172.30.1.104","TCP","54","48296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56547","27.771000","172.30.1.205","172.30.1.104","TCP","74","40934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930997 TSecr=0 WS=128" +"56548","27.771174","172.30.1.104","172.30.1.205","TCP","54","135 > 48296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56549","27.771206","172.30.1.104","172.30.1.205","TCP","54","135 > 48296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56550","27.771214","172.30.1.205","172.30.1.104","TCP","54","48296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56551","27.771281","172.30.1.104","172.30.1.205","TCP","66","49671 > 40934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56552","27.771293","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56553","27.771942","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56554","27.772266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56555","27.772277","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56556","27.774446","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56557","27.774825","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56558","27.774832","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56559","27.777799","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56560","27.782204","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56561","27.782214","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56562","27.783161","172.30.1.205","172.30.1.104","TCP","74","48300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931009 TSecr=0 WS=128" +"56563","27.783474","172.30.1.104","172.30.1.205","TCP","66","135 > 48300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56564","27.783487","172.30.1.205","172.30.1.104","TCP","54","48300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56565","27.783879","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56566","27.784182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56567","27.784191","172.30.1.205","172.30.1.104","TCP","54","48300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56568","27.786543","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56569","27.786935","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56570","27.786943","172.30.1.205","172.30.1.104","TCP","54","48300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56571","27.790719","172.30.1.205","172.30.1.104","TCP","54","48300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56572","27.790848","172.30.1.205","172.30.1.104","TCP","74","40938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931017 TSecr=0 WS=128" +"56573","27.791013","172.30.1.104","172.30.1.205","TCP","54","135 > 48300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56574","27.791044","172.30.1.104","172.30.1.205","TCP","54","135 > 48300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56575","27.791052","172.30.1.205","172.30.1.104","TCP","54","48300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56576","27.791121","172.30.1.104","172.30.1.205","TCP","66","49671 > 40938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56577","27.791132","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56578","27.792254","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56579","27.792574","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56580","27.792593","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56581","27.794818","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56582","27.795263","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56583","27.795270","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56584","27.797770","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56585","27.801782","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56586","27.801793","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56587","27.802799","172.30.1.205","172.30.1.104","TCP","74","48304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931029 TSecr=0 WS=128" +"56588","27.803127","172.30.1.104","172.30.1.205","TCP","66","135 > 48304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56589","27.803139","172.30.1.205","172.30.1.104","TCP","54","48304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56590","27.803510","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56591","27.803817","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56592","27.803828","172.30.1.205","172.30.1.104","TCP","54","48304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56593","27.806563","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56594","27.806957","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56595","27.806965","172.30.1.205","172.30.1.104","TCP","54","48304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56596","27.809329","172.30.1.205","172.30.1.104","TCP","54","48304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56597","27.809452","172.30.1.205","172.30.1.104","TCP","74","40942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931035 TSecr=0 WS=128" +"56598","27.809625","172.30.1.104","172.30.1.205","TCP","54","135 > 48304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56599","27.809657","172.30.1.104","172.30.1.205","TCP","54","135 > 48304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56600","27.809663","172.30.1.205","172.30.1.104","TCP","54","48304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56601","27.809744","172.30.1.104","172.30.1.205","TCP","66","49671 > 40942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56602","27.809755","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56603","27.810236","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56604","27.810527","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56605","27.810536","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56606","27.813043","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56607","27.813474","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56608","27.813481","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56609","27.815088","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56610","27.819142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56611","27.819153","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56612","27.824699","172.30.1.205","172.30.1.104","TCP","74","48308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931051 TSecr=0 WS=128" +"56613","27.824995","172.30.1.104","172.30.1.205","TCP","66","135 > 48308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56614","27.825008","172.30.1.205","172.30.1.104","TCP","54","48308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56615","27.825385","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56616","27.825752","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56617","27.825761","172.30.1.205","172.30.1.104","TCP","54","48308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56618","27.827981","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56619","27.828465","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56620","27.828472","172.30.1.205","172.30.1.104","TCP","54","48308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56621","27.830543","172.30.1.205","172.30.1.104","TCP","54","48308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56622","27.830661","172.30.1.205","172.30.1.104","TCP","74","40946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931057 TSecr=0 WS=128" +"56623","27.830820","172.30.1.104","172.30.1.205","TCP","54","135 > 48308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56624","27.830837","172.30.1.104","172.30.1.205","TCP","54","135 > 48308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56625","27.830843","172.30.1.205","172.30.1.104","TCP","54","48308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56626","27.830912","172.30.1.104","172.30.1.205","TCP","66","49671 > 40946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56627","27.830921","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56628","27.831266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56629","27.831532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56630","27.831541","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56631","27.833450","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56632","27.833815","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56633","27.833821","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56634","27.835190","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56635","27.839225","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56636","27.839236","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56637","27.841806","172.30.1.205","172.30.1.104","TCP","74","48312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931068 TSecr=0 WS=128" +"56638","27.842134","172.30.1.104","172.30.1.205","TCP","66","135 > 48312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56639","27.842147","172.30.1.205","172.30.1.104","TCP","54","48312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56640","27.843314","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56641","27.843701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56642","27.843711","172.30.1.205","172.30.1.104","TCP","54","48312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56643","27.846244","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56644","27.846624","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56645","27.846633","172.30.1.205","172.30.1.104","TCP","54","48312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56646","27.851779","172.30.1.205","172.30.1.104","TCP","54","48312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56647","27.851906","172.30.1.205","172.30.1.104","TCP","74","40950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931078 TSecr=0 WS=128" +"56648","27.852058","172.30.1.104","172.30.1.205","TCP","54","135 > 48312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56649","27.852106","172.30.1.104","172.30.1.205","TCP","54","135 > 48312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56650","27.852114","172.30.1.205","172.30.1.104","TCP","54","48312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56651","27.852180","172.30.1.104","172.30.1.205","TCP","66","49671 > 40950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56652","27.852189","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56653","27.853125","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56654","27.853414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56655","27.853425","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56656","27.855577","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56657","27.855931","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56658","27.855939","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56659","27.858687","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56660","27.862785","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56661","27.862797","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56662","27.863757","172.30.1.205","172.30.1.104","TCP","74","48316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931090 TSecr=0 WS=128" +"56663","27.864071","172.30.1.104","172.30.1.205","TCP","66","135 > 48316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56664","27.864084","172.30.1.205","172.30.1.104","TCP","54","48316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56665","27.864456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56666","27.864766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56667","27.864789","172.30.1.205","172.30.1.104","TCP","54","48316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56668","27.867046","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56669","27.867444","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56670","27.867452","172.30.1.205","172.30.1.104","TCP","54","48316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56671","27.870265","172.30.1.205","172.30.1.104","TCP","54","48316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56672","27.870388","172.30.1.205","172.30.1.104","TCP","74","40954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931096 TSecr=0 WS=128" +"56673","27.870579","172.30.1.104","172.30.1.205","TCP","54","135 > 48316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56674","27.870593","172.30.1.104","172.30.1.205","TCP","54","135 > 48316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56675","27.870601","172.30.1.205","172.30.1.104","TCP","54","48316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56676","27.870676","172.30.1.104","172.30.1.205","TCP","66","49671 > 40954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56677","27.870688","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56678","27.871099","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56679","27.871480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56680","27.871490","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56681","27.873476","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56682","27.873865","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56683","27.873872","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56684","27.875247","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56685","27.879240","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56686","27.879251","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56687","27.880249","172.30.1.205","172.30.1.104","TCP","74","48320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931106 TSecr=0 WS=128" +"56688","27.880570","172.30.1.104","172.30.1.205","TCP","66","135 > 48320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56689","27.880581","172.30.1.205","172.30.1.104","TCP","54","48320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56690","27.880970","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56691","27.881279","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56692","27.881288","172.30.1.205","172.30.1.104","TCP","54","48320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56693","27.883500","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56694","27.883903","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56695","27.883910","172.30.1.205","172.30.1.104","TCP","54","48320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56696","27.885763","172.30.1.205","172.30.1.104","TCP","54","48320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56697","27.885878","172.30.1.205","172.30.1.104","TCP","74","40958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931112 TSecr=0 WS=128" +"56698","27.886023","172.30.1.104","172.30.1.205","TCP","54","135 > 48320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56699","27.886035","172.30.1.104","172.30.1.205","TCP","54","135 > 48320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56700","27.886041","172.30.1.205","172.30.1.104","TCP","54","48320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56701","27.886169","172.30.1.104","172.30.1.205","TCP","66","49671 > 40958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56702","27.886178","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56703","27.886553","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56704","27.886846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56705","27.886855","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56706","27.888763","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56707","27.889132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56708","27.889139","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56709","27.890495","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56710","27.894642","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56711","27.894654","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56712","27.895681","172.30.1.205","172.30.1.104","TCP","74","48324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931122 TSecr=0 WS=128" +"56713","27.896000","172.30.1.104","172.30.1.205","TCP","66","135 > 48324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56714","27.896011","172.30.1.205","172.30.1.104","TCP","54","48324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56715","27.896364","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56716","27.896662","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56717","27.896671","172.30.1.205","172.30.1.104","TCP","54","48324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56718","27.898954","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56719","27.899386","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56720","27.899393","172.30.1.205","172.30.1.104","TCP","54","48324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56721","27.901249","172.30.1.205","172.30.1.104","TCP","54","48324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56722","27.901364","172.30.1.205","172.30.1.104","TCP","74","40962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931127 TSecr=0 WS=128" +"56723","27.901539","172.30.1.104","172.30.1.205","TCP","54","135 > 48324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56724","27.901562","172.30.1.104","172.30.1.205","TCP","54","135 > 48324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56725","27.901569","172.30.1.205","172.30.1.104","TCP","54","48324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56726","27.901661","172.30.1.104","172.30.1.205","TCP","66","49671 > 40962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56727","27.901669","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56728","27.902013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56729","27.902287","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56730","27.902295","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56731","27.904188","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56732","27.904591","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56733","27.904598","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56734","27.905987","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56735","27.910096","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56736","27.910106","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56737","27.911099","172.30.1.205","172.30.1.104","TCP","74","48328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931137 TSecr=0 WS=128" +"56738","27.911397","172.30.1.104","172.30.1.205","TCP","66","135 > 48328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56739","27.911413","172.30.1.205","172.30.1.104","TCP","54","48328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56740","27.911783","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56741","27.912076","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56742","27.912084","172.30.1.205","172.30.1.104","TCP","54","48328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56743","27.914325","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56744","27.914712","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56745","27.914718","172.30.1.205","172.30.1.104","TCP","54","48328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56746","27.915580","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56747","27.915643","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56748","27.915677","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56749","27.915706","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56750","27.915738","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56751","27.915766","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56752","27.915800","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56753","27.915829","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56754","27.915860","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56755","27.915887","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56756","27.915909","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56757","27.915985","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56758","27.916073","172.30.1.104","172.30.1.205","TCP","54","49671 > 40922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56759","27.916134","172.30.1.104","172.30.1.205","TCP","54","49671 > 40926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56760","27.916146","172.30.1.104","172.30.1.205","TCP","54","49671 > 40922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56761","27.916154","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56762","27.916162","172.30.1.104","172.30.1.205","TCP","54","49671 > 40930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56763","27.916192","172.30.1.104","172.30.1.205","TCP","54","49671 > 40934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56764","27.916219","172.30.1.104","172.30.1.205","TCP","54","49671 > 40938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56765","27.916245","172.30.1.104","172.30.1.205","TCP","54","49671 > 40942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56766","27.916272","172.30.1.104","172.30.1.205","TCP","54","49671 > 40938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56767","27.916276","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56768","27.916299","172.30.1.104","172.30.1.205","TCP","54","49671 > 40946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56769","27.916327","172.30.1.104","172.30.1.205","TCP","54","49671 > 40950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56770","27.916427","172.30.1.104","172.30.1.205","TCP","54","49671 > 40954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56771","27.916445","172.30.1.104","172.30.1.205","TCP","54","49671 > 40934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56772","27.916450","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56773","27.916478","172.30.1.104","172.30.1.205","TCP","54","49671 > 40954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56774","27.916482","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56775","27.916513","172.30.1.104","172.30.1.205","TCP","54","49671 > 40950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56776","27.916517","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56777","27.916532","172.30.1.104","172.30.1.205","TCP","54","49671 > 40946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56778","27.916535","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56779","27.916550","172.30.1.104","172.30.1.205","TCP","54","49671 > 40942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56780","27.916552","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56781","27.916569","172.30.1.104","172.30.1.205","TCP","54","49671 > 40926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56782","27.916571","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56783","27.916587","172.30.1.104","172.30.1.205","TCP","54","49671 > 40930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56784","27.916589","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56785","27.916606","172.30.1.104","172.30.1.205","TCP","54","49671 > 40958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56786","27.916799","172.30.1.104","172.30.1.205","TCP","54","49671 > 40962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56787","27.916829","172.30.1.104","172.30.1.205","TCP","54","49671 > 40918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56788","27.916850","172.30.1.104","172.30.1.205","TCP","54","49671 > 40958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56789","27.916855","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56790","27.916873","172.30.1.104","172.30.1.205","TCP","54","49671 > 40962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56791","27.916876","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56792","27.916897","172.30.1.104","172.30.1.205","TCP","54","49671 > 40918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"56793","27.916900","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"56794","27.917634","172.30.1.205","172.30.1.104","TCP","54","48328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56795","27.917757","172.30.1.205","172.30.1.104","TCP","74","40966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931144 TSecr=0 WS=128" +"56796","27.917919","172.30.1.104","172.30.1.205","TCP","54","135 > 48328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56797","27.917945","172.30.1.104","172.30.1.205","TCP","54","135 > 48328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56798","27.917950","172.30.1.205","172.30.1.104","TCP","54","48328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56799","27.918073","172.30.1.104","172.30.1.205","TCP","66","49671 > 40966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56800","27.918081","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56801","27.918442","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56802","27.918775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56803","27.918783","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56804","27.920669","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56805","27.921084","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56806","27.921094","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56807","27.922552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56808","27.926694","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56809","27.926706","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56810","27.927734","172.30.1.205","172.30.1.104","TCP","74","48332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931154 TSecr=0 WS=128" +"56811","27.928083","172.30.1.104","172.30.1.205","TCP","66","135 > 48332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56812","27.928096","172.30.1.205","172.30.1.104","TCP","54","48332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56813","27.928459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56814","27.928749","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56815","27.928759","172.30.1.205","172.30.1.104","TCP","54","48332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56816","27.930974","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56817","27.931412","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56818","27.931419","172.30.1.205","172.30.1.104","TCP","54","48332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56819","27.933277","172.30.1.205","172.30.1.104","TCP","54","48332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56820","27.933410","172.30.1.205","172.30.1.104","TCP","74","40970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931159 TSecr=0 WS=128" +"56821","27.933548","172.30.1.104","172.30.1.205","TCP","54","135 > 48332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56822","27.933601","172.30.1.104","172.30.1.205","TCP","54","135 > 48332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56823","27.933609","172.30.1.205","172.30.1.104","TCP","54","48332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56824","27.933698","172.30.1.104","172.30.1.205","TCP","66","49671 > 40970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56825","27.933713","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56826","27.934111","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56827","27.934452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56828","27.934461","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56829","27.936371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56830","27.936749","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56831","27.936756","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56832","27.938147","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56833","27.942195","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56834","27.942205","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56835","27.943215","172.30.1.205","172.30.1.104","TCP","74","48336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931169 TSecr=0 WS=128" +"56836","27.943523","172.30.1.104","172.30.1.205","TCP","66","135 > 48336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56837","27.943535","172.30.1.205","172.30.1.104","TCP","54","48336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56838","27.943893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56839","27.944215","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56840","27.944224","172.30.1.205","172.30.1.104","TCP","54","48336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56841","27.946493","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56842","27.946902","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56843","27.946909","172.30.1.205","172.30.1.104","TCP","54","48336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56844","27.948834","172.30.1.205","172.30.1.104","TCP","54","48336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56845","27.948959","172.30.1.205","172.30.1.104","TCP","74","40974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931175 TSecr=0 WS=128" +"56846","27.949129","172.30.1.104","172.30.1.205","TCP","54","135 > 48336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56847","27.949155","172.30.1.104","172.30.1.205","TCP","54","135 > 48336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56848","27.949162","172.30.1.205","172.30.1.104","TCP","54","48336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56849","27.949238","172.30.1.104","172.30.1.205","TCP","66","49671 > 40974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56850","27.949253","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56851","27.949649","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56852","27.949954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56853","27.949966","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56854","27.951866","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56855","27.952287","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56856","27.952293","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56857","27.953681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56858","27.957761","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56859","27.957772","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56860","27.958771","172.30.1.205","172.30.1.104","TCP","74","48340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931185 TSecr=0 WS=128" +"56861","27.959063","172.30.1.104","172.30.1.205","TCP","66","135 > 48340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56862","27.959076","172.30.1.205","172.30.1.104","TCP","54","48340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56863","27.959435","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56864","27.959708","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56865","27.959717","172.30.1.205","172.30.1.104","TCP","54","48340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56866","27.961938","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56867","27.962327","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56868","27.962333","172.30.1.205","172.30.1.104","TCP","54","48340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56869","27.964179","172.30.1.205","172.30.1.104","TCP","54","48340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56870","27.964291","172.30.1.205","172.30.1.104","TCP","74","40978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931190 TSecr=0 WS=128" +"56871","27.964472","172.30.1.104","172.30.1.205","TCP","54","135 > 48340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56872","27.964507","172.30.1.104","172.30.1.205","TCP","54","135 > 48340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56873","27.964514","172.30.1.205","172.30.1.104","TCP","54","48340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56874","27.964590","172.30.1.104","172.30.1.205","TCP","66","49671 > 40978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56875","27.964598","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56876","27.964978","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56877","27.965359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56878","27.965366","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56879","27.967272","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56880","27.967674","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56881","27.967680","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56882","27.969085","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56883","27.973241","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56884","27.973256","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56885","27.974228","172.30.1.205","172.30.1.104","TCP","74","48344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931200 TSecr=0 WS=128" +"56886","27.974555","172.30.1.104","172.30.1.205","TCP","66","135 > 48344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56887","27.974567","172.30.1.205","172.30.1.104","TCP","54","48344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56888","27.974919","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56889","27.975608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56890","27.975617","172.30.1.205","172.30.1.104","TCP","54","48344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56891","27.977830","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56892","27.978321","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56893","27.978327","172.30.1.205","172.30.1.104","TCP","54","48344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56894","27.980153","172.30.1.205","172.30.1.104","TCP","54","48344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56895","27.980265","172.30.1.205","172.30.1.104","TCP","74","40982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931206 TSecr=0 WS=128" +"56896","27.980416","172.30.1.104","172.30.1.205","TCP","54","135 > 48344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56897","27.980444","172.30.1.104","172.30.1.205","TCP","54","135 > 48344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56898","27.980450","172.30.1.205","172.30.1.104","TCP","54","48344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56899","27.980511","172.30.1.104","172.30.1.205","TCP","66","49671 > 40982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56900","27.980518","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56901","27.980889","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56902","27.981193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56903","27.981202","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56904","27.983061","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56905","27.983419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56906","27.983425","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56907","27.984764","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56908","27.989179","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56909","27.989188","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56910","27.990142","172.30.1.205","172.30.1.104","TCP","74","48348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931216 TSecr=0 WS=128" +"56911","27.990433","172.30.1.104","172.30.1.205","TCP","66","135 > 48348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56912","27.990444","172.30.1.205","172.30.1.104","TCP","54","48348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56913","27.990794","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56914","27.991118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56915","27.991128","172.30.1.205","172.30.1.104","TCP","54","48348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56916","27.993344","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56917","27.993724","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56918","27.993731","172.30.1.205","172.30.1.104","TCP","54","48348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56919","27.995556","172.30.1.205","172.30.1.104","TCP","54","48348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56920","27.995671","172.30.1.205","172.30.1.104","TCP","74","40986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931222 TSecr=0 WS=128" +"56921","27.995859","172.30.1.104","172.30.1.205","TCP","54","135 > 48348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56922","27.995868","172.30.1.104","172.30.1.205","TCP","54","135 > 48348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56923","27.995874","172.30.1.205","172.30.1.104","TCP","54","48348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56924","27.995975","172.30.1.104","172.30.1.205","TCP","66","49671 > 40986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56925","27.995990","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56926","27.996381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56927","27.996740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56928","27.996759","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56929","27.998755","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56930","27.999122","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56931","27.999129","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56932","28.000511","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56933","28.004599","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56934","28.004609","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56935","28.005625","172.30.1.205","172.30.1.104","TCP","74","48352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931232 TSecr=0 WS=128" +"56936","28.005939","172.30.1.104","172.30.1.205","TCP","66","135 > 48352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56937","28.005951","172.30.1.205","172.30.1.104","TCP","54","48352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56938","28.006315","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56939","28.006604","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56940","28.006614","172.30.1.205","172.30.1.104","TCP","54","48352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56941","28.008850","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56942","28.009239","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56943","28.009246","172.30.1.205","172.30.1.104","TCP","54","48352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56944","28.011098","172.30.1.205","172.30.1.104","TCP","54","48352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56945","28.011235","172.30.1.205","172.30.1.104","TCP","74","40990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931237 TSecr=0 WS=128" +"56946","28.011393","172.30.1.104","172.30.1.205","TCP","54","135 > 48352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56947","28.011404","172.30.1.104","172.30.1.205","TCP","54","135 > 48352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56948","28.011412","172.30.1.205","172.30.1.104","TCP","54","48352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56949","28.011509","172.30.1.104","172.30.1.205","TCP","66","49671 > 40990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56950","28.011518","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56951","28.011876","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56952","28.012220","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56953","28.012233","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56954","28.014236","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56955","28.014603","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56956","28.014608","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56957","28.015986","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56958","28.020119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56959","28.020129","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56960","28.021172","172.30.1.205","172.30.1.104","TCP","74","48356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931247 TSecr=0 WS=128" +"56961","28.021500","172.30.1.104","172.30.1.205","TCP","66","135 > 48356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56962","28.021514","172.30.1.205","172.30.1.104","TCP","54","48356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56963","28.021878","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56964","28.022189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56965","28.022198","172.30.1.205","172.30.1.104","TCP","54","48356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56966","28.024413","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56967","28.024827","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56968","28.024834","172.30.1.205","172.30.1.104","TCP","54","48356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56969","28.026667","172.30.1.205","172.30.1.104","TCP","54","48356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56970","28.026784","172.30.1.205","172.30.1.104","TCP","74","40994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931253 TSecr=0 WS=128" +"56971","28.026945","172.30.1.104","172.30.1.205","TCP","54","135 > 48356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56972","28.027006","172.30.1.104","172.30.1.205","TCP","54","135 > 48356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56973","28.027013","172.30.1.205","172.30.1.104","TCP","54","48356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56974","28.027111","172.30.1.104","172.30.1.205","TCP","66","49671 > 40994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56975","28.027119","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56976","28.027465","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"56977","28.028074","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56978","28.028085","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56979","28.030012","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"56980","28.031368","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"56981","28.031374","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"56982","28.032734","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"56983","28.036766","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"56984","28.036788","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"56985","28.037800","172.30.1.205","172.30.1.104","TCP","74","48360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931264 TSecr=0 WS=128" +"56986","28.038106","172.30.1.104","172.30.1.205","TCP","66","135 > 48360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"56987","28.038117","172.30.1.205","172.30.1.104","TCP","54","48360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"56988","28.038475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"56989","28.038775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"56990","28.038785","172.30.1.205","172.30.1.104","TCP","54","48360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"56991","28.041042","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"56992","28.041432","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"56993","28.041439","172.30.1.205","172.30.1.104","TCP","54","48360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56994","28.043266","172.30.1.205","172.30.1.104","TCP","54","48360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"56995","28.043378","172.30.1.205","172.30.1.104","TCP","74","40998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931269 TSecr=0 WS=128" +"56996","28.043587","172.30.1.104","172.30.1.205","TCP","54","135 > 48360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56997","28.043597","172.30.1.104","172.30.1.205","TCP","54","135 > 48360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"56998","28.043604","172.30.1.205","172.30.1.104","TCP","54","48360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"56999","28.043686","172.30.1.104","172.30.1.205","TCP","66","49671 > 40998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57000","28.043695","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57001","28.044037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57002","28.044310","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57003","28.044319","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57004","28.046215","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57005","28.046558","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57006","28.046562","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57007","28.047909","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57008","28.051905","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57009","28.051917","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57010","28.052912","172.30.1.205","172.30.1.104","TCP","74","48364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931279 TSecr=0 WS=128" +"57011","28.053235","172.30.1.104","172.30.1.205","TCP","66","135 > 48364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57012","28.053245","172.30.1.205","172.30.1.104","TCP","54","48364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57013","28.053599","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57014","28.053898","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57015","28.053907","172.30.1.205","172.30.1.104","TCP","54","48364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57016","28.056111","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57017","28.056491","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57018","28.056498","172.30.1.205","172.30.1.104","TCP","54","48364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57019","28.058330","172.30.1.205","172.30.1.104","TCP","54","48364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57020","28.058441","172.30.1.205","172.30.1.104","TCP","74","41002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931284 TSecr=0 WS=128" +"57021","28.058584","172.30.1.104","172.30.1.205","TCP","54","135 > 48364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57022","28.058596","172.30.1.104","172.30.1.205","TCP","54","135 > 48364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57023","28.058601","172.30.1.205","172.30.1.104","TCP","54","48364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57024","28.058712","172.30.1.104","172.30.1.205","TCP","66","49671 > 41002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57025","28.058720","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57026","28.059064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57027","28.059342","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57028","28.059351","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57029","28.061250","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57030","28.061755","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57031","28.061761","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57032","28.063106","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57033","28.067119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57034","28.067131","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57035","28.068117","172.30.1.205","172.30.1.104","TCP","74","48368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931294 TSecr=0 WS=128" +"57036","28.068498","172.30.1.104","172.30.1.205","TCP","66","135 > 48368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57037","28.068509","172.30.1.205","172.30.1.104","TCP","54","48368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57038","28.068901","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57039","28.069234","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57040","28.069243","172.30.1.205","172.30.1.104","TCP","54","48368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57041","28.071451","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57042","28.071836","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57043","28.071849","172.30.1.205","172.30.1.104","TCP","54","48368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57044","28.073681","172.30.1.205","172.30.1.104","TCP","54","48368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57045","28.073792","172.30.1.205","172.30.1.104","TCP","74","41006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931300 TSecr=0 WS=128" +"57046","28.073940","172.30.1.104","172.30.1.205","TCP","54","135 > 48368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57047","28.073974","172.30.1.104","172.30.1.205","TCP","54","135 > 48368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57048","28.073980","172.30.1.205","172.30.1.104","TCP","54","48368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57049","28.074060","172.30.1.104","172.30.1.205","TCP","66","49671 > 41006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57050","28.074068","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57051","28.074422","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57052","28.075617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57053","28.075626","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57054","28.077550","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57055","28.078920","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57056","28.078929","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57057","28.080453","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57058","28.084523","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57059","28.084535","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57060","28.085562","172.30.1.205","172.30.1.104","TCP","74","48372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931311 TSecr=0 WS=128" +"57061","28.085901","172.30.1.104","172.30.1.205","TCP","66","135 > 48372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57062","28.085913","172.30.1.205","172.30.1.104","TCP","54","48372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57063","28.086285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57064","28.086573","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57065","28.086584","172.30.1.205","172.30.1.104","TCP","54","48372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57066","28.088817","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57067","28.089294","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57068","28.089300","172.30.1.205","172.30.1.104","TCP","54","48372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57069","28.091127","172.30.1.205","172.30.1.104","TCP","54","48372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57070","28.091242","172.30.1.205","172.30.1.104","TCP","74","41010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931317 TSecr=0 WS=128" +"57071","28.091431","172.30.1.104","172.30.1.205","TCP","54","135 > 48372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57072","28.091461","172.30.1.104","172.30.1.205","TCP","54","135 > 48372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57073","28.091467","172.30.1.205","172.30.1.104","TCP","54","48372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57074","28.091563","172.30.1.104","172.30.1.205","TCP","66","49671 > 41010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57075","28.091572","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57076","28.091920","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57077","28.092207","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57078","28.092214","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57079","28.094119","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57080","28.094486","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57081","28.094492","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57082","28.095848","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57083","28.099995","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57084","28.100006","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57085","28.100992","172.30.1.205","172.30.1.104","TCP","74","48376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931327 TSecr=0 WS=128" +"57086","28.101323","172.30.1.104","172.30.1.205","TCP","66","135 > 48376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57087","28.101334","172.30.1.205","172.30.1.104","TCP","54","48376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57088","28.101699","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57089","28.102005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57090","28.102014","172.30.1.205","172.30.1.104","TCP","54","48376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57091","28.104206","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57092","28.104648","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57093","28.104655","172.30.1.205","172.30.1.104","TCP","54","48376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57094","28.105528","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57095","28.105577","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57096","28.105614","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57097","28.105647","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57098","28.105681","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57099","28.105709","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57100","28.105742","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57101","28.105775","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57102","28.105797","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57103","28.105813","172.30.1.104","172.30.1.205","TCP","54","49671 > 40970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57104","28.105828","172.30.1.104","172.30.1.205","TCP","54","49671 > 40974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57105","28.105852","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57106","28.105881","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57107","28.105945","172.30.1.104","172.30.1.205","TCP","54","49671 > 40978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57108","28.105964","172.30.1.104","172.30.1.205","TCP","54","49671 > 40970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57109","28.105970","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57110","28.105984","172.30.1.104","172.30.1.205","TCP","54","49671 > 40974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57111","28.105987","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57112","28.105993","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57113","28.106006","172.30.1.104","172.30.1.205","TCP","54","49671 > 40982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57114","28.106025","172.30.1.104","172.30.1.205","TCP","54","49671 > 40986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57115","28.106044","172.30.1.104","172.30.1.205","TCP","54","49671 > 40990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57116","28.106160","172.30.1.104","172.30.1.205","TCP","54","49671 > 40994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57117","28.106179","172.30.1.104","172.30.1.205","TCP","54","49671 > 40990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57118","28.106184","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57119","28.106199","172.30.1.104","172.30.1.205","TCP","54","49671 > 40986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57120","28.106202","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57121","28.106248","172.30.1.104","172.30.1.205","TCP","54","49671 > 40994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57122","28.106251","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57123","28.106266","172.30.1.104","172.30.1.205","TCP","54","49671 > 40978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57124","28.106269","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57125","28.106287","172.30.1.104","172.30.1.205","TCP","54","49671 > 40998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57126","28.106307","172.30.1.104","172.30.1.205","TCP","54","49671 > 41002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57127","28.106326","172.30.1.104","172.30.1.205","TCP","54","49671 > 41006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57128","28.106412","172.30.1.104","172.30.1.205","TCP","54","49671 > 41002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57129","28.106417","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57130","28.106446","172.30.1.104","172.30.1.205","TCP","54","49671 > 41010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57131","28.106467","172.30.1.104","172.30.1.205","TCP","54","49671 > 41010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57132","28.106471","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57133","28.106486","172.30.1.104","172.30.1.205","TCP","54","49671 > 41006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57134","28.106489","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57135","28.106506","172.30.1.104","172.30.1.205","TCP","54","49671 > 40982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57136","28.106509","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57137","28.106525","172.30.1.104","172.30.1.205","TCP","54","49671 > 40998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57138","28.106528","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57139","28.106547","172.30.1.104","172.30.1.205","TCP","54","49671 > 40966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57140","28.106671","172.30.1.104","172.30.1.205","TCP","54","49671 > 40966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57141","28.106675","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57142","28.107510","172.30.1.205","172.30.1.104","TCP","54","48376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57143","28.107642","172.30.1.205","172.30.1.104","TCP","74","41014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931334 TSecr=0 WS=128" +"57144","28.107798","172.30.1.104","172.30.1.205","TCP","54","135 > 48376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57145","28.107839","172.30.1.104","172.30.1.205","TCP","54","135 > 48376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57146","28.107845","172.30.1.205","172.30.1.104","TCP","54","48376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57147","28.107969","172.30.1.104","172.30.1.205","TCP","66","49671 > 41014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57148","28.107977","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57149","28.108332","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57150","28.108617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57151","28.108626","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57152","28.110539","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57153","28.110923","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57154","28.110929","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57155","28.112291","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57156","28.117208","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57157","28.117218","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57158","28.118203","172.30.1.205","172.30.1.104","TCP","74","48380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931344 TSecr=0 WS=128" +"57159","28.118542","172.30.1.104","172.30.1.205","TCP","66","135 > 48380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57160","28.118554","172.30.1.205","172.30.1.104","TCP","54","48380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57161","28.118915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57162","28.119225","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57163","28.119234","172.30.1.205","172.30.1.104","TCP","54","48380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57164","28.121453","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57165","28.121851","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57166","28.121858","172.30.1.205","172.30.1.104","TCP","54","48380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57167","28.123685","172.30.1.205","172.30.1.104","TCP","54","48380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57168","28.123798","172.30.1.205","172.30.1.104","TCP","74","41018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931350 TSecr=0 WS=128" +"57169","28.123966","172.30.1.104","172.30.1.205","TCP","54","135 > 48380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57170","28.123975","172.30.1.104","172.30.1.205","TCP","54","135 > 48380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57171","28.123982","172.30.1.205","172.30.1.104","TCP","54","48380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57172","28.124083","172.30.1.104","172.30.1.205","TCP","66","49671 > 41018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57173","28.124092","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57174","28.124438","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57175","28.124754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57176","28.124762","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57177","28.126669","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57178","28.127067","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57179","28.127074","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57180","28.128429","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57181","28.132592","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57182","28.132604","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57183","28.133609","172.30.1.205","172.30.1.104","TCP","74","48384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931360 TSecr=0 WS=128" +"57184","28.133922","172.30.1.104","172.30.1.205","TCP","66","135 > 48384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57185","28.133933","172.30.1.205","172.30.1.104","TCP","54","48384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57186","28.134291","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57187","28.134570","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57188","28.134579","172.30.1.205","172.30.1.104","TCP","54","48384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57189","28.136826","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57190","28.137245","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57191","28.137252","172.30.1.205","172.30.1.104","TCP","54","48384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57192","28.139068","172.30.1.205","172.30.1.104","TCP","54","48384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57193","28.139182","172.30.1.205","172.30.1.104","TCP","74","41022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931365 TSecr=0 WS=128" +"57194","28.139392","172.30.1.104","172.30.1.205","TCP","54","135 > 48384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57195","28.139423","172.30.1.104","172.30.1.205","TCP","54","135 > 48384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57196","28.139429","172.30.1.205","172.30.1.104","TCP","54","48384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57197","28.139456","172.30.1.104","172.30.1.205","TCP","66","49671 > 41022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57198","28.139465","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57199","28.139816","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57200","28.140146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57201","28.140155","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57202","28.142078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57203","28.142481","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57204","28.142488","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57205","28.143849","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57206","28.148785","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57207","28.148798","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57208","28.149778","172.30.1.205","172.30.1.104","TCP","74","48388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931376 TSecr=0 WS=128" +"57209","28.150109","172.30.1.104","172.30.1.205","TCP","66","135 > 48388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57210","28.150120","172.30.1.205","172.30.1.104","TCP","54","48388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57211","28.150478","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57212","28.150790","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57213","28.150799","172.30.1.205","172.30.1.104","TCP","54","48388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57214","28.153026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57215","28.153482","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57216","28.153489","172.30.1.205","172.30.1.104","TCP","54","48388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57217","28.155326","172.30.1.205","172.30.1.104","TCP","54","48388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57218","28.155438","172.30.1.205","172.30.1.104","TCP","74","41026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931381 TSecr=0 WS=128" +"57219","28.155643","172.30.1.104","172.30.1.205","TCP","54","135 > 48388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57220","28.155650","172.30.1.104","172.30.1.205","TCP","54","135 > 48388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57221","28.155655","172.30.1.205","172.30.1.104","TCP","54","48388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57222","28.155774","172.30.1.104","172.30.1.205","TCP","66","49671 > 41026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57223","28.155783","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57224","28.156131","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57225","28.156434","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57226","28.156443","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57227","28.158352","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57228","28.158745","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57229","28.158751","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57230","28.160111","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57231","28.164345","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57232","28.164355","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57233","28.165340","172.30.1.205","172.30.1.104","TCP","74","48392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931391 TSecr=0 WS=128" +"57234","28.165668","172.30.1.104","172.30.1.205","TCP","66","135 > 48392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57235","28.165683","172.30.1.205","172.30.1.104","TCP","54","48392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57236","28.166042","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57237","28.166359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57238","28.166369","172.30.1.205","172.30.1.104","TCP","54","48392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57239","28.168567","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57240","28.168991","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57241","28.168998","172.30.1.205","172.30.1.104","TCP","54","48392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57242","28.170810","172.30.1.205","172.30.1.104","TCP","54","48392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57243","28.170922","172.30.1.205","172.30.1.104","TCP","74","41030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931397 TSecr=0 WS=128" +"57244","28.171113","172.30.1.104","172.30.1.205","TCP","54","135 > 48392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57245","28.171144","172.30.1.104","172.30.1.205","TCP","54","135 > 48392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57246","28.171150","172.30.1.205","172.30.1.104","TCP","54","48392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57247","28.171178","172.30.1.104","172.30.1.205","TCP","66","49671 > 41030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57248","28.171186","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57249","28.171535","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57250","28.171877","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57251","28.171884","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57252","28.173796","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57253","28.174214","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57254","28.174221","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57255","28.175572","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57256","28.179661","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57257","28.179672","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57258","28.180633","172.30.1.205","172.30.1.104","TCP","74","48396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931407 TSecr=0 WS=128" +"57259","28.180940","172.30.1.104","172.30.1.205","TCP","66","135 > 48396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57260","28.180951","172.30.1.205","172.30.1.104","TCP","54","48396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57261","28.181310","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57262","28.181596","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57263","28.181605","172.30.1.205","172.30.1.104","TCP","54","48396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57264","28.183809","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57265","28.184266","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57266","28.184273","172.30.1.205","172.30.1.104","TCP","54","48396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57267","28.186136","172.30.1.205","172.30.1.104","TCP","54","48396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57268","28.186252","172.30.1.205","172.30.1.104","TCP","74","41034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931412 TSecr=0 WS=128" +"57269","28.186394","172.30.1.104","172.30.1.205","TCP","54","135 > 48396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57270","28.186409","172.30.1.104","172.30.1.205","TCP","54","135 > 48396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57271","28.186415","172.30.1.205","172.30.1.104","TCP","54","48396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57272","28.186499","172.30.1.104","172.30.1.205","TCP","66","49671 > 41034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57273","28.186507","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57274","28.186855","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57275","28.187174","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57276","28.187189","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57277","28.189182","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57278","28.189546","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57279","28.189559","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57280","28.191091","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57281","28.195191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57282","28.195201","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57283","28.196170","172.30.1.205","172.30.1.104","TCP","74","48400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931422 TSecr=0 WS=128" +"57284","28.196481","172.30.1.104","172.30.1.205","TCP","66","135 > 48400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57285","28.196492","172.30.1.205","172.30.1.104","TCP","54","48400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57286","28.196866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57287","28.197152","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57288","28.197163","172.30.1.205","172.30.1.104","TCP","54","48400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57289","28.199360","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57290","28.199743","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57291","28.199749","172.30.1.205","172.30.1.104","TCP","54","48400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57292","28.201573","172.30.1.205","172.30.1.104","TCP","54","48400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57293","28.201685","172.30.1.205","172.30.1.104","TCP","74","41038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931428 TSecr=0 WS=128" +"57294","28.201841","172.30.1.104","172.30.1.205","TCP","54","135 > 48400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57295","28.201871","172.30.1.104","172.30.1.205","TCP","54","135 > 48400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57296","28.201876","172.30.1.205","172.30.1.104","TCP","54","48400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57297","28.201972","172.30.1.104","172.30.1.205","TCP","66","49671 > 41038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57298","28.201980","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57299","28.202330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57300","28.202593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57301","28.202600","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57302","28.204459","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57303","28.204808","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57304","28.204815","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57305","28.206192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57306","28.210293","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57307","28.210303","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57308","28.211239","172.30.1.205","172.30.1.104","TCP","74","48404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931437 TSecr=0 WS=128" +"57309","28.211548","172.30.1.104","172.30.1.205","TCP","66","135 > 48404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57310","28.211558","172.30.1.205","172.30.1.104","TCP","54","48404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57311","28.211902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57312","28.212200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57313","28.212209","172.30.1.205","172.30.1.104","TCP","54","48404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57314","28.214424","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57315","28.214784","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57316","28.214791","172.30.1.205","172.30.1.104","TCP","54","48404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57317","28.216594","172.30.1.205","172.30.1.104","TCP","54","48404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57318","28.216709","172.30.1.205","172.30.1.104","TCP","74","41042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931443 TSecr=0 WS=128" +"57319","28.216863","172.30.1.104","172.30.1.205","TCP","54","135 > 48404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57320","28.216899","172.30.1.104","172.30.1.205","TCP","54","135 > 48404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57321","28.216905","172.30.1.205","172.30.1.104","TCP","54","48404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57322","28.216987","172.30.1.104","172.30.1.205","TCP","66","49671 > 41042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57323","28.216995","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57324","28.217362","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57325","28.217693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57326","28.217702","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57327","28.219561","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57328","28.219908","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57329","28.219914","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57330","28.221305","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57331","28.225361","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57332","28.225371","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57333","28.226321","172.30.1.205","172.30.1.104","TCP","74","48408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931452 TSecr=0 WS=128" +"57334","28.226643","172.30.1.104","172.30.1.205","TCP","66","135 > 48408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57335","28.226654","172.30.1.205","172.30.1.104","TCP","54","48408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57336","28.227003","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57337","28.227271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57338","28.227280","172.30.1.205","172.30.1.104","TCP","54","48408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57339","28.229472","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57340","28.229869","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57341","28.229875","172.30.1.205","172.30.1.104","TCP","54","48408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57342","28.231677","172.30.1.205","172.30.1.104","TCP","54","48408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57343","28.231786","172.30.1.205","172.30.1.104","TCP","74","41046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931458 TSecr=0 WS=128" +"57344","28.231954","172.30.1.104","172.30.1.205","TCP","54","135 > 48408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57345","28.231962","172.30.1.104","172.30.1.205","TCP","54","135 > 48408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57346","28.231968","172.30.1.205","172.30.1.104","TCP","54","48408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57347","28.232054","172.30.1.104","172.30.1.205","TCP","66","49671 > 41046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57348","28.232062","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57349","28.232405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57350","28.233178","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57351","28.233186","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57352","28.235046","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57353","28.235412","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57354","28.235418","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57355","28.236751","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57356","28.240883","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57357","28.240893","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57358","28.241827","172.30.1.205","172.30.1.104","TCP","74","48412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931468 TSecr=0 WS=128" +"57359","28.242146","172.30.1.104","172.30.1.205","TCP","66","135 > 48412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57360","28.242157","172.30.1.205","172.30.1.104","TCP","54","48412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57361","28.242510","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57362","28.242808","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57363","28.242817","172.30.1.205","172.30.1.104","TCP","54","48412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57364","28.245120","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57365","28.245531","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57366","28.245538","172.30.1.205","172.30.1.104","TCP","54","48412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57367","28.247372","172.30.1.205","172.30.1.104","TCP","54","48412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57368","28.247482","172.30.1.205","172.30.1.104","TCP","74","41050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931473 TSecr=0 WS=128" +"57369","28.247664","172.30.1.104","172.30.1.205","TCP","54","135 > 48412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57370","28.247688","172.30.1.104","172.30.1.205","TCP","54","135 > 48412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57371","28.247693","172.30.1.205","172.30.1.104","TCP","54","48412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57372","28.247825","172.30.1.104","172.30.1.205","TCP","66","49671 > 41050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57373","28.247833","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57374","28.248177","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57375","28.248475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57376","28.248483","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57377","28.250363","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57378","28.250722","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57379","28.250729","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57380","28.252056","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57381","28.256521","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57382","28.256530","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57383","28.257486","172.30.1.205","172.30.1.104","TCP","74","48416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931483 TSecr=0 WS=128" +"57384","28.257806","172.30.1.104","172.30.1.205","TCP","66","135 > 48416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57385","28.257818","172.30.1.205","172.30.1.104","TCP","54","48416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57386","28.258184","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57387","28.258489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57388","28.258498","172.30.1.205","172.30.1.104","TCP","54","48416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57389","28.260681","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57390","28.261051","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57391","28.261057","172.30.1.205","172.30.1.104","TCP","54","48416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57392","28.262851","172.30.1.205","172.30.1.104","TCP","54","48416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57393","28.262961","172.30.1.205","172.30.1.104","TCP","74","41054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931489 TSecr=0 WS=128" +"57394","28.263129","172.30.1.104","172.30.1.205","TCP","54","135 > 48416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57395","28.263158","172.30.1.104","172.30.1.205","TCP","54","135 > 48416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57396","28.263163","172.30.1.205","172.30.1.104","TCP","54","48416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57397","28.263240","172.30.1.104","172.30.1.205","TCP","66","49671 > 41054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57398","28.263250","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57399","28.263602","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57400","28.263862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57401","28.263871","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57402","28.265770","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57403","28.266141","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57404","28.266147","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57405","28.267491","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57406","28.271564","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57407","28.271574","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57408","28.272509","172.30.1.205","172.30.1.104","TCP","74","48420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931498 TSecr=0 WS=128" +"57409","28.272841","172.30.1.104","172.30.1.205","TCP","66","135 > 48420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57410","28.272852","172.30.1.205","172.30.1.104","TCP","54","48420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57411","28.273206","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57412","28.273479","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57413","28.273488","172.30.1.205","172.30.1.104","TCP","54","48420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57414","28.275681","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57415","28.276060","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57416","28.276067","172.30.1.205","172.30.1.104","TCP","54","48420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57417","28.277893","172.30.1.205","172.30.1.104","TCP","54","48420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57418","28.278002","172.30.1.205","172.30.1.104","TCP","74","41058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931504 TSecr=0 WS=128" +"57419","28.278159","172.30.1.104","172.30.1.205","TCP","54","135 > 48420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57420","28.278173","172.30.1.104","172.30.1.205","TCP","54","135 > 48420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57421","28.278178","172.30.1.205","172.30.1.104","TCP","54","48420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57422","28.278340","172.30.1.104","172.30.1.205","TCP","66","49671 > 41058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57423","28.278348","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57424","28.278692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57425","28.279002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57426","28.279010","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57427","28.280907","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57428","28.281275","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57429","28.281281","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57430","28.282617","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57431","28.286637","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57432","28.286646","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57433","28.287601","172.30.1.205","172.30.1.104","TCP","74","48424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931514 TSecr=0 WS=128" +"57434","28.287905","172.30.1.104","172.30.1.205","TCP","66","135 > 48424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57435","28.287916","172.30.1.205","172.30.1.104","TCP","54","48424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57436","28.288273","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57437","28.288660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57438","28.288668","172.30.1.205","172.30.1.104","TCP","54","48424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57439","28.290865","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57440","28.291302","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57441","28.291309","172.30.1.205","172.30.1.104","TCP","54","48424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57442","28.292157","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57443","28.292207","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57444","28.292239","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57445","28.292263","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57446","28.292289","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57447","28.292311","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57448","28.292339","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57449","28.292361","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57450","28.292383","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57451","28.292409","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57452","28.292434","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57453","28.292456","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57454","28.292596","172.30.1.104","172.30.1.205","TCP","54","49671 > 41014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57455","28.292621","172.30.1.104","172.30.1.205","TCP","54","49671 > 41018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57456","28.292764","172.30.1.104","172.30.1.205","TCP","54","49671 > 41022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57457","28.292802","172.30.1.104","172.30.1.205","TCP","54","49671 > 41026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57458","28.292836","172.30.1.104","172.30.1.205","TCP","54","49671 > 41030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57459","28.292863","172.30.1.104","172.30.1.205","TCP","54","49671 > 41034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57460","28.292891","172.30.1.104","172.30.1.205","TCP","54","49671 > 41038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57461","28.292927","172.30.1.104","172.30.1.205","TCP","54","49671 > 41014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57462","28.292935","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57463","28.292972","172.30.1.104","172.30.1.205","TCP","54","49671 > 41042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57464","28.293009","172.30.1.104","172.30.1.205","TCP","54","49671 > 41046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57465","28.293045","172.30.1.104","172.30.1.205","TCP","54","49671 > 41046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57466","28.293049","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57467","28.293080","172.30.1.104","172.30.1.205","TCP","54","49671 > 41042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57468","28.293083","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57469","28.293110","172.30.1.104","172.30.1.205","TCP","54","49671 > 41038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57470","28.293113","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57471","28.293151","172.30.1.104","172.30.1.205","TCP","54","49671 > 41034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57472","28.293154","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57473","28.293176","172.30.1.104","172.30.1.205","TCP","54","49671 > 41030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57474","28.293179","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57475","28.293200","172.30.1.104","172.30.1.205","TCP","54","49671 > 41018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57476","28.293204","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57477","28.293227","172.30.1.104","172.30.1.205","TCP","54","49671 > 41026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57478","28.293230","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57479","28.293261","172.30.1.104","172.30.1.205","TCP","54","49671 > 41022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57480","28.293264","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57481","28.293287","172.30.1.104","172.30.1.205","TCP","54","49671 > 41050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57482","28.293317","172.30.1.104","172.30.1.205","TCP","54","49671 > 41054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57483","28.293342","172.30.1.104","172.30.1.205","TCP","54","49671 > 41050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57484","28.293346","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57485","28.293369","172.30.1.104","172.30.1.205","TCP","54","49671 > 41058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57486","28.293397","172.30.1.104","172.30.1.205","TCP","54","49671 > 41054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57487","28.293401","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57488","28.293425","172.30.1.104","172.30.1.205","TCP","54","49671 > 41058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57489","28.293428","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57490","28.294116","172.30.1.205","172.30.1.104","TCP","54","48424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57491","28.294226","172.30.1.205","172.30.1.104","TCP","74","41062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931520 TSecr=0 WS=128" +"57492","28.294468","172.30.1.104","172.30.1.205","TCP","54","135 > 48424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57493","28.294491","172.30.1.104","172.30.1.205","TCP","54","135 > 48424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57494","28.294496","172.30.1.205","172.30.1.104","TCP","54","48424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57495","28.294521","172.30.1.104","172.30.1.205","TCP","66","49671 > 41062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57496","28.294528","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57497","28.294895","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57498","28.295234","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57499","28.295243","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57500","28.297143","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57501","28.297529","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57502","28.297535","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57503","28.298882","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57504","28.303054","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57505","28.303064","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57506","28.304007","172.30.1.205","172.30.1.104","TCP","74","48428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931530 TSecr=0 WS=128" +"57507","28.304403","172.30.1.104","172.30.1.205","TCP","66","135 > 48428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57508","28.304414","172.30.1.205","172.30.1.104","TCP","54","48428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57509","28.304765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57510","28.305066","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57511","28.305075","172.30.1.205","172.30.1.104","TCP","54","48428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57512","28.307247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57513","28.307714","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57514","28.307720","172.30.1.205","172.30.1.104","TCP","54","48428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57515","28.309540","172.30.1.205","172.30.1.104","TCP","54","48428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57516","28.309649","172.30.1.205","172.30.1.104","TCP","74","41066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931536 TSecr=0 WS=128" +"57517","28.309866","172.30.1.104","172.30.1.205","TCP","54","135 > 48428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57518","28.309905","172.30.1.104","172.30.1.205","TCP","54","135 > 48428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57519","28.309910","172.30.1.205","172.30.1.104","TCP","54","48428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57520","28.309963","172.30.1.104","172.30.1.205","TCP","66","49671 > 41066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57521","28.309971","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57522","28.310328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57523","28.310643","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57524","28.310650","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57525","28.312494","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57526","28.313365","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57527","28.313371","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57528","28.314734","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57529","28.318713","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57530","28.318728","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57531","28.319669","172.30.1.205","172.30.1.104","TCP","74","48432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931546 TSecr=0 WS=128" +"57532","28.320043","172.30.1.104","172.30.1.205","TCP","66","135 > 48432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57533","28.320054","172.30.1.205","172.30.1.104","TCP","54","48432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57534","28.320405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57535","28.320861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57536","28.320870","172.30.1.205","172.30.1.104","TCP","54","48432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57537","28.323071","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57538","28.323518","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57539","28.323525","172.30.1.205","172.30.1.104","TCP","54","48432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57540","28.325347","172.30.1.205","172.30.1.104","TCP","54","48432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57541","28.325459","172.30.1.205","172.30.1.104","TCP","74","41070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931551 TSecr=0 WS=128" +"57542","28.325632","172.30.1.104","172.30.1.205","TCP","54","135 > 48432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57543","28.325659","172.30.1.104","172.30.1.205","TCP","54","135 > 48432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57544","28.325665","172.30.1.205","172.30.1.104","TCP","54","48432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57545","28.325769","172.30.1.104","172.30.1.205","TCP","66","49671 > 41070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57546","28.325778","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57547","28.326151","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57548","28.326467","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57549","28.326479","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57550","28.328335","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57551","28.328729","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57552","28.328736","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57553","28.330105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57554","28.334292","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57555","28.334301","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57556","28.335251","172.30.1.205","172.30.1.104","TCP","74","48436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931561 TSecr=0 WS=128" +"57557","28.335616","172.30.1.104","172.30.1.205","TCP","66","135 > 48436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57558","28.335626","172.30.1.205","172.30.1.104","TCP","54","48436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57559","28.335976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57560","28.336294","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57561","28.336302","172.30.1.205","172.30.1.104","TCP","54","48436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57562","28.338525","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57563","28.338946","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57564","28.338952","172.30.1.205","172.30.1.104","TCP","54","48436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57565","28.340764","172.30.1.205","172.30.1.104","TCP","54","48436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57566","28.340891","172.30.1.205","172.30.1.104","TCP","74","41074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931567 TSecr=0 WS=128" +"57567","28.341057","172.30.1.104","172.30.1.205","TCP","54","135 > 48436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57568","28.341112","172.30.1.104","172.30.1.205","TCP","54","135 > 48436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57569","28.341118","172.30.1.205","172.30.1.104","TCP","54","48436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57570","28.341216","172.30.1.104","172.30.1.205","TCP","66","49671 > 41074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57571","28.341223","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57572","28.341570","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57573","28.343023","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57574","28.343031","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57575","28.344951","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57576","28.345382","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57577","28.345388","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57578","28.346742","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57579","28.350879","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57580","28.350891","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57581","28.351908","172.30.1.205","172.30.1.104","TCP","74","48440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931578 TSecr=0 WS=128" +"57582","28.352280","172.30.1.104","172.30.1.205","TCP","66","135 > 48440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57583","28.352292","172.30.1.205","172.30.1.104","TCP","54","48440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57584","28.352640","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57585","28.352961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57586","28.352970","172.30.1.205","172.30.1.104","TCP","54","48440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57587","28.355175","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57588","28.355590","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57589","28.355597","172.30.1.205","172.30.1.104","TCP","54","48440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57590","28.357434","172.30.1.205","172.30.1.104","TCP","54","48440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57591","28.357548","172.30.1.205","172.30.1.104","TCP","74","41078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931583 TSecr=0 WS=128" +"57592","28.357873","172.30.1.104","172.30.1.205","TCP","54","135 > 48440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57593","28.357883","172.30.1.104","172.30.1.205","TCP","66","49671 > 41078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57594","28.357892","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57595","28.357898","172.30.1.104","172.30.1.205","TCP","54","135 > 48440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57596","28.357904","172.30.1.205","172.30.1.104","TCP","54","48440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57597","28.358261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57598","28.358586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57599","28.358594","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57600","28.360456","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57601","28.360825","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57602","28.360830","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57603","28.362188","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57604","28.366133","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57605","28.366144","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57606","28.367125","172.30.1.205","172.30.1.104","TCP","74","48444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931593 TSecr=0 WS=128" +"57607","28.367489","172.30.1.104","172.30.1.205","TCP","66","135 > 48444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57608","28.367501","172.30.1.205","172.30.1.104","TCP","54","48444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57609","28.367861","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57610","28.368181","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57611","28.368190","172.30.1.205","172.30.1.104","TCP","54","48444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57612","28.370423","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57613","28.370873","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57614","28.370879","172.30.1.205","172.30.1.104","TCP","54","48444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57615","28.372697","172.30.1.205","172.30.1.104","TCP","54","48444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57616","28.372831","172.30.1.205","172.30.1.104","TCP","74","41082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931599 TSecr=0 WS=128" +"57617","28.372996","172.30.1.104","172.30.1.205","TCP","54","135 > 48444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57618","28.373024","172.30.1.104","172.30.1.205","TCP","54","135 > 48444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57619","28.373029","172.30.1.205","172.30.1.104","TCP","54","48444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57620","28.373129","172.30.1.104","172.30.1.205","TCP","66","49671 > 41082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57621","28.373137","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57622","28.373483","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57623","28.373809","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57624","28.373818","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57625","28.375705","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57626","28.376048","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57627","28.376054","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57628","28.377442","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57629","28.381547","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57630","28.381556","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57631","28.382517","172.30.1.205","172.30.1.104","TCP","74","48448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931608 TSecr=0 WS=128" +"57632","28.382824","172.30.1.104","172.30.1.205","TCP","66","135 > 48448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57633","28.382834","172.30.1.205","172.30.1.104","TCP","54","48448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57634","28.383186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57635","28.383460","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57636","28.383469","172.30.1.205","172.30.1.104","TCP","54","48448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57637","28.385684","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57638","28.386085","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57639","28.386092","172.30.1.205","172.30.1.104","TCP","54","48448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57640","28.387906","172.30.1.205","172.30.1.104","TCP","54","48448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57641","28.388016","172.30.1.205","172.30.1.104","TCP","74","41086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931614 TSecr=0 WS=128" +"57642","28.388214","172.30.1.104","172.30.1.205","TCP","54","135 > 48448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57643","28.388222","172.30.1.104","172.30.1.205","TCP","54","135 > 48448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57644","28.388227","172.30.1.205","172.30.1.104","TCP","54","48448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57645","28.388303","172.30.1.104","172.30.1.205","TCP","66","49671 > 41086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57646","28.388311","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57647","28.388653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57648","28.388941","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57649","28.388950","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57650","28.390843","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57651","28.391186","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57652","28.391196","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57653","28.392894","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57654","28.397000","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57655","28.397009","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57656","28.397993","172.30.1.205","172.30.1.104","TCP","74","48452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931624 TSecr=0 WS=128" +"57657","28.398355","172.30.1.104","172.30.1.205","TCP","66","135 > 48452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57658","28.398367","172.30.1.205","172.30.1.104","TCP","54","48452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57659","28.398730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57660","28.399040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57661","28.399049","172.30.1.205","172.30.1.104","TCP","54","48452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57662","28.401285","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57663","28.401687","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57664","28.401694","172.30.1.205","172.30.1.104","TCP","54","48452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57665","28.403515","172.30.1.205","172.30.1.104","TCP","54","48452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57666","28.403640","172.30.1.205","172.30.1.104","TCP","74","41090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931630 TSecr=0 WS=128" +"57667","28.403804","172.30.1.104","172.30.1.205","TCP","54","135 > 48452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57668","28.403883","172.30.1.104","172.30.1.205","TCP","54","135 > 48452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57669","28.403890","172.30.1.205","172.30.1.104","TCP","54","48452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57670","28.403936","172.30.1.104","172.30.1.205","TCP","66","49671 > 41090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57671","28.403947","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57672","28.404296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57673","28.404629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57674","28.404637","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57675","28.406547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57676","28.406906","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57677","28.406912","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57678","28.408264","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57679","28.412486","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57680","28.412495","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57681","28.413503","172.30.1.205","172.30.1.104","TCP","74","48456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931639 TSecr=0 WS=128" +"57682","28.413909","172.30.1.104","172.30.1.205","TCP","66","135 > 48456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57683","28.413922","172.30.1.205","172.30.1.104","TCP","54","48456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57684","28.414286","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57685","28.414572","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57686","28.414581","172.30.1.205","172.30.1.104","TCP","54","48456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57687","28.416791","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57688","28.417219","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57689","28.417225","172.30.1.205","172.30.1.104","TCP","54","48456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57690","28.419037","172.30.1.205","172.30.1.104","TCP","54","48456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57691","28.419153","172.30.1.205","172.30.1.104","TCP","74","41094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931645 TSecr=0 WS=128" +"57692","28.419337","172.30.1.104","172.30.1.205","TCP","54","135 > 48456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57693","28.419395","172.30.1.104","172.30.1.205","TCP","54","135 > 48456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57694","28.419402","172.30.1.205","172.30.1.104","TCP","54","48456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57695","28.419452","172.30.1.104","172.30.1.205","TCP","66","49671 > 41094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57696","28.419460","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57697","28.419801","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57698","28.420124","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57699","28.420133","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57700","28.422040","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57701","28.422436","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57702","28.422442","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57703","28.423790","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57704","28.427769","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57705","28.427779","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57706","28.428747","172.30.1.205","172.30.1.104","TCP","74","48460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931655 TSecr=0 WS=128" +"57707","28.429045","172.30.1.104","172.30.1.205","TCP","66","135 > 48460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57708","28.429057","172.30.1.205","172.30.1.104","TCP","54","48460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57709","28.429418","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57710","28.429707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57711","28.429715","172.30.1.205","172.30.1.104","TCP","54","48460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57712","28.431906","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57713","28.432324","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57714","28.432331","172.30.1.205","172.30.1.104","TCP","54","48460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57715","28.434174","172.30.1.205","172.30.1.104","TCP","54","48460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57716","28.434292","172.30.1.205","172.30.1.104","TCP","74","41098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931660 TSecr=0 WS=128" +"57717","28.434514","172.30.1.104","172.30.1.205","TCP","54","135 > 48460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57718","28.434539","172.30.1.104","172.30.1.205","TCP","54","135 > 48460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57719","28.434545","172.30.1.205","172.30.1.104","TCP","54","48460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57720","28.434628","172.30.1.104","172.30.1.205","TCP","66","49671 > 41098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57721","28.434637","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57722","28.434979","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57723","28.435278","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57724","28.435287","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57725","28.437209","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57726","28.437569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57727","28.437575","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57728","28.438940","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57729","28.443066","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57730","28.443075","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57731","28.444043","172.30.1.205","172.30.1.104","TCP","74","48464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931670 TSecr=0 WS=128" +"57732","28.444332","172.30.1.104","172.30.1.205","TCP","66","135 > 48464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57733","28.444343","172.30.1.205","172.30.1.104","TCP","54","48464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57734","28.444692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57735","28.445008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57736","28.445017","172.30.1.205","172.30.1.104","TCP","54","48464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57737","28.447237","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57738","28.447625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57739","28.447632","172.30.1.205","172.30.1.104","TCP","54","48464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57740","28.449460","172.30.1.205","172.30.1.104","TCP","54","48464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57741","28.449580","172.30.1.205","172.30.1.104","TCP","74","41102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931676 TSecr=0 WS=128" +"57742","28.449727","172.30.1.104","172.30.1.205","TCP","54","135 > 48464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57743","28.449864","172.30.1.104","172.30.1.205","TCP","66","49671 > 41102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57744","28.449873","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57745","28.449887","172.30.1.104","172.30.1.205","TCP","54","135 > 48464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57746","28.449896","172.30.1.205","172.30.1.104","TCP","54","48464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57747","28.450251","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57748","28.450576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57749","28.450585","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57750","28.452479","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57751","28.452850","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57752","28.452857","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57753","28.454223","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57754","28.458450","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57755","28.458459","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57756","28.459475","172.30.1.205","172.30.1.104","TCP","74","48468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931685 TSecr=0 WS=128" +"57757","28.459874","172.30.1.104","172.30.1.205","TCP","66","135 > 48468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57758","28.459891","172.30.1.205","172.30.1.104","TCP","54","48468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57759","28.460240","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57760","28.460590","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57761","28.460599","172.30.1.205","172.30.1.104","TCP","54","48468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57762","28.462852","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57763","28.463252","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57764","28.463258","172.30.1.205","172.30.1.104","TCP","54","48468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57765","28.465104","172.30.1.205","172.30.1.104","TCP","54","48468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57766","28.465222","172.30.1.205","172.30.1.104","TCP","74","41106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931691 TSecr=0 WS=128" +"57767","28.465450","172.30.1.104","172.30.1.205","TCP","54","135 > 48468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57768","28.465480","172.30.1.104","172.30.1.205","TCP","54","135 > 48468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57769","28.465487","172.30.1.205","172.30.1.104","TCP","54","48468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57770","28.465583","172.30.1.104","172.30.1.205","TCP","66","49671 > 41106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57771","28.465591","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57772","28.465945","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57773","28.466251","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57774","28.466260","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57775","28.468154","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57776","28.468534","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57777","28.468540","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57778","28.469915","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57779","28.474042","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57780","28.474052","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57781","28.475034","172.30.1.205","172.30.1.104","TCP","74","48472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931701 TSecr=0 WS=128" +"57782","28.475351","172.30.1.104","172.30.1.205","TCP","66","135 > 48472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57783","28.475362","172.30.1.205","172.30.1.104","TCP","54","48472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57784","28.475714","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57785","28.476035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57786","28.476044","172.30.1.205","172.30.1.104","TCP","54","48472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57787","28.478288","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57788","28.478687","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57789","28.478693","172.30.1.205","172.30.1.104","TCP","54","48472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57790","28.479552","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57791","28.479603","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57792","28.479635","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57793","28.479663","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57794","28.479690","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57795","28.479713","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57796","28.479735","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57797","28.479761","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57798","28.479783","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57799","28.479810","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57800","28.479838","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57801","28.479902","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57802","28.479950","172.30.1.104","172.30.1.205","TCP","54","49671 > 41066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57803","28.479981","172.30.1.104","172.30.1.205","TCP","54","49671 > 41070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57804","28.480013","172.30.1.104","172.30.1.205","TCP","54","49671 > 41066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57805","28.480022","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57806","28.480044","172.30.1.104","172.30.1.205","TCP","54","49671 > 41070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57807","28.480048","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57808","28.480075","172.30.1.104","172.30.1.205","TCP","54","49671 > 41074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57809","28.480120","172.30.1.104","172.30.1.205","TCP","54","49671 > 41078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57810","28.480149","172.30.1.104","172.30.1.205","TCP","54","49671 > 41074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57811","28.480153","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57812","28.480182","172.30.1.104","172.30.1.205","TCP","54","49671 > 41078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57813","28.480185","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57814","28.480268","172.30.1.104","172.30.1.205","TCP","54","49671 > 41082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57815","28.480273","172.30.1.104","172.30.1.205","TCP","54","49671 > 41086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57816","28.480285","172.30.1.104","172.30.1.205","TCP","54","49671 > 41090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57817","28.480329","172.30.1.104","172.30.1.205","TCP","54","49671 > 41082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57818","28.480333","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57819","28.480374","172.30.1.104","172.30.1.205","TCP","54","49671 > 41086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57820","28.480377","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57821","28.480405","172.30.1.104","172.30.1.205","TCP","54","49671 > 41090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57822","28.480408","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57823","28.480896","172.30.1.104","172.30.1.205","TCP","54","49671 > 41094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57824","28.480936","172.30.1.104","172.30.1.205","TCP","54","49671 > 41098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57825","28.480968","172.30.1.104","172.30.1.205","TCP","54","49671 > 41094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57826","28.480974","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57827","28.480998","172.30.1.104","172.30.1.205","TCP","54","49671 > 41102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57828","28.481042","172.30.1.104","172.30.1.205","TCP","54","49671 > 41106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57829","28.481078","172.30.1.104","172.30.1.205","TCP","54","49671 > 41062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57830","28.481136","172.30.1.104","172.30.1.205","TCP","54","49671 > 41062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57831","28.481140","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57832","28.481168","172.30.1.104","172.30.1.205","TCP","54","49671 > 41106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57833","28.481171","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57834","28.481201","172.30.1.104","172.30.1.205","TCP","54","49671 > 41098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57835","28.481204","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57836","28.481243","172.30.1.104","172.30.1.205","TCP","54","49671 > 41102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57837","28.481246","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57838","28.481593","172.30.1.205","172.30.1.104","TCP","54","48472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57839","28.481714","172.30.1.205","172.30.1.104","TCP","74","41110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931708 TSecr=0 WS=128" +"57840","28.481888","172.30.1.104","172.30.1.205","TCP","54","135 > 48472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57841","28.481972","172.30.1.104","172.30.1.205","TCP","54","135 > 48472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57842","28.481982","172.30.1.205","172.30.1.104","TCP","54","48472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57843","28.482075","172.30.1.104","172.30.1.205","TCP","66","49671 > 41110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57844","28.482089","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57845","28.482496","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57846","28.482809","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57847","28.482818","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57848","28.484764","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57849","28.485165","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57850","28.485173","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57851","28.486578","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57852","28.490645","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57853","28.490658","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57854","28.491715","172.30.1.205","172.30.1.104","TCP","74","48476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931718 TSecr=0 WS=128" +"57855","28.492035","172.30.1.104","172.30.1.205","TCP","66","135 > 48476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57856","28.492047","172.30.1.205","172.30.1.104","TCP","54","48476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57857","28.492417","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57858","28.492718","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57859","28.492727","172.30.1.205","172.30.1.104","TCP","54","48476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57860","28.494964","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57861","28.495422","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57862","28.495429","172.30.1.205","172.30.1.104","TCP","54","48476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57863","28.497279","172.30.1.205","172.30.1.104","TCP","54","48476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57864","28.497418","172.30.1.205","172.30.1.104","TCP","74","41114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931723 TSecr=0 WS=128" +"57865","28.497565","172.30.1.104","172.30.1.205","TCP","54","135 > 48476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57866","28.497602","172.30.1.104","172.30.1.205","TCP","54","135 > 48476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57867","28.497610","172.30.1.205","172.30.1.104","TCP","54","48476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57868","28.497756","172.30.1.104","172.30.1.205","TCP","66","49671 > 41114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57869","28.497765","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57870","28.498121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57871","28.498430","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57872","28.498439","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57873","28.500331","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57874","28.500898","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57875","28.500904","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57876","28.502294","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57877","28.506382","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57878","28.506394","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57879","28.507460","172.30.1.205","172.30.1.104","TCP","74","48480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931733 TSecr=0 WS=128" +"57880","28.507769","172.30.1.104","172.30.1.205","TCP","66","135 > 48480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57881","28.507781","172.30.1.205","172.30.1.104","TCP","54","48480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57882","28.508143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57883","28.508438","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57884","28.508447","172.30.1.205","172.30.1.104","TCP","54","48480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57885","28.510734","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57886","28.511132","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57887","28.511139","172.30.1.205","172.30.1.104","TCP","54","48480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57888","28.513008","172.30.1.205","172.30.1.104","TCP","54","48480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57889","28.513150","172.30.1.205","172.30.1.104","TCP","74","41118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931739 TSecr=0 WS=128" +"57890","28.513295","172.30.1.104","172.30.1.205","TCP","54","135 > 48480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57891","28.513369","172.30.1.104","172.30.1.205","TCP","54","135 > 48480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57892","28.513382","172.30.1.205","172.30.1.104","TCP","54","48480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57893","28.513523","172.30.1.104","172.30.1.205","TCP","66","49671 > 41118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57894","28.513538","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57895","28.513947","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57896","28.514269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57897","28.514279","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57898","28.516213","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57899","28.516583","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57900","28.516590","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57901","28.517983","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57902","28.522160","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57903","28.522171","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57904","28.523159","172.30.1.205","172.30.1.104","TCP","74","48484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931749 TSecr=0 WS=128" +"57905","28.523486","172.30.1.104","172.30.1.205","TCP","66","135 > 48484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57906","28.523496","172.30.1.205","172.30.1.104","TCP","54","48484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57907","28.523848","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57908","28.524145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57909","28.524154","172.30.1.205","172.30.1.104","TCP","54","48484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57910","28.526401","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57911","28.526824","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57912","28.526831","172.30.1.205","172.30.1.104","TCP","54","48484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57913","28.528667","172.30.1.205","172.30.1.104","TCP","54","48484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57914","28.528811","172.30.1.205","172.30.1.104","TCP","74","41122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931755 TSecr=0 WS=128" +"57915","28.528946","172.30.1.104","172.30.1.205","TCP","54","135 > 48484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57916","28.528977","172.30.1.104","172.30.1.205","TCP","54","135 > 48484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57917","28.528985","172.30.1.205","172.30.1.104","TCP","54","48484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57918","28.529097","172.30.1.104","172.30.1.205","TCP","66","49671 > 41122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57919","28.529105","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57920","28.529454","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57921","28.530491","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57922","28.530500","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57923","28.532389","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57924","28.532790","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57925","28.532800","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57926","28.534261","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57927","28.538427","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57928","28.538440","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57929","28.539455","172.30.1.205","172.30.1.104","TCP","74","48488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931765 TSecr=0 WS=128" +"57930","28.539795","172.30.1.104","172.30.1.205","TCP","66","135 > 48488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57931","28.539807","172.30.1.205","172.30.1.104","TCP","54","48488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57932","28.540166","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57933","28.540489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57934","28.540498","172.30.1.205","172.30.1.104","TCP","54","48488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57935","28.542729","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57936","28.543116","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57937","28.543123","172.30.1.205","172.30.1.104","TCP","54","48488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57938","28.544985","172.30.1.205","172.30.1.104","TCP","54","48488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57939","28.545098","172.30.1.205","172.30.1.104","TCP","74","41126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931771 TSecr=0 WS=128" +"57940","28.545287","172.30.1.104","172.30.1.205","TCP","54","135 > 48488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57941","28.545317","172.30.1.104","172.30.1.205","TCP","54","135 > 48488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57942","28.545324","172.30.1.205","172.30.1.104","TCP","54","48488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57943","28.545426","172.30.1.104","172.30.1.205","TCP","66","49671 > 41126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57944","28.545435","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57945","28.545785","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57946","28.546193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57947","28.546202","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57948","28.548103","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57949","28.548488","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57950","28.548496","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57951","28.549935","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57952","28.553980","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57953","28.553991","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57954","28.554957","172.30.1.205","172.30.1.104","TCP","74","48492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931781 TSecr=0 WS=128" +"57955","28.555222","172.30.1.104","172.30.1.205","TCP","66","135 > 48492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57956","28.555233","172.30.1.205","172.30.1.104","TCP","54","48492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57957","28.555590","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" +"57958","28.555885","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57959","28.555894","172.30.1.205","172.30.1.104","TCP","54","48492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57960","28.558139","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" +"57961","28.558506","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" +"57962","28.558513","172.30.1.205","172.30.1.104","TCP","54","48492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57963","28.560335","172.30.1.205","172.30.1.104","TCP","54","48492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" +"57964","28.560448","172.30.1.205","172.30.1.104","TCP","74","41130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931786 TSecr=0 WS=128" +"57965","28.560630","172.30.1.104","172.30.1.205","TCP","54","135 > 48492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57966","28.560641","172.30.1.104","172.30.1.205","TCP","54","135 > 48492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" +"57967","28.560647","172.30.1.205","172.30.1.104","TCP","54","48492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" +"57968","28.560790","172.30.1.104","172.30.1.205","TCP","66","49671 > 41130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" +"57969","28.560800","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" +"57970","28.561171","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" +"57971","28.561457","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" +"57972","28.561466","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" +"57973","28.563355","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" +"57974","28.563719","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" +"57975","28.563725","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" +"57976","28.565116","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" +"57977","28.569301","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" +"57978","28.569312","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57979","28.576161","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57980","28.576213","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57981","28.576248","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57982","28.576279","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57983","28.576316","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57984","28.576346","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" +"57985","28.576570","172.30.1.104","172.30.1.205","TCP","54","49671 > 41110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57986","28.576583","172.30.1.104","172.30.1.205","TCP","54","49671 > 41114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57987","28.576611","172.30.1.104","172.30.1.205","TCP","54","49671 > 41118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57988","28.576633","172.30.1.104","172.30.1.205","TCP","54","49671 > 41122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57989","28.576702","172.30.1.104","172.30.1.205","TCP","54","49671 > 41126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57990","28.576725","172.30.1.104","172.30.1.205","TCP","54","49671 > 41130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57991","28.578129","172.30.1.104","172.30.1.205","TCP","54","49671 > 41130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57992","28.578138","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57993","28.578176","172.30.1.104","172.30.1.205","TCP","54","49671 > 41126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57994","28.578180","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57995","28.578208","172.30.1.104","172.30.1.205","TCP","54","49671 > 41122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57996","28.578211","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57997","28.578238","172.30.1.104","172.30.1.205","TCP","54","49671 > 41110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"57998","28.578242","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"57999","28.578254","172.30.1.104","172.30.1.205","TCP","54","49671 > 41114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"58000","28.578258","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" +"58001","28.578280","172.30.1.104","172.30.1.205","TCP","54","49671 > 41118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" +"58002","28.578287","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0"